Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
22s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 22:41
Behavioral task
behavioral1
Sample
01916d1101d271b59dedef6fb584bf78_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
01916d1101d271b59dedef6fb584bf78_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
01916d1101d271b59dedef6fb584bf78_JaffaCakes118.exe
-
Size
86KB
-
MD5
01916d1101d271b59dedef6fb584bf78
-
SHA1
e908e8b0141c8c3e8286e4b69fd9e0c8d813caf0
-
SHA256
917330cf287969d1d1be4b0b3258a4468c16870afb7a617de30c0c64968c37b6
-
SHA512
3ea9f9b2d509e5b7272e63de87a14ce9e04aac131ed00195b0d92b01d87c66425cf2ec42fe5f5828d71489c27a0a4f670d883060bbb78818793d8ea68a5e6426
-
SSDEEP
1536:fSTjtALMd6bE9XJuFrvJ70z+l9Cj3WCW2EW5ZklH51UmxIyYclkOZB4NgbeG/H4I:U6jI9XJy7rCj3WCW2EW5+lEy28C2bD/l
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x00070000000120fe-17.dat aspack_v212_v242 -
Executes dropped EXE 4 IoCs
pid Process 1824 MSWDM.EXE 2704 MSWDM.EXE 2756 01916D1101D271B59DEDEF6FB584BF78_JAFFACAKES118.EXE 2492 MSWDM.EXE -
Loads dropped DLL 2 IoCs
pid Process 2704 MSWDM.EXE 2704 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 01916d1101d271b59dedef6fb584bf78_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 01916d1101d271b59dedef6fb584bf78_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 01916d1101d271b59dedef6fb584bf78_JaffaCakes118.exe File opened for modification C:\Windows\dev9A7B.tmp 01916d1101d271b59dedef6fb584bf78_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01916d1101d271b59dedef6fb584bf78_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSWDM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSWDM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01916D1101D271B59DEDEF6FB584BF78_JAFFACAKES118.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2704 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1644 wrote to memory of 1824 1644 01916d1101d271b59dedef6fb584bf78_JaffaCakes118.exe 29 PID 1644 wrote to memory of 1824 1644 01916d1101d271b59dedef6fb584bf78_JaffaCakes118.exe 29 PID 1644 wrote to memory of 1824 1644 01916d1101d271b59dedef6fb584bf78_JaffaCakes118.exe 29 PID 1644 wrote to memory of 1824 1644 01916d1101d271b59dedef6fb584bf78_JaffaCakes118.exe 29 PID 1644 wrote to memory of 2704 1644 01916d1101d271b59dedef6fb584bf78_JaffaCakes118.exe 30 PID 1644 wrote to memory of 2704 1644 01916d1101d271b59dedef6fb584bf78_JaffaCakes118.exe 30 PID 1644 wrote to memory of 2704 1644 01916d1101d271b59dedef6fb584bf78_JaffaCakes118.exe 30 PID 1644 wrote to memory of 2704 1644 01916d1101d271b59dedef6fb584bf78_JaffaCakes118.exe 30 PID 2704 wrote to memory of 2756 2704 MSWDM.EXE 31 PID 2704 wrote to memory of 2756 2704 MSWDM.EXE 31 PID 2704 wrote to memory of 2756 2704 MSWDM.EXE 31 PID 2704 wrote to memory of 2756 2704 MSWDM.EXE 31 PID 2704 wrote to memory of 2492 2704 MSWDM.EXE 32 PID 2704 wrote to memory of 2492 2704 MSWDM.EXE 32 PID 2704 wrote to memory of 2492 2704 MSWDM.EXE 32 PID 2704 wrote to memory of 2492 2704 MSWDM.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\01916d1101d271b59dedef6fb584bf78_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\01916d1101d271b59dedef6fb584bf78_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1824
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev9A7B.tmp!C:\Users\Admin\AppData\Local\Temp\01916d1101d271b59dedef6fb584bf78_JaffaCakes118.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\01916D1101D271B59DEDEF6FB584BF78_JAFFACAKES118.EXE
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev9A7B.tmp!C:\Users\Admin\AppData\Local\Temp\01916D1101D271B59DEDEF6FB584BF78_JAFFACAKES118.EXE!3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2492
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD56d787fdf93de266ce25378fb362df011
SHA100ed94c8d2041eecc24a69fe99e0fdbb043fafe3
SHA25672fc3fdced04ed8de4758a47d4ec124b6ec147da3841a61a1b411a158011eca5
SHA5120a2c992eb130d4ef87b4f142fd3f823f514a6724632e985824caf05e69799db99154cac9bc19c8b960ea029f96d09a8586d4117b1052950f8d56df39d0f752f2
-
Filesize
48KB
MD5bf39b38a8a79d77299bf9670104a758b
SHA1746f24910b0d0199442ac9ef225035c45268ea67
SHA256cb0fc08fe710ac42962a50848104274e8c12bed10a2bcb8e432cad1fb78a7c50
SHA5122ac06df08b1aa539041f16fb15fa6ed47894db9d21e25c5acbda246292b9c3e38b3a9128f02b0cc6799eac9d26dc063596b7bca5a6c1b8c75d73bb04072f937e