Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 09:37
Static task
static1
Behavioral task
behavioral1
Sample
859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe
-
Size
3.6MB
-
MD5
859ad0af1ab161183eaa046cd9ce3caf
-
SHA1
4c25c86444cd0ebc1f1cc4d0e2f9fafd4cfc4728
-
SHA256
78e8153fb5c219333faef9c402602ca367e0e99b9ab67186b889445190c1d775
-
SHA512
6c4ec928da4b73e884c936a109965ad0236ef34a96973bfac822063ee1a40b6bf1e50b5c03bfb5ed4cd38e51c2789a5c00f147e544e4fc6269c99a0df2cc8a1b
-
SSDEEP
49152:gi19lGb2ZVGwrmAuZPMZVUsPbS6OeaBYMGEb2MX2PZXZDKENd5FRrEabwH/e:RA2ZgAumZV/bVTMGEbR2P5ZvB4G
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 860 _D826.tmpac7d.exe 2768 AntivirusProtection2012.exe -
Loads dropped DLL 9 IoCs
pid Process 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Security Center = "C:\\Users\\Admin\\AppData\\Roaming\\AV Protection 2012\\securitycenter.exe" 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\AV Protection 2012 = "\"C:\\Users\\Admin\\AppData\\Roaming\\AV Protection 2012\\AntivirusProtection2012.exe\" /STARTUP" 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AntivirusProtection2012.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _D826.tmpac7d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe Token: SeDebugPrivilege 2768 AntivirusProtection2012.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2768 AntivirusProtection2012.exe 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 2768 AntivirusProtection2012.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2768 AntivirusProtection2012.exe 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 2768 AntivirusProtection2012.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2768 AntivirusProtection2012.exe 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2604 wrote to memory of 860 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 31 PID 2604 wrote to memory of 860 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 31 PID 2604 wrote to memory of 860 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 31 PID 2604 wrote to memory of 860 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 31 PID 2604 wrote to memory of 2768 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 33 PID 2604 wrote to memory of 2768 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 33 PID 2604 wrote to memory of 2768 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 33 PID 2604 wrote to memory of 2768 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 33 PID 2604 wrote to memory of 2888 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 34 PID 2604 wrote to memory of 2888 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 34 PID 2604 wrote to memory of 2888 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 34 PID 2604 wrote to memory of 2888 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 34 PID 2604 wrote to memory of 2560 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 36 PID 2604 wrote to memory of 2560 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 36 PID 2604 wrote to memory of 2560 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 36 PID 2604 wrote to memory of 2560 2604 859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\859ad0af1ab161183eaa046cd9ce3caf_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\_D826.tmpac7d.exe"C:\Users\Admin\AppData\Local\Temp\_D826.tmpac7d.exe" -p"03:02 PM" -y -o"C:\Users\Admin\AppData\Roaming\AV Protection 2012"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:860
-
-
C:\Users\Admin\AppData\Roaming\AV Protection 2012\AntivirusProtection2012.exe"C:\Users\Admin\AppData\Roaming\AV Protection 2012\AntivirusProtection2012.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2768
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C dir "C:\Users\Admin\AppData\Roaming"2⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C dir "C:\Users\Admin\AppData\Roaming\AV Protection 2012"2⤵
- System Location Discovery: System Language Discovery
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD563b147e28c56653e5a11292937759648
SHA1123f0d48fe574630f8c188dbe405c97eaa8b3243
SHA256464be6a126e9d4542e7a5b3a93a884d6cfded39663c90a592d12aebbd0a6ba57
SHA5120e58b1e13da846e22486a6be45b05876f53ebfb1582c61586fea7a7dbf8a8b949daf88180d29cec3702bfe7f82d6db6c88a59b5b38f78d2d98df1d709cac1901
-
Filesize
2.2MB
MD5f4a982de11593759c432b72d9da5ddcb
SHA13bb8132821e4a2ebf486b7b5fe68b33134a997a3
SHA256657d91849b78c8d4929869ab540630a588dd18b19a67f33fe75e97cbf028a205
SHA5127fb896fe879b3646e029fc4e4d12be17167687a9a43d76e37d41de281ca0336cf0f48530628abff97dd40d1fa6fd9de3caed641c6119ed4d7e89e2e94a61669c