Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
66s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe
-
Size
200KB
-
MD5
7150cdd8f39d8f6daca62172a1c5616d
-
SHA1
a72981bb8ebac15bb2bf8567f1ee4a3fe7185ef6
-
SHA256
ea23e1e61047167cbf36b8c3d4f8dbdfe98aff26398e25f5eb5edd6138dad1d0
-
SHA512
e2b32c23ac3b89b5e044d9093c1ebae6fd5d7c5729c542d09e82cd0e9e4b9fa37d92c0c43d2b6275770b55c9c02915bb862a2e1f493d4aeb087434cf279dbd72
-
SSDEEP
3072:XxCRlIfzpTYjHXrIIqeFqsXsKOue1u17bK20IyUjOGHatXAnpUM8ICU6ty2CKi:GIf5a7dqLAFRbByUjOBtQ+tG6ty2CN
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1740-2-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1740-3-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2756-13-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2756-14-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2756-15-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1740-16-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/3040-123-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/3040-122-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/3040-124-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1740-245-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1740-312-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2756 1740 7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe 30 PID 1740 wrote to memory of 2756 1740 7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe 30 PID 1740 wrote to memory of 2756 1740 7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe 30 PID 1740 wrote to memory of 2756 1740 7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe 30 PID 1740 wrote to memory of 3040 1740 7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe 32 PID 1740 wrote to memory of 3040 1740 7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe 32 PID 1740 wrote to memory of 3040 1740 7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe 32 PID 1740 wrote to memory of 3040 1740 7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe startC:\Program Files (x86)\LP\24CA\1B0.exe%C:\Program Files (x86)\LP\24CA2⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\AE497\3C324.exe%C:\Users\Admin\AppData\Roaming\AE4972⤵
- System Location Discovery: System Language Discovery
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD53090892eb778146692ffb7522185772c
SHA1d527b25c48b4574a8375ad4a36fc8774d1301c48
SHA256e7b01816d73dd5e48819ba291acb06550832cfe143b8fcfdc82987ac35143aff
SHA512cb7e992c2f852045d5011040d8bb317815d225a117c4f5c3ef1529c1b4d707d5ec188ed4509323029bf934bd2210966bdb80b3323773ba575f6d351c4afb3596
-
Filesize
600B
MD583b9f4eb2c65247a5260053f324008d3
SHA17b30c8773b9bb254e32e5234505ce6ed6d09cf9d
SHA256619034280d3ff7ad0770334d9a0ee0271e6af40e49ab1cf6518540a0daec4d0c
SHA512729f2a9f605bfc2fffaf7c2af32bda892f00f34defcb5f005295f90936f2fc75c671cbc6320e51828fcdda34180605d104ae9d27e0b39904fc905d373ffb7dff
-
Filesize
1KB
MD56d8f6fdfce6262969a5832bd0846ab86
SHA1a7d47089aaae8e9873c652d33530b46533d3c531
SHA2563b6c9af9fe46d924793e15cddad9800409bce4e9790cfdfb98556cc294564ac0
SHA51254fa1f408f3480a294aedf451e59e459f8445d90e9af24c658a5a0d6066b57f4fe1edd721fb7a2227d5fac12b16825481c921de2f566a027529c95c8ca6905cb