Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe
-
Size
94KB
-
MD5
712a8410eaaded45fe2c0520c3be6862
-
SHA1
02001f0122c72be8cb89022f659fd3d902201ed6
-
SHA256
6537f5c437525c989131cd29f1279b89519d22f6e5425eed03ece1570da63f15
-
SHA512
57e64a9fa27ccb524783172470c42c21262c5df7267666842f20a779360d861dc6166ebffa0503e1e3b2033340572104835205476345a1315c1dd5f0924fbc6b
-
SSDEEP
1536:7xdfvoglDRkdLBiZChfjAzik8h27chGPE1xIaiCOmaxhm+Gie7lYRq+hoEEJQ5Gb:7rfvo2FGLoWAztv7cEPEP9iCO9xhm+GZ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\Program Files\\Windows Media Player\\svchost.exe," 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2464 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 608 svchost.exe -
Loads dropped DLL 3 IoCs
pid Process 388 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe 388 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe 608 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\PDLL.dll svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Windows Media Player\svchost.exe 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Media Player\svchost.exe 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 388 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe 388 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe 388 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe 388 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe 388 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe 388 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe 388 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe 388 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe 388 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe 388 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 608 svchost.exe 608 svchost.exe 608 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 388 wrote to memory of 2464 388 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe 31 PID 388 wrote to memory of 2464 388 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe 31 PID 388 wrote to memory of 2464 388 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe 31 PID 388 wrote to memory of 2464 388 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe 31 PID 388 wrote to memory of 608 388 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe 33 PID 388 wrote to memory of 608 388 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe 33 PID 388 wrote to memory of 608 388 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe 33 PID 388 wrote to memory of 608 388 712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\712a8410eaaded45fe2c0520c3be6862_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$cD9EB.tmp.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2464
-
-
C:\Program Files\Windows Media Player\svchost.exe"C:\Program Files\Windows Media Player\svchost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261B
MD5ecc4ca2584fc2efba9a92adf709a56d6
SHA1745fad26467cf87bb77e1d84da92d045343319bf
SHA2561d526b838b0f273bf8427b420881bc232cfac358d1bad9aaa48b5f581863a126
SHA512574748ba4e7528b8b0d52893abf332ee503aac54468e03da3c424fbb9fc402d875336adf40595ac12c7659b760dba2660389cede88c0d738fe04cac3c0ce64e9
-
Filesize
94KB
MD5712a8410eaaded45fe2c0520c3be6862
SHA102001f0122c72be8cb89022f659fd3d902201ed6
SHA2566537f5c437525c989131cd29f1279b89519d22f6e5425eed03ece1570da63f15
SHA51257e64a9fa27ccb524783172470c42c21262c5df7267666842f20a779360d861dc6166ebffa0503e1e3b2033340572104835205476345a1315c1dd5f0924fbc6b
-
Filesize
136KB
MD58094a47d7aa849d45c2f90fd4d2b4d41
SHA150fe4a5663c15e6d41c49d0a5adc1c5ab4e7eb87
SHA2569db34dc09856f80ed7b07631979b01507dc307fcb6bd4a9ca1d7662880946edb
SHA51258c441ec4e0e126594dd17397c04602c0dcb0198920487434b5da4f924cd2bf22b56e4e85a7aadb5d3502b053da539a65aa9b6ea116e17f5a8eb7c792c8d5b93