Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
783734faf025af9f96ec3c75a814b932
-
SHA1
27a99d03077e8c837e67e1bcacde05f5beed5552
-
SHA256
b5e9400bade530592eac7c1e27abfbd7a7c5fc818f1f961a13d647b9f7713e34
-
SHA512
761e8ccd0939088933839170e97857d8578240463ba68a74c9f6717c8e6d6762062ba684b1b4cecacfbcd6bf2e1759ab586d7cd43611fdddda0fe99803e9ffe9
-
SSDEEP
49152:mcaGsO9wUwqvjdVyFM545r/mIRvn0udXuZP+uENndqO8xuwqSSBkpllbnW:mDF7dqvjdVyFM545r/mk/0udXuZP+uEV
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2120 dllhost.exe 2376 N3TexViewer Tr 1.1 SqSKo.exe -
Loads dropped DLL 9 IoCs
pid Process 2240 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe 2240 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe 2120 dllhost.exe 2240 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe 2240 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe 2668 WerFault.exe 2668 WerFault.exe 2668 WerFault.exe 2668 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\DLLHost = "\"C:\\Users\\Admin\\AppData\\Roaming\\dllhost.exe\"" reg.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2668 2120 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2676 reg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2240 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2240 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2240 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2120 dllhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2120 dllhost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2120 2240 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe 28 PID 2240 wrote to memory of 2120 2240 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe 28 PID 2240 wrote to memory of 2120 2240 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe 28 PID 2240 wrote to memory of 2120 2240 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe 28 PID 2240 wrote to memory of 2376 2240 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe 29 PID 2240 wrote to memory of 2376 2240 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe 29 PID 2240 wrote to memory of 2376 2240 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe 29 PID 2240 wrote to memory of 2376 2240 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe 29 PID 2120 wrote to memory of 1256 2120 dllhost.exe 30 PID 2120 wrote to memory of 1256 2120 dllhost.exe 30 PID 2120 wrote to memory of 1256 2120 dllhost.exe 30 PID 2120 wrote to memory of 1256 2120 dllhost.exe 30 PID 1256 wrote to memory of 2672 1256 cmd.exe 32 PID 1256 wrote to memory of 2672 1256 cmd.exe 32 PID 1256 wrote to memory of 2672 1256 cmd.exe 32 PID 1256 wrote to memory of 2672 1256 cmd.exe 32 PID 2672 wrote to memory of 2676 2672 cmd.exe 33 PID 2672 wrote to memory of 2676 2672 cmd.exe 33 PID 2672 wrote to memory of 2676 2672 cmd.exe 33 PID 2672 wrote to memory of 2676 2672 cmd.exe 33 PID 2120 wrote to memory of 2668 2120 dllhost.exe 34 PID 2120 wrote to memory of 2668 2120 dllhost.exe 34 PID 2120 wrote to memory of 2668 2120 dllhost.exe 34 PID 2120 wrote to memory of 2668 2120 dllhost.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Roaming\dllhost.exeC:\Users\Admin\AppData\Roaming\dllhost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\cmd.execmd /c system.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V DLLHost /D "\"C:\Users\Admin\AppData\Roaming\dllhost.exe\"" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V DLLHost /D "\"C:\Users\Admin\AppData\Roaming\dllhost.exe\"" /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2676
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 4363⤵
- Loads dropped DLL
- Program crash
PID:2668
-
-
-
C:\Users\Admin\AppData\Roaming\N3TexViewer Tr 1.1 SqSKo.exe"C:\Users\Admin\AppData\Roaming\N3TexViewer Tr 1.1 SqSKo.exe"2⤵
- Executes dropped EXE
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD528f4505278ee06a7206d6056903ca5b6
SHA17c882c069096696a15976bee74f0922f81aa38ae
SHA2560f63764b7a66b7436fc4f67d6d8e28a4b844643bb78adc1330a552d8421b8a88
SHA512ca81dae7a6fc531c2fb9170cba6ffe8669b1bd7907396c735c72951e57960070d2c2e668efad714b2391c3f3bfc04efd84fb7046a587d7ddb6b2b5248869dd0c
-
Filesize
780KB
MD5cc52b2c29431f5fda6e2eee9c9a8b099
SHA165772235f02aa6e7213812c276a19cdeee8e7143
SHA256194e8821f67ff5d7f726932ff00cbe993e28ae97ea2b9b3b91417ed5f173bbfe
SHA512ad13372b55abe5d663eb24958f95c8eef7d1759c22b2413414a62ded0898e323458f7723bbd8a0ff2cf2ed93e05898f75456ac1a5b498c2913367111a2098710
-
Filesize
457KB
MD52f856ba5cab53b5cdfe4e3cc7ebfc624
SHA104c168d95a32966bf05eb52850a0e6372ad8a7c1
SHA256c71b7742e0f4fbeb55bedf2b41e41225c28cd00c91bd7021c700069c1d24384d
SHA512df5566feb26cfe1a1df9a25c07452e2c6cda773c1b91ce1808cce3244db272b4e445698d5703d6d6b7db98888a1e09840c9d497d61d7974e530571713a6d85d6
-
Filesize
582KB
MD587f2f013ff03c5caac5ba928d54b63b3
SHA188c86f599b53461b863c21c93f66f216995111f9
SHA256707cb25f9be2f339300651b783f54b83f57941dd7380eb15a5b195dc424678da
SHA512a04b5aa005fa7f6901f936ce3de44b0955e641ba00a3ffae2c63e27279c61f119e73c1b684a014dfe9df8570971ac13f1ae57dd77de2a75eebca327de1610626