Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe
-
Size
514KB
-
MD5
667ad1c2ef2a54e294456ac0eb79e590
-
SHA1
cac99931df045ee4bc6cc940a5ab1642dcfdf84e
-
SHA256
26578789913ef8981f385b1129df0c8c792344d519912d028a3255c76c549240
-
SHA512
bba183aabb22f20ced7c9cb07d4eb0d3beb878b00d82ab473c59ba64a48c47e964539ef12990a96d25586297c983cfcdc5e26a9d55cf8fc251ce6c2a8ee30868
-
SSDEEP
6144:st9sTEcfGHPh9JSBu/r9aQ1nYBF45HH+tjgYW6kysx96M:s6DfGJ94ByYQ1GFIH+2fxoM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2708 vrQ8BSQqbnzBkKOb.exe -
Executes dropped EXE 2 IoCs
pid Process 1716 vrQ8BSQqbnzBkKOb.exe 2708 vrQ8BSQqbnzBkKOb.exe -
Loads dropped DLL 4 IoCs
pid Process 1680 667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe 1680 667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe 1680 667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe 2708 vrQ8BSQqbnzBkKOb.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\3lJVprSMF0B = "C:\\ProgramData\\ndNKh1ah9Q\\vrQ8BSQqbnzBkKOb.exe" 667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2368 set thread context of 1680 2368 667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe 30 PID 1716 set thread context of 2708 1716 vrQ8BSQqbnzBkKOb.exe 32 PID 2708 set thread context of 2804 2708 vrQ8BSQqbnzBkKOb.exe 33 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1680 2368 667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1680 2368 667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1680 2368 667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1680 2368 667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1680 2368 667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1680 2368 667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe 30 PID 1680 wrote to memory of 1716 1680 667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe 31 PID 1680 wrote to memory of 1716 1680 667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe 31 PID 1680 wrote to memory of 1716 1680 667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe 31 PID 1680 wrote to memory of 1716 1680 667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe 31 PID 1716 wrote to memory of 2708 1716 vrQ8BSQqbnzBkKOb.exe 32 PID 1716 wrote to memory of 2708 1716 vrQ8BSQqbnzBkKOb.exe 32 PID 1716 wrote to memory of 2708 1716 vrQ8BSQqbnzBkKOb.exe 32 PID 1716 wrote to memory of 2708 1716 vrQ8BSQqbnzBkKOb.exe 32 PID 1716 wrote to memory of 2708 1716 vrQ8BSQqbnzBkKOb.exe 32 PID 1716 wrote to memory of 2708 1716 vrQ8BSQqbnzBkKOb.exe 32 PID 2708 wrote to memory of 2804 2708 vrQ8BSQqbnzBkKOb.exe 33 PID 2708 wrote to memory of 2804 2708 vrQ8BSQqbnzBkKOb.exe 33 PID 2708 wrote to memory of 2804 2708 vrQ8BSQqbnzBkKOb.exe 33 PID 2708 wrote to memory of 2804 2708 vrQ8BSQqbnzBkKOb.exe 33 PID 2708 wrote to memory of 2804 2708 vrQ8BSQqbnzBkKOb.exe 33 PID 2708 wrote to memory of 2804 2708 vrQ8BSQqbnzBkKOb.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\667ad1c2ef2a54e294456ac0eb79e590_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\ProgramData\ndNKh1ah9Q\vrQ8BSQqbnzBkKOb.exe"C:\ProgramData\ndNKh1ah9Q\vrQ8BSQqbnzBkKOb.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\ProgramData\ndNKh1ah9Q\vrQ8BSQqbnzBkKOb.exe"C:\ProgramData\ndNKh1ah9Q\vrQ8BSQqbnzBkKOb.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Windows Sidebar\sidebar.exe"C:\Program Files (x86)\Windows Sidebar\sidebar.exe" /i:27085⤵PID:2804
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
514KB
MD5667ad1c2ef2a54e294456ac0eb79e590
SHA1cac99931df045ee4bc6cc940a5ab1642dcfdf84e
SHA25626578789913ef8981f385b1129df0c8c792344d519912d028a3255c76c549240
SHA512bba183aabb22f20ced7c9cb07d4eb0d3beb878b00d82ab473c59ba64a48c47e964539ef12990a96d25586297c983cfcdc5e26a9d55cf8fc251ce6c2a8ee30868