Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
8877731ac9d89376ec760076289c94b7_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8877731ac9d89376ec760076289c94b7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8877731ac9d89376ec760076289c94b7_JaffaCakes118.exe
-
Size
722KB
-
MD5
8877731ac9d89376ec760076289c94b7
-
SHA1
3507d10ca1db3965abe913beda4fe25c1a80a6a7
-
SHA256
05383f03f867b2293d9d991acfb03576bcd07c9e4d2f9afd60de54e59a9fbb5a
-
SHA512
af2966b96c712825057d5dabcfc3fa9280b637eb5fdf8acaa31342623dc327bbd05594cf67998b509a2ecdb55f7175015c124f00fed3a809edcf95c94c4e948b
-
SSDEEP
12288:ZOigytK/0Oxj2BuBgKZ+SawSr1Nqn3YQ1F3Z4mxx6DqVTVOCo:ZOaEsojiuBgKBa7NFQ1QmXBVTzo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2952 2.exe -
Loads dropped DLL 5 IoCs
pid Process 2244 8877731ac9d89376ec760076289c94b7_JaffaCakes118.exe 2244 8877731ac9d89376ec760076289c94b7_JaffaCakes118.exe 2980 WerFault.exe 2980 WerFault.exe 2980 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8877731ac9d89376ec760076289c94b7_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2980 2952 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8877731ac9d89376ec760076289c94b7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2952 2244 8877731ac9d89376ec760076289c94b7_JaffaCakes118.exe 30 PID 2244 wrote to memory of 2952 2244 8877731ac9d89376ec760076289c94b7_JaffaCakes118.exe 30 PID 2244 wrote to memory of 2952 2244 8877731ac9d89376ec760076289c94b7_JaffaCakes118.exe 30 PID 2244 wrote to memory of 2952 2244 8877731ac9d89376ec760076289c94b7_JaffaCakes118.exe 30 PID 2952 wrote to memory of 2980 2952 2.exe 31 PID 2952 wrote to memory of 2980 2952 2.exe 31 PID 2952 wrote to memory of 2980 2952 2.exe 31 PID 2952 wrote to memory of 2980 2952 2.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8877731ac9d89376ec760076289c94b7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8877731ac9d89376ec760076289c94b7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 883⤵
- Loads dropped DLL
- Program crash
PID:2980
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
345KB
MD530d1c597d540e7f2c24d2d85f6261785
SHA1d35e84805a97b91413d5e468016f8dfdebaf5e8a
SHA256169b1d448df93e2e0df3b295b7aa8c3aada47d3ef24bf01b9d7ea05767b9665a
SHA5129b0b73423728d078a55e6dbd60669f364953b585119c0470f3e34fe36523778cb4d24b345a3cd1d24bc0e16f346f033055876faf51d61d85671d6d04106a835f