Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 11:56 UTC
Static task
static1
Behavioral task
behavioral1
Sample
85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe
-
Size
321KB
-
MD5
85f60708ffbbec97aa71eebb00dcd0e2
-
SHA1
b34671c1e34184a31b734acb61b6131736208bb5
-
SHA256
95d8bbaf14c46100684f502055399d5ed5d4fc34986f1660386d68fe5001e0cc
-
SHA512
920b5e8cdc774cd48585644026135b25030b299899e3ac4930617446c513d2b28ada435002b76a9184faa935bf4a41290c3539f67640b14f2b3faf32ee12a739
-
SSDEEP
6144:iwTTu7g4DQC6ziRo0sYXkADm5TsCQIaNEN4xxgB3ixuqFsE6aMhZDw:nopF6K1dzUIIaNniB3nq+nah
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2960 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1712 foofy.exe -
Loads dropped DLL 2 IoCs
pid Process 1344 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe 1344 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7D4B5FC8-1892-AD4F-C2C5-7543D4B4565E} = "C:\\Users\\Admin\\AppData\\Roaming\\Ocot\\foofy.exe" foofy.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1344 set thread context of 2960 1344 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Privacy 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe 1712 foofy.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 1344 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe Token: SeSecurityPrivilege 1344 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe Token: SeSecurityPrivilege 1344 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1344 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe 1712 foofy.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1712 1344 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe 29 PID 1344 wrote to memory of 1712 1344 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe 29 PID 1344 wrote to memory of 1712 1344 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe 29 PID 1344 wrote to memory of 1712 1344 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe 29 PID 1712 wrote to memory of 1320 1712 foofy.exe 18 PID 1712 wrote to memory of 1320 1712 foofy.exe 18 PID 1712 wrote to memory of 1320 1712 foofy.exe 18 PID 1712 wrote to memory of 1320 1712 foofy.exe 18 PID 1712 wrote to memory of 1320 1712 foofy.exe 18 PID 1712 wrote to memory of 1372 1712 foofy.exe 19 PID 1712 wrote to memory of 1372 1712 foofy.exe 19 PID 1712 wrote to memory of 1372 1712 foofy.exe 19 PID 1712 wrote to memory of 1372 1712 foofy.exe 19 PID 1712 wrote to memory of 1372 1712 foofy.exe 19 PID 1712 wrote to memory of 1428 1712 foofy.exe 20 PID 1712 wrote to memory of 1428 1712 foofy.exe 20 PID 1712 wrote to memory of 1428 1712 foofy.exe 20 PID 1712 wrote to memory of 1428 1712 foofy.exe 20 PID 1712 wrote to memory of 1428 1712 foofy.exe 20 PID 1712 wrote to memory of 1500 1712 foofy.exe 24 PID 1712 wrote to memory of 1500 1712 foofy.exe 24 PID 1712 wrote to memory of 1500 1712 foofy.exe 24 PID 1712 wrote to memory of 1500 1712 foofy.exe 24 PID 1712 wrote to memory of 1500 1712 foofy.exe 24 PID 1712 wrote to memory of 1344 1712 foofy.exe 28 PID 1712 wrote to memory of 1344 1712 foofy.exe 28 PID 1712 wrote to memory of 1344 1712 foofy.exe 28 PID 1712 wrote to memory of 1344 1712 foofy.exe 28 PID 1712 wrote to memory of 1344 1712 foofy.exe 28 PID 1344 wrote to memory of 2960 1344 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe 30 PID 1344 wrote to memory of 2960 1344 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe 30 PID 1344 wrote to memory of 2960 1344 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe 30 PID 1344 wrote to memory of 2960 1344 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe 30 PID 1344 wrote to memory of 2960 1344 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe 30 PID 1344 wrote to memory of 2960 1344 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe 30 PID 1344 wrote to memory of 2960 1344 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe 30 PID 1344 wrote to memory of 2960 1344 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe 30 PID 1344 wrote to memory of 2960 1344 85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe 30
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1320
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1372
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Roaming\Ocot\foofy.exe"C:\Users\Admin\AppData\Roaming\Ocot\foofy.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1712
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp0efabb88.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2960
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1500
Network
- No results found
-
218 B 1
-
236 B 1
-
140 B 1
-
266 B 1
-
270 B 1
-
281 B 1
-
151 B 1
-
179 B 1
-
263 B 1
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5a3f8a95d0f8c2a60ba8bad074f64c6e2
SHA1cefaddd0ac1b8a9d36ef158803c83ef666adb7ec
SHA25636eea204e19a47a797a6e0be5f59e77757717aca5c44a549d5a702aa4f563126
SHA512681543f815420665b79f44aa91d2aead36b1a11dff06c51afe3b75d7c6dfb4c8fad1e684000c3d4a095c82effb40b5ee5be5330c488ded415aa76a6394c49e45
-
Filesize
380B
MD5c2129c6c7d7eaca8c363af5db0911ba7
SHA16142fc6f35cb3152bd1893fad323709ceee0712c
SHA2567f654dc16bc585fe69e12b58d203bf3c4597f4f57ab0664ca234d93e72e67ec4
SHA51218cae9ade735a31b7fdbbc42f6f2283df499ef10f3dfe18b44c30084cdf4e8e9893ca6d86b7cd8870a76a0bd15cbe8b0de31fd6ad48f0384f8520790f9c8e279
-
Filesize
321KB
MD56619c80867ef4a96f5c7f166393c5399
SHA1777ccdf6ba1bf7cfeaaf12c75bce89aea397ebfc
SHA2569dba324f02ec311b904b88dba1f8049f3b25358f02492c0918b7aa8fb1c1bc00
SHA5122e04143b044c4f495b917896bc61edbf60d253ddad1aba61032fdf71c9a90f6e7e77f0149ed1ce1e6639f3ae5b979b4152450f8c85e972fe6e5f7cadc1abb6a8