Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 23:35
Static task
static1
Behavioral task
behavioral1
Sample
8c701a90a18da1b34695004e2c2ebe60_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c701a90a18da1b34695004e2c2ebe60_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8c701a90a18da1b34695004e2c2ebe60_JaffaCakes118.exe
-
Size
16KB
-
MD5
8c701a90a18da1b34695004e2c2ebe60
-
SHA1
87398dcbfd8d616f81a0c89b722b50adbce6d256
-
SHA256
81714f58bec44e82fa207ecd341b49e2f2b661948bb07c148c38fd5774bb52b1
-
SHA512
d627bc24be88dd0cc28f8b77c52977f584cd8b5bce25d207fa46acb45b7dc943465bfbf2ed32616c6177f09a81ab1d9ea71e298567f3cb1c16056501d512a8d5
-
SSDEEP
384:m4W/WSi7oGOuGuIFiT8fn/luWjNR8ZkDNJz4r3YYAjMqPTE+:b0juj8fn/lrNR8+DNV4r3YY1h+
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\132B9214\ImagePath = "C:\\Windows\\system32\\191BA377.EXE -p" 8c701a90a18da1b34695004e2c2ebe60_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2808 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2708 191BA377.EXE -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\191BA377.EXE 8c701a90a18da1b34695004e2c2ebe60_JaffaCakes118.exe File created C:\Windows\SysWOW64\191BA377.EXE 191BA377.EXE File created C:\Windows\SysWOW64\delme.bat 8c701a90a18da1b34695004e2c2ebe60_JaffaCakes118.exe File created C:\Windows\SysWOW64\84D5BE13.DLL 191BA377.EXE File created C:\Windows\SysWOW64\191BA377.EXE 8c701a90a18da1b34695004e2c2ebe60_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c701a90a18da1b34695004e2c2ebe60_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 191BA377.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2884 8c701a90a18da1b34695004e2c2ebe60_JaffaCakes118.exe 2708 191BA377.EXE 2708 191BA377.EXE 2708 191BA377.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2808 2884 8c701a90a18da1b34695004e2c2ebe60_JaffaCakes118.exe 31 PID 2884 wrote to memory of 2808 2884 8c701a90a18da1b34695004e2c2ebe60_JaffaCakes118.exe 31 PID 2884 wrote to memory of 2808 2884 8c701a90a18da1b34695004e2c2ebe60_JaffaCakes118.exe 31 PID 2884 wrote to memory of 2808 2884 8c701a90a18da1b34695004e2c2ebe60_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c701a90a18da1b34695004e2c2ebe60_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8c701a90a18da1b34695004e2c2ebe60_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\delme.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Windows\SysWOW64\191BA377.EXEC:\Windows\SysWOW64\191BA377.EXE -p1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD58c701a90a18da1b34695004e2c2ebe60
SHA187398dcbfd8d616f81a0c89b722b50adbce6d256
SHA25681714f58bec44e82fa207ecd341b49e2f2b661948bb07c148c38fd5774bb52b1
SHA512d627bc24be88dd0cc28f8b77c52977f584cd8b5bce25d207fa46acb45b7dc943465bfbf2ed32616c6177f09a81ab1d9ea71e298567f3cb1c16056501d512a8d5
-
Filesize
239B
MD55e58345bfa97964866b820efba3488d2
SHA135d4c36b4b1b74f7eabcac8174a98750e870c8c0
SHA256a84c5c1790dc3e851d5e68a29803f1f0fea42dd7a02c0d94908660e091441608
SHA51207382caa6df2ba4fbe2449c32cd9b5ce09848711dca90f1809a386ffbf1d1725833fa71e01000a0abcac3bf592b2f8640994cd264efdbf1a69c21bc9a52405a9