Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
17s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 07:12
Static task
static1
Behavioral task
behavioral1
Sample
775336da181d11c262497cb1d171f144_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
775336da181d11c262497cb1d171f144_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
775336da181d11c262497cb1d171f144_JaffaCakes118.exe
-
Size
393KB
-
MD5
775336da181d11c262497cb1d171f144
-
SHA1
daaff16fb08aa47b3c8fc7c3797e0c7da49cd20a
-
SHA256
46c6e596250e0b993f0119e2d619cb4163bc543afc135c956cc196f3c6af0302
-
SHA512
d146b1c711fbedd7d72d9ab1fe91a261adc77a3ff74e30ff060843b76ba6efbcc855308c9f99b2e853a9b4f80ee19b465cb2983671edbc0c73af7705ab41650b
-
SSDEEP
12288:Uutrzh9xOXkYVfkeAlWRURCDSQBOM5TiRz:Uutr5OUYVce2WRURQmQiRz
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 775336da181d11c262497cb1d171f144_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2668 2916 775336da181d11c262497cb1d171f144_JaffaCakes118.exe 30 PID 2916 wrote to memory of 2668 2916 775336da181d11c262497cb1d171f144_JaffaCakes118.exe 30 PID 2916 wrote to memory of 2668 2916 775336da181d11c262497cb1d171f144_JaffaCakes118.exe 30 PID 2916 wrote to memory of 2668 2916 775336da181d11c262497cb1d171f144_JaffaCakes118.exe 30 PID 2916 wrote to memory of 2668 2916 775336da181d11c262497cb1d171f144_JaffaCakes118.exe 30 PID 2916 wrote to memory of 2668 2916 775336da181d11c262497cb1d171f144_JaffaCakes118.exe 30 PID 2916 wrote to memory of 2668 2916 775336da181d11c262497cb1d171f144_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2684 2668 mshta.exe 31 PID 2668 wrote to memory of 2684 2668 mshta.exe 31 PID 2668 wrote to memory of 2684 2668 mshta.exe 31 PID 2668 wrote to memory of 2684 2668 mshta.exe 31 PID 2668 wrote to memory of 2684 2668 mshta.exe 31 PID 2668 wrote to memory of 2684 2668 mshta.exe 31 PID 2668 wrote to memory of 2684 2668 mshta.exe 31 PID 2916 wrote to memory of 2828 2916 775336da181d11c262497cb1d171f144_JaffaCakes118.exe 33 PID 2916 wrote to memory of 2828 2916 775336da181d11c262497cb1d171f144_JaffaCakes118.exe 33 PID 2916 wrote to memory of 2828 2916 775336da181d11c262497cb1d171f144_JaffaCakes118.exe 33 PID 2916 wrote to memory of 2828 2916 775336da181d11c262497cb1d171f144_JaffaCakes118.exe 33 PID 2916 wrote to memory of 2828 2916 775336da181d11c262497cb1d171f144_JaffaCakes118.exe 33 PID 2916 wrote to memory of 2828 2916 775336da181d11c262497cb1d171f144_JaffaCakes118.exe 33 PID 2916 wrote to memory of 2828 2916 775336da181d11c262497cb1d171f144_JaffaCakes118.exe 33 PID 2828 wrote to memory of 2520 2828 mshta.exe 34 PID 2828 wrote to memory of 2520 2828 mshta.exe 34 PID 2828 wrote to memory of 2520 2828 mshta.exe 34 PID 2828 wrote to memory of 2520 2828 mshta.exe 34 PID 2828 wrote to memory of 2520 2828 mshta.exe 34 PID 2828 wrote to memory of 2520 2828 mshta.exe 34 PID 2828 wrote to memory of 2520 2828 mshta.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\775336da181d11c262497cb1d171f144_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\775336da181d11c262497cb1d171f144_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" "javascript:new ActiveXObject('WScript.Shell').Run('Devourer_3.0_15025121807012.bat -Open',0);window.close()"2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Devourer_3.0_15025121807012.bat" -Open"3⤵
- System Location Discovery: System Language Discovery
PID:2684
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" "javascript:new ActiveXObject('WScript.Shell').Run('Devourer_3.0_15025121807012.bat',0);window.close()"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Devourer_3.0_15025121807012.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2520
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
286KB
MD538f8fccb9008928261f0545e2079c7fb
SHA1f2ee896cd0a854451269b05a383f46806cba41b7
SHA256f25f2850ae1f03a52a8dbf21ef2f3ed4470d418560e8272b2fefd42fcd74e1af
SHA512991ff7cde6db9cea6e020a00f08f56f45901af8da315ec94ad06f9483af82ff164b9d625ef13235e2b6cbddb1a055739c1b5ce824f775879bb7953216a30dd2c