Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 10:45
Static task
static1
Behavioral task
behavioral1
Sample
73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe
-
Size
178KB
-
MD5
73b7ddabf675ca2d58a79b3edf45da32
-
SHA1
ae6fc7ea40271f1805a9c435cd37ef93f26eb478
-
SHA256
6ecd9e4891ee35776f4094870f5fec73e1912b9b63629268a92261674c6eba6b
-
SHA512
2d57deb64681f1d747461968b16b5fa82a8eb81658335d039a8118329ce31ac231472124362520a822770d65f482c14beb412626756825371b3aa9e50cd726ed
-
SSDEEP
3072:u0Gox2PD7tC6PN5k/WqGIvMEhc+5n6CdJK8GcBHNmjoH90DGzhQ:6ogPGWqGU/n6CbzGcBIMHIGl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1932 Ggyzaa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\TJHTHX1O7X = "C:\\Windows\\Ggyzaa.exe" Ggyzaa.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe File created C:\Windows\Ggyzaa.exe 73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe File opened for modification C:\Windows\Ggyzaa.exe 73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ggyzaa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main Ggyzaa.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International Ggyzaa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe 1932 Ggyzaa.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1932 2932 73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe 30 PID 2932 wrote to memory of 1932 2932 73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe 30 PID 2932 wrote to memory of 1932 2932 73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe 30 PID 2932 wrote to memory of 1932 2932 73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe 30 PID 2932 wrote to memory of 1932 2932 73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe 30 PID 2932 wrote to memory of 1932 2932 73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe 30 PID 2932 wrote to memory of 1932 2932 73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\Ggyzaa.exeC:\Windows\Ggyzaa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD573b7ddabf675ca2d58a79b3edf45da32
SHA1ae6fc7ea40271f1805a9c435cd37ef93f26eb478
SHA2566ecd9e4891ee35776f4094870f5fec73e1912b9b63629268a92261674c6eba6b
SHA5122d57deb64681f1d747461968b16b5fa82a8eb81658335d039a8118329ce31ac231472124362520a822770d65f482c14beb412626756825371b3aa9e50cd726ed
-
Filesize
372B
MD5a98d766bb3743cd6a1e1162c8331797a
SHA19aa579ad3b9b75fc40adc918eddea49a7246c3ef
SHA25610684820c206664fde9e516911ce5b521578eb756480870141aed24c8006e90e
SHA512e6d412bd0d0a336f3669e765fb15c5d6af361c3396e99fbe4d4c794bfebf8094ad821c7b83460660061ac800243c0831aa6a0f76456b53f3831dc19192d4b1f4