Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 14:20 UTC
Static task
static1
Behavioral task
behavioral1
Sample
746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe
-
Size
60KB
-
MD5
746b9e5155240a98d1d748a9a9eae25b
-
SHA1
7da112336eb3540b769d467bbddbce1ccba316c3
-
SHA256
e5789d70cecc0a47d8fe57db9afa3c6425dc2765ef69529f4474200394934e5e
-
SHA512
aeddbca251aaa7ad1359c3d282461c5b7eb1de69773c53e34a27d5f004d58ee77dce23fbf35c35680815063bfaf89745edfa7849613d02e889165a771fe79884
-
SSDEEP
1536:BU8Cnt9E7sSLOi69qFoc3OBWzr48A+d5CPr/50GmbQnCzw4/XliV:G8cTn+dYWzr48ndUj50GkQCzXfU
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Drivers\CelInDriver.sys 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\CelInDrv\ImagePath = "\\??\\C:\\Windows\\system32\\Drivers\\CelInDriver.sys" 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2200 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\xpdhcp.dll 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\xpdhcp.dll 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2200 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe 2200 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe 2200 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe 2200 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe 2200 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe 2200 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2200 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2200 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe Token: SeDebugPrivilege 2200 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe Token: SeDebugPrivilege 2200 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2200 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2200 wrote to memory of 1324 2200 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe 21 PID 2200 wrote to memory of 2596 2200 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe 28 PID 2200 wrote to memory of 2596 2200 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe 28 PID 2200 wrote to memory of 2596 2200 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe 28 PID 2200 wrote to memory of 2596 2200 746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe"2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\746b9e5155240a98d1d748a9a9eae25b_JaffaCakes118.exe3⤵
- System Location Discovery: System Language Discovery
PID:2596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD50d4d79cd43ea8aa3446c31145391e210
SHA17cdfebf7cce7375b872b3facc24a8ffb8378a58d
SHA256cd5d40c5aba67d6e3326efe4a96d03d1d32097b516db1cfeadabed1fcbfe5006
SHA51232328a89e9b37b6153a68006e2d6573a1d4d48d5c055d0f1a8f9547208ea42b74a33b1ebc792ac17d99a88f5fe57988e1b93176d1721f708f4ab44f39b32c95d