Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
29s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
8bd4cb1b5181c898b69b84f6adbd366f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8bd4cb1b5181c898b69b84f6adbd366f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8bd4cb1b5181c898b69b84f6adbd366f_JaffaCakes118.exe
-
Size
8.6MB
-
MD5
8bd4cb1b5181c898b69b84f6adbd366f
-
SHA1
4159859c761e3677e9798793c6f142f30c7e2dcf
-
SHA256
8c173b0c7fe55305394d9dc73dc4073541cce13e8140c7d56f6fdd5f55ac9572
-
SHA512
f3ba9e595d7e645a4c32cfec3c2358433a98624a7aa5c1a777238c3515681b4486012e5fc79b852f8f8fc6a48c44a47924ac8efa941dc32cc1c7dae60a38bcaf
-
SSDEEP
196608:4hkM//zXYpGyYMSjvf2JbGeNmslKJyBBEEE++CmZYOo+EEEEEEEBBBBBBmmmmmm7:4ZzXYpGyYMSjvf2JbGeNmwKgBBEEE++K
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1184 tuto.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\avg = "C:\\Arquivos de programas\\avg.exe" 8bd4cb1b5181c898b69b84f6adbd366f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\System32\\svchosts.exe" 8bd4cb1b5181c898b69b84f6adbd366f_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\svchosts.exe 8bd4cb1b5181c898b69b84f6adbd366f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\PLUG.SYS 8bd4cb1b5181c898b69b84f6adbd366f_JaffaCakes118.exe File created C:\Windows\SysWOW64\svchosts.exe 8bd4cb1b5181c898b69b84f6adbd366f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8bd4cb1b5181c898b69b84f6adbd366f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2380 8bd4cb1b5181c898b69b84f6adbd366f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2248 2380 8bd4cb1b5181c898b69b84f6adbd366f_JaffaCakes118.exe 29 PID 2380 wrote to memory of 2248 2380 8bd4cb1b5181c898b69b84f6adbd366f_JaffaCakes118.exe 29 PID 2380 wrote to memory of 2248 2380 8bd4cb1b5181c898b69b84f6adbd366f_JaffaCakes118.exe 29 PID 2380 wrote to memory of 2248 2380 8bd4cb1b5181c898b69b84f6adbd366f_JaffaCakes118.exe 29 PID 2248 wrote to memory of 1184 2248 cmd.exe 31 PID 2248 wrote to memory of 1184 2248 cmd.exe 31 PID 2248 wrote to memory of 1184 2248 cmd.exe 31 PID 2248 wrote to memory of 1184 2248 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bd4cb1b5181c898b69b84f6adbd366f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8bd4cb1b5181c898b69b84f6adbd366f_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\cmd.execmd /k C:\tuto.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\tuto.exeC:\tuto.exe3⤵
- Executes dropped EXE
PID:1184
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5251b9e5ea854eca172eb5a1ea480c718
SHA1f2d3a641f762ebafce3fe60ba1bf764cd2a6bbec
SHA2564ea747bcd91bc5fc5025b7eb4d4cbba6672a00361285550cb4ca55ad57c95337
SHA512a850de833b3744d31ded0e72549b16614cea9f66a2c989505914de4600c4ffcde842a658d629e0980586cb2c424c3c946e148051a6c82f6ae987da8202d0f8bd