Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 21:46
Static task
static1
Behavioral task
behavioral1
Sample
87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe
-
Size
52KB
-
MD5
87cc11306fa0823ef90af7aa97dc43f7
-
SHA1
c9410407f5d01cf0823fbd710c54beca1be39ced
-
SHA256
1aaae5d8194f49ae5f0d6178ae5d64a74568dd2821e3b68c50f799a0cabfff2e
-
SHA512
977a6b6b94ca5f0f5ba22d10a9d34cf5049e5420f806aea8404670b8b92217fb1c45ef7ed803663cdafdc6b098146ccf0236c324862f2cd0c932efa9014078ab
-
SSDEEP
768:S4EZAy6a2UTXlW9k8cb1A8AHFyKGzrvApxJhHTYcfnFJeyv58n:S4e6a2aVW9k8s1SkProp5vvF8yB4
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2832 svchost.exe 2740 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 3024 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 3024 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\Startup = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe" 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\P: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2420 set thread context of 3024 2420 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 31 PID 2832 set thread context of 2740 2832 svchost.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2420 wrote to memory of 3024 2420 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 31 PID 2420 wrote to memory of 3024 2420 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 31 PID 2420 wrote to memory of 3024 2420 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 31 PID 2420 wrote to memory of 3024 2420 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 31 PID 2420 wrote to memory of 3024 2420 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 31 PID 2420 wrote to memory of 3024 2420 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 31 PID 2420 wrote to memory of 3024 2420 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 31 PID 2420 wrote to memory of 3024 2420 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 31 PID 2420 wrote to memory of 3024 2420 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 31 PID 2420 wrote to memory of 3024 2420 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 31 PID 2420 wrote to memory of 3024 2420 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 31 PID 2420 wrote to memory of 3024 2420 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 31 PID 3024 wrote to memory of 2832 3024 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 33 PID 3024 wrote to memory of 2832 3024 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 33 PID 3024 wrote to memory of 2832 3024 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 33 PID 3024 wrote to memory of 2832 3024 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 33 PID 2832 wrote to memory of 2740 2832 svchost.exe 35 PID 2832 wrote to memory of 2740 2832 svchost.exe 35 PID 2832 wrote to memory of 2740 2832 svchost.exe 35 PID 2832 wrote to memory of 2740 2832 svchost.exe 35 PID 2832 wrote to memory of 2740 2832 svchost.exe 35 PID 2832 wrote to memory of 2740 2832 svchost.exe 35 PID 2832 wrote to memory of 2740 2832 svchost.exe 35 PID 2832 wrote to memory of 2740 2832 svchost.exe 35 PID 2832 wrote to memory of 2740 2832 svchost.exe 35 PID 2832 wrote to memory of 2740 2832 svchost.exe 35 PID 2832 wrote to memory of 2740 2832 svchost.exe 35 PID 2832 wrote to memory of 2740 2832 svchost.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exeC:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe4⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD587cc11306fa0823ef90af7aa97dc43f7
SHA1c9410407f5d01cf0823fbd710c54beca1be39ced
SHA2561aaae5d8194f49ae5f0d6178ae5d64a74568dd2821e3b68c50f799a0cabfff2e
SHA512977a6b6b94ca5f0f5ba22d10a9d34cf5049e5420f806aea8404670b8b92217fb1c45ef7ed803663cdafdc6b098146ccf0236c324862f2cd0c932efa9014078ab