Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
872529dda3c8c6ba8430529ba2f24564_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
872529dda3c8c6ba8430529ba2f24564_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
872529dda3c8c6ba8430529ba2f24564_JaffaCakes118.exe
-
Size
440KB
-
MD5
872529dda3c8c6ba8430529ba2f24564
-
SHA1
8f4f056d3a4ba3eb50cb3a7eb7c2705ecd106a0c
-
SHA256
903b8f25efa5c67dab601ea852fe5ae5724238845ad7a923ed1a4550a10f6a13
-
SHA512
502ef80a3247b484298879187e33806ded1edf0ddbada5333b81a569c7b248c7d3e2163c83579f81adead1530d347f52703fcca4984d78c513ca3868050b45a2
-
SSDEEP
12288:Tn0e123y2c8+0eoktq+CAXD0Ed+z/woO:Tn0e12i2caIq+CAT0v0
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 2076 dfrgsnapnt.exe 2752 wscsvc32.exe -
Loads dropped DLL 5 IoCs
pid Process 1308 872529dda3c8c6ba8430529ba2f24564_JaffaCakes118.exe 1308 872529dda3c8c6ba8430529ba2f24564_JaffaCakes118.exe 2076 dfrgsnapnt.exe 2076 dfrgsnapnt.exe 2076 dfrgsnapnt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\dfrgsnapnt.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dfrgsnapnt.exe" 872529dda3c8c6ba8430529ba2f24564_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 872529dda3c8c6ba8430529ba2f24564_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfrgsnapnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscsvc32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main wscsvc32.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1308 872529dda3c8c6ba8430529ba2f24564_JaffaCakes118.exe 1308 872529dda3c8c6ba8430529ba2f24564_JaffaCakes118.exe 1308 872529dda3c8c6ba8430529ba2f24564_JaffaCakes118.exe 1308 872529dda3c8c6ba8430529ba2f24564_JaffaCakes118.exe 2076 dfrgsnapnt.exe 2076 dfrgsnapnt.exe 2076 dfrgsnapnt.exe 2076 dfrgsnapnt.exe 2076 dfrgsnapnt.exe 2076 dfrgsnapnt.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1308 872529dda3c8c6ba8430529ba2f24564_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2076 dfrgsnapnt.exe 2076 dfrgsnapnt.exe 2076 dfrgsnapnt.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2076 dfrgsnapnt.exe 2076 dfrgsnapnt.exe 2076 dfrgsnapnt.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2752 wscsvc32.exe 2752 wscsvc32.exe 2752 wscsvc32.exe 2752 wscsvc32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1308 wrote to memory of 2076 1308 872529dda3c8c6ba8430529ba2f24564_JaffaCakes118.exe 30 PID 1308 wrote to memory of 2076 1308 872529dda3c8c6ba8430529ba2f24564_JaffaCakes118.exe 30 PID 1308 wrote to memory of 2076 1308 872529dda3c8c6ba8430529ba2f24564_JaffaCakes118.exe 30 PID 1308 wrote to memory of 2076 1308 872529dda3c8c6ba8430529ba2f24564_JaffaCakes118.exe 30 PID 2076 wrote to memory of 2752 2076 dfrgsnapnt.exe 33 PID 2076 wrote to memory of 2752 2076 dfrgsnapnt.exe 33 PID 2076 wrote to memory of 2752 2076 dfrgsnapnt.exe 33 PID 2076 wrote to memory of 2752 2076 dfrgsnapnt.exe 33 -
System policy modification 1 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 872529dda3c8c6ba8430529ba2f24564_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 872529dda3c8c6ba8430529ba2f24564_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System dfrgsnapnt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" dfrgsnapnt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" wscsvc32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\872529dda3c8c6ba8430529ba2f24564_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\872529dda3c8c6ba8430529ba2f24564_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\dfrgsnapnt.exe"C:\Users\Admin\AppData\Local\Temp\dfrgsnapnt.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\wscsvc32.exeC:\Users\Admin\AppData\Local\Temp\wscsvc32.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
440KB
MD5872529dda3c8c6ba8430529ba2f24564
SHA18f4f056d3a4ba3eb50cb3a7eb7c2705ecd106a0c
SHA256903b8f25efa5c67dab601ea852fe5ae5724238845ad7a923ed1a4550a10f6a13
SHA512502ef80a3247b484298879187e33806ded1edf0ddbada5333b81a569c7b248c7d3e2163c83579f81adead1530d347f52703fcca4984d78c513ca3868050b45a2
-
Filesize
332KB
MD55d905032d3e396a1ae0956790b097d29
SHA12651a767078bd1091553b95b6d9ed9d3021267ef
SHA256660aa5299a42f3cd7a114e57e979633f7dc1d275ffdf66022b4a689d554bad52
SHA5120fa7f95dd4e4861c8231e8d10cac70a4a4146bdc6d0a72b35c566df1f1be8505d5066921d0af2cd0329c1d0e9e0dd57da52cb6f5c1093007c0e04b264c4fe0ed
-
Filesize
279KB
MD5672be53e2245341f01d8144fc403a0bc
SHA17c56962f6891181300f1cd4431456c2a73e1dff9
SHA25602d8af9528126544d1766cae164069f4599864da3093abad8a6525007187e0b4
SHA512bb9c76a06ca02acb830bb280cbbf9ec5d6d0fdc7f97e13591d8426d71cb91f8798b1303d36099cd635160640f2ceb9d2fad47c8fb5a19468ff8ba2900f819af7