Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
87s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 22:36
Static task
static1
Behavioral task
behavioral1
Sample
0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe
-
Size
182KB
-
MD5
0177e67dfee61f990472e22859b9caee
-
SHA1
a7b06f425a6d77af315de240f78073064cdd3d38
-
SHA256
2dabd77f0095c4f8856142c94f41561f4484b8fe7ad0daa012bb98024f1b695a
-
SHA512
997e87e05c0703fb8880429f2875ef99bff84a116e099dafa92cc2602850c686bdda28fb36a5eb92c701bf87ca40c96ea27a9dace3bbf7cf3facfc66a4dae727
-
SSDEEP
768:r/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJMU60+ppQ1TTGfLTb:rRsvcdcQjosnvnZ6LQ1E3
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2188 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 3044 0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe 3044 0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF 0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe 2188 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2188 3044 0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe 29 PID 3044 wrote to memory of 2188 3044 0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe 29 PID 3044 wrote to memory of 2188 3044 0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe 29 PID 3044 wrote to memory of 2188 3044 0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0177e67dfee61f990472e22859b9caee_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182KB
MD5f9a3224fc3a1591d2bbf2220ae2ef281
SHA1d9b1f002ce5985518d25898a9110625d11f51f00
SHA256ba90b16619ce98161cc4f784b70beff88a37399d0747b2b3f0c139c668b0d7b4
SHA512f3437ec3568cfb1bf12751f36a4983d729f02d6b1c839f9cac9e52e40266eacfe1f6767261e14ba967c90c99c200467ac7c7240a97b15c4da1f77f1828bc61c5