Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 20:39 UTC
Static task
static1
Behavioral task
behavioral1
Sample
68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe
-
Size
41KB
-
MD5
68d8877751499e56bb32f0adc3be8ef7
-
SHA1
41f6a1ae676dc1533691a9b0ccb54e63232bfdd4
-
SHA256
efd6afacdcb5ab5324b292f57030150a730b0faa778b693d5a8d51e5be266235
-
SHA512
133cad7fa6f89cff591449b85fb739ff3e494a7f86f5f3b4d428923bd26c7fbf00870ccc45c6d9e14e5097150423d77d763c7d670cc005e83f27f64f26f4a84a
-
SSDEEP
768:Y5qiEdRL4oVmB5QSdIcGnf7ngRJqFbyVfm4LF1Y232WDQsz/b7XTY:YCrLBbbgSbyA4y2m9w/b7M
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Drivers\Atieccx.sys cmvd -
Deletes itself 1 IoCs
pid Process 1744 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2536 svchost.exe 2308 sys 2648 cmvd -
Loads dropped DLL 7 IoCs
pid Process 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 2612 svchost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\dslcaodig.dll 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1716 set thread context of 2612 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 36 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Downloaded Program Files\svchost.exe svchost.exe File created C:\Windows\Fonts\sys 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe File created C:\Windows\Fonts\cmvd 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe File created C:\Windows\Fonts\svchost.exe 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sys Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmvd Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://luck114.com" sys -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 2536 svchost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2536 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 30 PID 1716 wrote to memory of 2536 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 30 PID 1716 wrote to memory of 2536 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 30 PID 1716 wrote to memory of 2536 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 30 PID 1716 wrote to memory of 2308 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 32 PID 1716 wrote to memory of 2308 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 32 PID 1716 wrote to memory of 2308 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 32 PID 1716 wrote to memory of 2308 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 32 PID 2308 wrote to memory of 2984 2308 sys 33 PID 2308 wrote to memory of 2984 2308 sys 33 PID 2308 wrote to memory of 2984 2308 sys 33 PID 2308 wrote to memory of 2984 2308 sys 33 PID 1716 wrote to memory of 2648 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 35 PID 1716 wrote to memory of 2648 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 35 PID 1716 wrote to memory of 2648 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 35 PID 1716 wrote to memory of 2648 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 35 PID 1716 wrote to memory of 2612 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 36 PID 1716 wrote to memory of 2612 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 36 PID 1716 wrote to memory of 2612 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 36 PID 1716 wrote to memory of 2612 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 36 PID 1716 wrote to memory of 2612 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 36 PID 1716 wrote to memory of 1744 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 37 PID 1716 wrote to memory of 1744 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 37 PID 1716 wrote to memory of 1744 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 37 PID 1716 wrote to memory of 1744 1716 68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68d8877751499e56bb32f0adc3be8ef7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\Fonts\svchost.exeC:\Windows\Fonts\svchost.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Windows\Fonts\sysC:\Windows\Fonts\sys2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\cmd.execmd /c del C:\Windows\Fonts\sys3⤵
- System Location Discovery: System Language Discovery
PID:2984
-
-
-
C:\Windows\Fonts\cmvdC:\Windows\Fonts\cmvd2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2648
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2612
-
-
C:\Windows\SysWOW64\cmd.execmd /c c:\DEL.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5631c981a17a4fc383338499be2d3c54d
SHA1939b18c132d79eb45b2dafc7404f3801b8af66df
SHA256b75c375547aed0c1b8bdc66c64fc150561c5e53032be6a70f73a47e47b7576c2
SHA512708102b5179af0363e9805b2ed4f595fd6af806c1d1fe04a7de5fc461a787360ffd81dfed04320a4449dc9dab7b8a665962c65542d4e16404d7a7c2131158470
-
Filesize
12KB
MD5639dddb9569e6e888bdb522bc4de2123
SHA10807b27b4fd30014bc31b9d8966f9b4ce669f448
SHA256c36c9ecc093bfee8f1f655f86b0274be1c47cb731b48aed76efb37147a441219
SHA512f1dd408a904dd66bb04d999b7f0b0c31071204ea973260106730dd85ec6ca76da4073333f2ef627c4bcc08481e4e419075da99385a99f368cc56fd576f609eda
-
Filesize
8KB
MD518d83ff4d2b965f7c3e549313daa78ff
SHA1faa5caa0e26b7c3a11cc6beb00ffe59f385f6e86
SHA256ca301ac439ac6df8bf3c1538cbd2268fe68306d5036c4232ff7b3af86e263e4f
SHA512663bd821c1f78001eed01cc6046382d56bee28f41dd208a641f725f80fc4b1948ae4d073dc97185e3c9357eeeb67111e88d31286db805243908974dce33fe99c
-
Filesize
1KB
MD5bfc129b8f581799d9599acb0ed96837a
SHA1686cd7cda5b150e39280f50fb4182005cf4f17be
SHA25654fab61096be4c60a67e21bb4f731c788f00b27476a08c19946095602277de80
SHA51258ee343ae4eb7c8713ad46b34b5474eddc557794ecd77688a35bdf7eefa899f9f43b4a9820fba2785eb004e19a34e771cedadbe42ec5fc61fbbeef6102680dc3
-
Filesize
13KB
MD594cedcd65c1c490fa00de9618ec7cdf4
SHA16d8365a15e4224f1d06bd0044435ea51ea77850e
SHA256ac9d0f96d48b4b4238e216337aa395e932980e84a3fe738505d3a4dda5bca511
SHA512f0e3b56cab7214fa3a0d3a6475d4b8108df06c4448a7c5ee9edfe0346da2891473dc75436bf414ef0ae0d902514d1b14de00568c79edf3bba7f9a0d0234f4463