Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
772e36e34a1...18.exe
windows7-x64
772e36e34a1...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ch.dll
windows7-x64
3$PLUGINSDI...ch.dll
windows10-2004-x64
3cwd.exe
windows7-x64
3cwd.exe
windows10-2004-x64
3htmlayout.dll
windows7-x64
7htmlayout.dll
windows10-2004-x64
7winzipninfo.html
windows7-x64
3winzipninfo.html
windows10-2004-x64
3Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 06:16
Behavioral task
behavioral1
Sample
72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/VPatch.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/VPatch.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
cwd.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
cwd.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
htmlayout.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
htmlayout.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
winzipninfo.html
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
winzipninfo.html
Resource
win10v2004-20240709-en
General
-
Target
72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe
-
Size
2.6MB
-
MD5
72e36e34a1f4e269d07d108d82bdf2a0
-
SHA1
89b371c36fe9738362ee2d0cc104fdb202314826
-
SHA256
c79a261b857b6139662023863d2f65f39f0e13720ffe557d410471565b6407a0
-
SHA512
f333b741fd2e3b773afb6b5c2de91854f58cd439602264e7c197eaac074e5063e42b1c86e98e266fd0d46de410862087d788e834776ad2dcc567b9647a67e624
-
SSDEEP
49152:1voJUoKj1+9KXy+GxnekmZkEMbdUaKLBOihl/3p0842/YKEkpEQ3:1vol84oIepkEMZ4cQl/3p0epN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2692 cwd.exe -
Loads dropped DLL 6 IoCs
pid Process 2040 72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe 2040 72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe 2040 72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe 2040 72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe 2040 72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe 2040 72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cwd.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\59B0CDBCE5A38D97DBED9920A83EE750CB1833F1 72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\59B0CDBCE5A38D97DBED9920A83EE750CB1833F1\Blob = 03000000010000001400000059b0cdbce5a38d97dbed9920a83ee750cb1833f12000000001000000190200003082021530820182a00302010202101ef8847394c524a24bde31b3e6def2d7300906052b0e03021d0500301a311830160603550403130f4f7265676f6e61536f667477617265301e170d3131313132383038323931365a170d3339313233313233353935395a301a311830160603550403130f4f7265676f6e61536f66747761726530819f300d06092a864886f70d010101050003818d0030818902818100ddc5b69f7f06dd8db5ef3e29a8c39073aabb7d93f125f3bccf9134d0c7b138a838519c4e8f0679dbe59e3d95e18e0b25a9da84fafeea79a56489b33e0b59b5e39b39a767c6929468fca6e62e8e78f853319d809f7d5d23877e88de6310c9c5bd1fcdb7be5453aff4891a04a3f9b5bd0dbbc9b21a6b1cb77b6421c8c8265ab0090203010001a364306230130603551d25040c300a06082b06010505070303304b0603551d0104443042801094c3deb42ea2c46deb625ddead97e3b9a11c301a311830160603550403130f4f7265676f6e61536f66747761726582101ef8847394c524a24bde31b3e6def2d7300906052b0e03021d05000381810071aa5324c2018d4645d16344cf75359e75f69bb758ac5c0a56edd9ad606614449b9df0bbbf10a08b914deb39cd742fca3e907f8d08109510e68277c2951e2865331f011ba3d1901782c22b67b8ac6eee2a9187a18fed74b725ad98083b2e37c1bd2a193d932d35bc9166041dd933b19ad03fe850f102c27b6670452121303ba7 72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2692 2040 72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe 29 PID 2040 wrote to memory of 2692 2040 72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe 29 PID 2040 wrote to memory of 2692 2040 72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe 29 PID 2040 wrote to memory of 2692 2040 72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Roaming\zarchive\cwd.exe"C:\Users\Admin\AppData\Roaming\zarchive\cwd.exe" /q /c start /b /d "C:\Users\Admin\AppData\Roaming\zarchive" zarchive.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
386KB
MD553aeeaf4e7f12b8e91b3a474cafb4115
SHA1b90f3887c035b47fde7280bcec91ce273fbc8f7f
SHA256c95c0dcebfcb96020248be1dbe04752acdca6971ed81b308dba302b713882d29
SHA5126ef041f581046dddc58608c9a8ff800eaf4355328ec5132ecc1345fdfbae97b04a88f2b4ab26989a33c4bf2e24f81cb0b9339a58d4e54f6831dd5cab78f42fc1
-
Filesize
10KB
MD5cb589d300ffc4e38183880a476eb5aee
SHA13c7828ebabbd53305ca7dead9d75858a87cfaf71
SHA256b40bf86e3522e4504dca095721040d1b143438076a5d299210b654f38f86aabf
SHA512c3b453c997a8a9fecb2decfe65bdc2810e79ac81b7e9dfa960c05efecd3016fe8f3f20e06b49abdc4112f8e948856ea0fbaccd2c8f5e45f03242d839ccb1cd1e
-
Filesize
7KB
MD5b2a8be8de58cf1273d0992fd5da7cb2f
SHA1af4fa16c2bc91a91b72de0e636dafcdc2f894044
SHA2566b161a1e90516f1f53e69aec387b5f59b2bdedf19cb4eee6f7ade2e82c0a7173
SHA512b1b0bd40d26d581a0056cc4cece07a929d28e831209017ee3ebfc3d429409842ef3720c0b6ebbd26966e7d647a8da389e317e1152041ca5a0dc78528d733c151