Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
6f454cf4b6006fd3f5ddbfaeb33750ba_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6f454cf4b6006fd3f5ddbfaeb33750ba_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6f454cf4b6006fd3f5ddbfaeb33750ba_JaffaCakes118.exe
-
Size
976KB
-
MD5
6f454cf4b6006fd3f5ddbfaeb33750ba
-
SHA1
c19b515767c21ba8a2647182567064a11a2cbf90
-
SHA256
2d50c7a4049bca0257fbeef74aaa4f50888276a83b88f050e79364e7383d6cdd
-
SHA512
08fffeb178f46b88fba80fe25a81a952095e7922c3aaf58133c5fa3eeac14f93e263d8fb78b88b6869b2bf82c2555060bce08274eaac05f2df52f47094b8fcc9
-
SSDEEP
24576:T3YdyAeukW5AJJcZlmRhzogTSvvN/5icIKAV7W:T3YgHclK1E/5ipjV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2072 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3040 TrueImage.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3040 set thread context of 2760 3040 TrueImage.exe 32 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Delete.BAT 6f454cf4b6006fd3f5ddbfaeb33750ba_JaffaCakes118.exe File created C:\Windows\TrueImage.exe 6f454cf4b6006fd3f5ddbfaeb33750ba_JaffaCakes118.exe File opened for modification C:\Windows\TrueImage.exe 6f454cf4b6006fd3f5ddbfaeb33750ba_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f454cf4b6006fd3f5ddbfaeb33750ba_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TrueImage.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2760 3040 TrueImage.exe 32 PID 3040 wrote to memory of 2760 3040 TrueImage.exe 32 PID 3040 wrote to memory of 2760 3040 TrueImage.exe 32 PID 3040 wrote to memory of 2760 3040 TrueImage.exe 32 PID 3040 wrote to memory of 2760 3040 TrueImage.exe 32 PID 696 wrote to memory of 2072 696 6f454cf4b6006fd3f5ddbfaeb33750ba_JaffaCakes118.exe 33 PID 696 wrote to memory of 2072 696 6f454cf4b6006fd3f5ddbfaeb33750ba_JaffaCakes118.exe 33 PID 696 wrote to memory of 2072 696 6f454cf4b6006fd3f5ddbfaeb33750ba_JaffaCakes118.exe 33 PID 696 wrote to memory of 2072 696 6f454cf4b6006fd3f5ddbfaeb33750ba_JaffaCakes118.exe 33 PID 3040 wrote to memory of 2760 3040 TrueImage.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f454cf4b6006fd3f5ddbfaeb33750ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6f454cf4b6006fd3f5ddbfaeb33750ba_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\Delete.BAT2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2072
-
-
C:\Windows\TrueImage.exeC:\Windows\TrueImage.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214B
MD5ae6375808b087cda6c70d46a896c1a66
SHA10990f9b25ae4101007df8b1f381fcee5a8b4f667
SHA256293f55a208b7e502b5747264ff2a799c8be52c5596ece77aa24b87195a7a850e
SHA51273e121d08955df8e9fbc500078276aabbe4aa3745507e0c3756cc01cec646f0820813086b5a2efa86e4b6c45054db14e88515f1e7f0a8dcd64fda3fbfb690e01
-
Filesize
976KB
MD56f454cf4b6006fd3f5ddbfaeb33750ba
SHA1c19b515767c21ba8a2647182567064a11a2cbf90
SHA2562d50c7a4049bca0257fbeef74aaa4f50888276a83b88f050e79364e7383d6cdd
SHA51208fffeb178f46b88fba80fe25a81a952095e7922c3aaf58133c5fa3eeac14f93e263d8fb78b88b6869b2bf82c2555060bce08274eaac05f2df52f47094b8fcc9