Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 00:36
Behavioral task
behavioral1
Sample
884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe
-
Size
51KB
-
MD5
884fa6f68ebc37e897c4a7d7bb32a75f
-
SHA1
011601fcb414846d72e7bcf3973ce0248e7ed35e
-
SHA256
738cbb5e4c08c9e0384206c297ebb207dd8a64cce51ffaba62cce84053a92b75
-
SHA512
61b33063b2673f5bd700b9c32aa0c3204002670ebb24b202fec5226650b23741db27e24a073894accb572417eb655d8cf43ca6bbce3b375119b5c7ac0b5a8c18
-
SSDEEP
1536:E5urmX2eZwS2N6XG9IgTwHZ6ioZWZ3um4:B5yw6XG9fwXoZWt54
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\umwpj.sys 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\umwpj.sys 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\kpvlfl\ImagePath = "system32\\drivers\\umwpj.sys" 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2948 cmd.exe -
Loads dropped DLL 8 IoCs
pid Process 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 2888 Rundll32.exe 2888 Rundll32.exe 2888 Rundll32.exe 2888 Rundll32.exe -
resource yara_rule behavioral1/memory/2876-0-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/2876-24-0x0000000000400000-0x0000000000419000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\cPip.dll 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\cPip.dll 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe File created C:\Windows\SysWOW64\Hf0j9s.bat 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2600 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2600 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 480 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 Rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2888 Rundll32.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2876 wrote to memory of 1512 2876 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe 30 PID 2876 wrote to memory of 1512 2876 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe 30 PID 2876 wrote to memory of 1512 2876 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe 30 PID 2876 wrote to memory of 1512 2876 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe 30 PID 2876 wrote to memory of 1512 2876 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe 30 PID 2876 wrote to memory of 1512 2876 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe 30 PID 2876 wrote to memory of 1512 2876 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe 30 PID 1512 wrote to memory of 2888 1512 rundll32.exe 31 PID 1512 wrote to memory of 2888 1512 rundll32.exe 31 PID 1512 wrote to memory of 2888 1512 rundll32.exe 31 PID 1512 wrote to memory of 2888 1512 rundll32.exe 31 PID 1512 wrote to memory of 2888 1512 rundll32.exe 31 PID 1512 wrote to memory of 2888 1512 rundll32.exe 31 PID 1512 wrote to memory of 2888 1512 rundll32.exe 31 PID 2876 wrote to memory of 2948 2876 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe 32 PID 2876 wrote to memory of 2948 2876 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe 32 PID 2876 wrote to memory of 2948 2876 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe 32 PID 2876 wrote to memory of 2948 2876 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe 32 PID 2948 wrote to memory of 2600 2948 cmd.exe 34 PID 2948 wrote to memory of 2600 2948 cmd.exe 34 PID 2948 wrote to memory of 2600 2948 cmd.exe 34 PID 2948 wrote to memory of 2600 2948 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\cPip.dll,DllRegisterServer2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\Rundll32.exeC:\Windows\system32\Rundll32.exe C:\Windows\system32\cPip.dll,DllUnregisterServer3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Hf0j9s.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\PING.EXEping -n 3 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2600
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
249B
MD5caa3b942e5f256e0e5d5e391eba60c77
SHA1494e330f34949425c05677b7c3f40eba00fd67b1
SHA2561f478625c0d307ace713724f213febce675522e28f31674f2668913dc72ada9c
SHA512a0a34e2021e4ce7858e0941dde7d21f465aceb6b1cf9151242f35e70ce12ef1a4ba6438a4caaf78c8b662822c0e41721930d52a8994093bcb890a65cf6a46051
-
Filesize
32KB
MD53dc1d366a1761cb7ac93bf018f62ebe3
SHA16089904e3c6a70655a6be2550521e401952e7946
SHA2564f1856de5e068c8be20580f338027210571de4c470e77eabc8246637f6651ed2
SHA512c8dbf0dcb65b3de5fa2a229e606c09acdb1811c38ab8963b1e85a1cb816db1ea6bfa0416e5e09102656af9cc6c95157ddeb97934f2516ae6aea7bb6b99f562a0