Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 21:13 UTC

General

  • Target

    87b21458c2bf93ff2df92b3abca3b74b_JaffaCakes118.exe

  • Size

    288KB

  • MD5

    87b21458c2bf93ff2df92b3abca3b74b

  • SHA1

    c45872d0171b70d88f21ba904b3fe6ac77032e7c

  • SHA256

    92190ba5d831a90130960adf8ba7c76e1ecdd57fc5907cfb54d9c44fe2912bcf

  • SHA512

    b7feefbe7cac8510ca67feb70a6f8231e2297472f035a0c9de5727e04265863be8a5441d8ad9461f1f6b7df8c0bdb2dff68c2388536af2c10760e0bd77e11af0

  • SSDEEP

    6144:w5c0f7XP+g3AGJpWVzuChYrgns+XuCKnvmb7/D263VAPL8R8FUjcWMHu9tmuE79x:Z27/XvLWpukogns+XuCKnvmb7/D263QF

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87b21458c2bf93ff2df92b3abca3b74b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\87b21458c2bf93ff2df92b3abca3b74b_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Users\Admin\caada.exe
      "C:\Users\Admin\caada.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2060

Network

  • flag-us
    DNS
    ns1.player1352.com
    87b21458c2bf93ff2df92b3abca3b74b_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    ns1.player1352.com
    IN A
    Response
  • flag-us
    DNS
    ns1.player1352.com
    87b21458c2bf93ff2df92b3abca3b74b_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    ns1.player1352.com
    IN A
  • flag-us
    DNS
    ns1.player1352.net
    87b21458c2bf93ff2df92b3abca3b74b_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    ns1.player1352.net
    IN A
    Response
    ns1.player1352.net
    IN A
    107.178.223.183
    ns1.player1352.net
    IN A
    104.155.138.21
  • 107.178.223.183:8000
    ns1.player1352.net
    87b21458c2bf93ff2df92b3abca3b74b_JaffaCakes118.exe
    466 B
    372 B
    10
    9
  • 8.8.8.8:53
    ns1.player1352.com
    dns
    87b21458c2bf93ff2df92b3abca3b74b_JaffaCakes118.exe
    128 B
    137 B
    2
    1

    DNS Request

    ns1.player1352.com

    DNS Request

    ns1.player1352.com

  • 8.8.8.8:53
    ns1.player1352.net
    dns
    87b21458c2bf93ff2df92b3abca3b74b_JaffaCakes118.exe
    64 B
    96 B
    1
    1

    DNS Request

    ns1.player1352.net

    DNS Response

    107.178.223.183
    104.155.138.21

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\caada.exe

    Filesize

    288KB

    MD5

    a158f5ec3864e47c4093b221fa8e1f11

    SHA1

    a48f843c95077205cbb6e43cf83b16816a1d2391

    SHA256

    7fa918c75a68a5991bb14dc46b519c42482f0117fb99e351de51cc29e2e4fc0c

    SHA512

    2569fdc4e4cd7f490f67bda260f48be590cba3699e69397f2344b356915d9d769c1cf594322256045cfc96bc4b222d3b38684434ad2978d4c45e8de697646d3b

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.