Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
38s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
69ca379ff6de7882aece7ab1bbfb3b20_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
69ca379ff6de7882aece7ab1bbfb3b20_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
69ca379ff6de7882aece7ab1bbfb3b20_JaffaCakes118.exe
-
Size
185KB
-
MD5
69ca379ff6de7882aece7ab1bbfb3b20
-
SHA1
8f2e847c9c021af22055af097dd8bfe465a53623
-
SHA256
ccd64b2829e63ed69e3e86a4a6afd9b98f35ebc9e3d99800635256d1c561c296
-
SHA512
692e27bdfd3026ddbd4ad1a4d4600d5596b919d1cff6d3d97eea9d9fce297c7647abced87f423452d6186016bfce53e1412308c4c2ec1066375febf03a9798d4
-
SSDEEP
3072:pv9sMmpaNYl23k3Lt1lw5t2iLHPe1MBa8BOHOfDhLIs0/hAwNSmkiePIU4LUmea:oM916t7twH+i0HOlIs0ZfNSpiV
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 69ca379ff6de7882aece7ab1bbfb3b20_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2808 dplaysvr.exe -
Loads dropped DLL 3 IoCs
pid Process 2476 69ca379ff6de7882aece7ab1bbfb3b20_JaffaCakes118.exe 2476 69ca379ff6de7882aece7ab1bbfb3b20_JaffaCakes118.exe 2808 dplaysvr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dplaysvr = "C:\\Users\\Admin\\AppData\\Local\\dplaysvr.exe" 69ca379ff6de7882aece7ab1bbfb3b20_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\dplaysvr = "C:\\Users\\Admin\\AppData\\Local\\dplaysvr.exe" 69ca379ff6de7882aece7ab1bbfb3b20_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dplaysvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69ca379ff6de7882aece7ab1bbfb3b20_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2476 69ca379ff6de7882aece7ab1bbfb3b20_JaffaCakes118.exe 2808 dplaysvr.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2808 2476 69ca379ff6de7882aece7ab1bbfb3b20_JaffaCakes118.exe 30 PID 2476 wrote to memory of 2808 2476 69ca379ff6de7882aece7ab1bbfb3b20_JaffaCakes118.exe 30 PID 2476 wrote to memory of 2808 2476 69ca379ff6de7882aece7ab1bbfb3b20_JaffaCakes118.exe 30 PID 2476 wrote to memory of 2808 2476 69ca379ff6de7882aece7ab1bbfb3b20_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\69ca379ff6de7882aece7ab1bbfb3b20_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69ca379ff6de7882aece7ab1bbfb3b20_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\dplaysvr.exe"C:\Users\Admin\AppData\Local\dplaysvr.exe" C:\Users\Admin\AppData\Local\Temp\69ca379ff6de7882aece7ab1bbfb3b20_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2808
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- System Location Discovery: System Language Discovery
PID:1976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD5ccb5c5fbc620b1e4d95e699a9b835aa9
SHA14ed4c65a121aeee6ea9cf5fbfe5ba82d973ac1c3
SHA2569fa77425db8cfb8c79f5897ac063dca274113180b5186a478cf42ac8bf8b0701
SHA512563c50e699a6ca296dad922fcfc3b844c62cd34f122c3d45009bda1d5641821646d7bd52b5691684d7a19a60f1b778175b84d738c6772eb8c3985595bd82b5aa
-
Filesize
134KB
MD5b5b5688ba57006b1e19f0fc0466945aa
SHA1d9881bf65456beffa0ef79217c67581369e09802
SHA2564a9631cd73070c0b62f1f382138c5b7c82ac20362393291af0489cd324b2a859
SHA51268e71d453966def159b11e3ee17d9af01723a38831d1a14c72f49839795bdf9715c2be83d417580f489cd34003399652f6507b3f5bfdb9fb4564acd717da8e32
-
Filesize
884B
MD53f253fe947a011accd9a408946847f77
SHA12259c21e88c6d7df69567a058735f1fff6a730a4
SHA2569d929dca2acd44f2382311e318a21b6df0ef8fac07262814ba3c1fca29da584b
SHA512cfc0b2a05264100aa7b176d68adba67ddb98937f2e62a6c3033524d97e22190588ea4116c134191d6d889d9b2efee60b11e9fafb6a2216fb7e8fedd0fd9f1415