Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe
-
Size
195KB
-
MD5
02d323abe2b0600230ebfbe5e674c034
-
SHA1
80d13e2e1c4295aa365fe5af06045bc67982f71a
-
SHA256
e5f113c432b443b4f84db4441e8b3994eba09e80417169089366576bf726003e
-
SHA512
7e6688828cefc05d024f5b7b5b63c84268a01af4dff0419f357afb142ca4d0a3b5092d40dece595f4c65569ec4ba93118a42a0b2be8f219bdf93c6c6afa35492
-
SSDEEP
3072:CLMD1TkayEYl3DZw4vtx6m2wk/P0DBLdCHYJdPS+QomJHj85xWk0w6jZr:B1TzaTZwqWp/PeNdSYeJQJ0FZr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2592 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2640 evysi.exe -
Loads dropped DLL 2 IoCs
pid Process 2716 02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe 2716 02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\{ED11ECDF-386D-F843-F7D3-B2C541DFAB30} = "C:\\Users\\Admin\\AppData\\Roaming\\Igoqva\\evysi.exe" evysi.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2716 set thread context of 2592 2716 02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Privacy 02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe 2640 evysi.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2716 02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2640 2716 02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe 30 PID 2716 wrote to memory of 2640 2716 02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe 30 PID 2716 wrote to memory of 2640 2716 02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe 30 PID 2716 wrote to memory of 2640 2716 02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe 30 PID 2640 wrote to memory of 1112 2640 evysi.exe 19 PID 2640 wrote to memory of 1112 2640 evysi.exe 19 PID 2640 wrote to memory of 1112 2640 evysi.exe 19 PID 2640 wrote to memory of 1112 2640 evysi.exe 19 PID 2640 wrote to memory of 1112 2640 evysi.exe 19 PID 2640 wrote to memory of 1168 2640 evysi.exe 20 PID 2640 wrote to memory of 1168 2640 evysi.exe 20 PID 2640 wrote to memory of 1168 2640 evysi.exe 20 PID 2640 wrote to memory of 1168 2640 evysi.exe 20 PID 2640 wrote to memory of 1168 2640 evysi.exe 20 PID 2640 wrote to memory of 1216 2640 evysi.exe 21 PID 2640 wrote to memory of 1216 2640 evysi.exe 21 PID 2640 wrote to memory of 1216 2640 evysi.exe 21 PID 2640 wrote to memory of 1216 2640 evysi.exe 21 PID 2640 wrote to memory of 1216 2640 evysi.exe 21 PID 2640 wrote to memory of 1516 2640 evysi.exe 25 PID 2640 wrote to memory of 1516 2640 evysi.exe 25 PID 2640 wrote to memory of 1516 2640 evysi.exe 25 PID 2640 wrote to memory of 1516 2640 evysi.exe 25 PID 2640 wrote to memory of 1516 2640 evysi.exe 25 PID 2640 wrote to memory of 2716 2640 evysi.exe 29 PID 2640 wrote to memory of 2716 2640 evysi.exe 29 PID 2640 wrote to memory of 2716 2640 evysi.exe 29 PID 2640 wrote to memory of 2716 2640 evysi.exe 29 PID 2640 wrote to memory of 2716 2640 evysi.exe 29 PID 2716 wrote to memory of 2592 2716 02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2592 2716 02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2592 2716 02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2592 2716 02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2592 2716 02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2592 2716 02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2592 2716 02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2592 2716 02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2592 2716 02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe 31 PID 2640 wrote to memory of 3000 2640 evysi.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\02d323abe2b0600230ebfbe5e674c034_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Roaming\Igoqva\evysi.exe"C:\Users\Admin\AppData\Roaming\Igoqva\evysi.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2640
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc2469d9a.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2592
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1516
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-144605329-1239222449504283378260358053931261247964484153242911755-1876774162"1⤵PID:3000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD500905fb98ceac4a34f5704cbe14b431b
SHA1c9f9adbd39dd7f157f0d43b6a7674370a6d90bcf
SHA2561df645c310696bbfdd2ae97b65c13f8cb469e24f2834075eded7b37748623da0
SHA512f7bc30edeef359a72a25a98f9a26f9eb37f58ff148759caa312dbc68dffbd066dabfcee75181fb52091e1b52b8fe4e281a31f19d93d7a5f22370580c129c8a15
-
Filesize
195KB
MD587a22c2046cced967173d2e17027fc09
SHA1065d4751ff20d505b1016858e2eb828cef4b6bb6
SHA256b1d684e6c2045bfc3deffd0799f54a930d40cb0e152bad052e8a6eacd893478a
SHA512e6231c545c1925ba3a04cb68c19ee411479134ae7131502fb83ba7873de6bcf1677e7f474493ab66c66c1e338ba93a0501f2ef5df43f1d0001b10256aac68df8