Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 09:14
Static task
static1
Behavioral task
behavioral1
Sample
89ce5c64d92383549a7e0807e9fe742b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
89ce5c64d92383549a7e0807e9fe742b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
89ce5c64d92383549a7e0807e9fe742b_JaffaCakes118.exe
-
Size
18KB
-
MD5
89ce5c64d92383549a7e0807e9fe742b
-
SHA1
00e4809e98e40af45dd242be854d63814b29e505
-
SHA256
5a29c828246a7dc8f9a4e78baa55e96b6d130dc53e4184da84c72450f303bb8a
-
SHA512
31c6b6ed618a4fe41c10812e582e178a67414bd78c92e8fa9e6106bf21b3ecd51b1cc2698f41e5997216ec4ae9fae61019b3d737e0d057ae98e71a54b8ee5609
-
SSDEEP
384:CTfFr25cRkkBou/pv6V+mdL1VBT+ue+MCqGX7VmtDio5o3IJuVoS:0psuk/uBvupdLhTs+MCq8Aio5oYsoS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1648 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1240 Fuck.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Fuck.exe 89ce5c64d92383549a7e0807e9fe742b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Fuck.exe 89ce5c64d92383549a7e0807e9fe742b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89ce5c64d92383549a7e0807e9fe742b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2544 89ce5c64d92383549a7e0807e9fe742b_JaffaCakes118.exe 2544 89ce5c64d92383549a7e0807e9fe742b_JaffaCakes118.exe 1240 Fuck.exe 1240 Fuck.exe 1240 Fuck.exe 1240 Fuck.exe 1240 Fuck.exe 1240 Fuck.exe 1240 Fuck.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2544 89ce5c64d92383549a7e0807e9fe742b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 1648 2544 89ce5c64d92383549a7e0807e9fe742b_JaffaCakes118.exe 31 PID 2544 wrote to memory of 1648 2544 89ce5c64d92383549a7e0807e9fe742b_JaffaCakes118.exe 31 PID 2544 wrote to memory of 1648 2544 89ce5c64d92383549a7e0807e9fe742b_JaffaCakes118.exe 31 PID 2544 wrote to memory of 1648 2544 89ce5c64d92383549a7e0807e9fe742b_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\89ce5c64d92383549a7e0807e9fe742b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\89ce5c64d92383549a7e0807e9fe742b_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\89CE5C~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1648
-
-
C:\Windows\SysWOW64\Fuck.exeC:\Windows\SysWOW64\Fuck.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD589ce5c64d92383549a7e0807e9fe742b
SHA100e4809e98e40af45dd242be854d63814b29e505
SHA2565a29c828246a7dc8f9a4e78baa55e96b6d130dc53e4184da84c72450f303bb8a
SHA51231c6b6ed618a4fe41c10812e582e178a67414bd78c92e8fa9e6106bf21b3ecd51b1cc2698f41e5997216ec4ae9fae61019b3d737e0d057ae98e71a54b8ee5609