Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe
-
Size
415KB
-
MD5
8787ab0122b63692d45c711c62a9ae5b
-
SHA1
08775e96e366e268baef80c5f24da6f3ca2b657e
-
SHA256
858c1a15ec73430b4d1dc2f3c3fa1365ba935c4d2d03718d290f71847e352935
-
SHA512
56f375b0ef196327a9c75714ab8435a5dd49d9bec8ff7073ba487bfacb407152ace3910b6107bba5d016fb7d89615c9ef161d3b074504bc28ffa3fdcee859592
-
SSDEEP
6144:qE5WuXs2oRlewgvbhHm+UQVgz2kSnzcuxuCQWHX9VPF15FfbXuZow1C7uDZ1w+:jqZE9G+UQVgz2kSouxuRgXFdSowb1
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 2352 svchosty.exe 1496 svchosty.exe 2716 svchosty.exe 2828 svchosty.exe 2796 svchosty.exe 2596 svchosty.exe 2816 svchosty.exe 2820 svchosty.exe 2840 svchosty.exe 2924 svchosty.exe -
Loads dropped DLL 13 IoCs
pid Process 3056 8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe 3056 8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe 3056 8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe 3056 8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe 2352 svchosty.exe 1496 svchosty.exe 2716 svchosty.exe 2828 svchosty.exe 2796 svchosty.exe 2596 svchosty.exe 2816 svchosty.exe 2820 svchosty.exe 2840 svchosty.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosty.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main svchosty.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main svchosty.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main svchosty.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main svchosty.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main svchosty.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main svchosty.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main svchosty.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main svchosty.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main svchosty.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 2840 svchosty.exe 2840 svchosty.exe 2820 svchosty.exe 2820 svchosty.exe 2816 svchosty.exe 2816 svchosty.exe 2596 svchosty.exe 2596 svchosty.exe 2796 svchosty.exe 2796 svchosty.exe 2828 svchosty.exe 2828 svchosty.exe 2716 svchosty.exe 2716 svchosty.exe 1496 svchosty.exe 1496 svchosty.exe 2352 svchosty.exe 2352 svchosty.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2352 3056 8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe 31 PID 3056 wrote to memory of 2352 3056 8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe 31 PID 3056 wrote to memory of 2352 3056 8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe 31 PID 3056 wrote to memory of 2352 3056 8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe 31 PID 2352 wrote to memory of 1496 2352 svchosty.exe 32 PID 2352 wrote to memory of 1496 2352 svchosty.exe 32 PID 2352 wrote to memory of 1496 2352 svchosty.exe 32 PID 2352 wrote to memory of 1496 2352 svchosty.exe 32 PID 1496 wrote to memory of 2716 1496 svchosty.exe 33 PID 1496 wrote to memory of 2716 1496 svchosty.exe 33 PID 1496 wrote to memory of 2716 1496 svchosty.exe 33 PID 1496 wrote to memory of 2716 1496 svchosty.exe 33 PID 2716 wrote to memory of 2828 2716 svchosty.exe 34 PID 2716 wrote to memory of 2828 2716 svchosty.exe 34 PID 2716 wrote to memory of 2828 2716 svchosty.exe 34 PID 2716 wrote to memory of 2828 2716 svchosty.exe 34 PID 2828 wrote to memory of 2796 2828 svchosty.exe 35 PID 2828 wrote to memory of 2796 2828 svchosty.exe 35 PID 2828 wrote to memory of 2796 2828 svchosty.exe 35 PID 2828 wrote to memory of 2796 2828 svchosty.exe 35 PID 2796 wrote to memory of 2596 2796 svchosty.exe 36 PID 2796 wrote to memory of 2596 2796 svchosty.exe 36 PID 2796 wrote to memory of 2596 2796 svchosty.exe 36 PID 2796 wrote to memory of 2596 2796 svchosty.exe 36 PID 2596 wrote to memory of 2816 2596 svchosty.exe 37 PID 2596 wrote to memory of 2816 2596 svchosty.exe 37 PID 2596 wrote to memory of 2816 2596 svchosty.exe 37 PID 2596 wrote to memory of 2816 2596 svchosty.exe 37 PID 2816 wrote to memory of 2820 2816 svchosty.exe 38 PID 2816 wrote to memory of 2820 2816 svchosty.exe 38 PID 2816 wrote to memory of 2820 2816 svchosty.exe 38 PID 2816 wrote to memory of 2820 2816 svchosty.exe 38 PID 2820 wrote to memory of 2840 2820 svchosty.exe 39 PID 2820 wrote to memory of 2840 2820 svchosty.exe 39 PID 2820 wrote to memory of 2840 2820 svchosty.exe 39 PID 2820 wrote to memory of 2840 2820 svchosty.exe 39 PID 2840 wrote to memory of 2924 2840 svchosty.exe 40 PID 2840 wrote to memory of 2924 2840 svchosty.exe 40 PID 2840 wrote to memory of 2924 2840 svchosty.exe 40 PID 2840 wrote to memory of 2924 2840 svchosty.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exe"C:\Users\Admin\AppData\Local\Temp\svchosty.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SPRIFH8L\js3[1].js
Filesize1KB
MD5a66b149a7ebc798955373415d683f32a
SHA115ceaba8cfae8368600620ae97aa26ae7331d626
SHA256036c94653e84e6078c087abeb3ac8804491d27b27938839ae3df42b31e2238d9
SHA512286add411911651ed9217ab94b286d4e3fb546f4bf39c451eff86df0b6daab412d2fd97e0e34c4b71322e862eddf8bc1efdb9d7e1e3c53c15bb420f609966443
-
Filesize
295KB
MD583ae2790b4528531046b9903361af5c6
SHA1ff01b966dfa8d41fb18fd1af36e5fd92b5d44838
SHA25657eb9423f455c973371def560c38bd6fe3c936680c408181574ba452c989febf
SHA5128c665f58596ebcb7821976ca65b20b98bf435ee63ad3424804b3ab764b90ae5c82a5307fb34f7329de0f567155c37d919c79af545b4480c48428bdd81e25132a