Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 00:03
Static task
static1
Behavioral task
behavioral1
Sample
824199573c216eb291634340682e673e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
824199573c216eb291634340682e673e_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
824199573c216eb291634340682e673e_JaffaCakes118.exe
-
Size
93KB
-
MD5
824199573c216eb291634340682e673e
-
SHA1
4bebc107a323cd17cc1b70b3b4ae804c7fb09ba5
-
SHA256
b152f7bd3eb844c0df044a72c44b83f6a01ec7cab3a4ede1e3e8053554498031
-
SHA512
ee2f7a2f67c730eb111e1d27d0ee879558473197b0a44b57cc6c62f6b278445e58e1487e13ce62bf87260b5b709daefe5ab031fcea452ce7bd3bdb619adfe43d
-
SSDEEP
1536:JcHB9bZy2vYmcPBEbnm3o7Wxwh+2qIZv4eVLSwl:JcHB9bZyGcPBEbn/7JhDweJ5l
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2308 fffffffffffffffffff.exe 2404 fffffffffffffffffff.exe -
Loads dropped DLL 7 IoCs
pid Process 2152 824199573c216eb291634340682e673e_JaffaCakes118.exe 2152 824199573c216eb291634340682e673e_JaffaCakes118.exe 2308 fffffffffffffffffff.exe 2292 WerFault.exe 2292 WerFault.exe 2292 WerFault.exe 2292 WerFault.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2308 set thread context of 2404 2308 fffffffffffffffffff.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2292 2404 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fffffffffffffffffff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fffffffffffffffffff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 824199573c216eb291634340682e673e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2308 2152 824199573c216eb291634340682e673e_JaffaCakes118.exe 30 PID 2152 wrote to memory of 2308 2152 824199573c216eb291634340682e673e_JaffaCakes118.exe 30 PID 2152 wrote to memory of 2308 2152 824199573c216eb291634340682e673e_JaffaCakes118.exe 30 PID 2152 wrote to memory of 2308 2152 824199573c216eb291634340682e673e_JaffaCakes118.exe 30 PID 2308 wrote to memory of 2404 2308 fffffffffffffffffff.exe 31 PID 2308 wrote to memory of 2404 2308 fffffffffffffffffff.exe 31 PID 2308 wrote to memory of 2404 2308 fffffffffffffffffff.exe 31 PID 2308 wrote to memory of 2404 2308 fffffffffffffffffff.exe 31 PID 2308 wrote to memory of 2404 2308 fffffffffffffffffff.exe 31 PID 2308 wrote to memory of 2404 2308 fffffffffffffffffff.exe 31 PID 2404 wrote to memory of 2292 2404 fffffffffffffffffff.exe 32 PID 2404 wrote to memory of 2292 2404 fffffffffffffffffff.exe 32 PID 2404 wrote to memory of 2292 2404 fffffffffffffffffff.exe 32 PID 2404 wrote to memory of 2292 2404 fffffffffffffffffff.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\824199573c216eb291634340682e673e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\824199573c216eb291634340682e673e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\fffffffffffffffffff.exe"C:\Users\Admin\AppData\Local\Temp\fffffffffffffffffff.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\fffffffffffffffffff.exe"C:\Users\Admin\AppData\Local\Temp\fffffffffffffffffff.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 884⤵
- Loads dropped DLL
- Program crash
PID:2292
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5efdbde7f0750d45fa352113cca7ba086
SHA1130cbf530c510e7a2fe5acb50df9d35494f4c558
SHA2562b212556f61791c99e5b6bd446ba9aefc7aa7e85d63154fd9ba83d6f96c0c25f
SHA5120ec5657d260e655cdeeeca267cbb666440b0c6f9b19196681f50e06ef042858cb7a592117ca7707a1ebefaf5ee58e9e63cd8afd3d70e66cf6bb022ade5d93127