Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 03:32
Static task
static1
Behavioral task
behavioral1
Sample
8d24e4108a97f5fb6c44db7acb562b5c_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
8d24e4108a97f5fb6c44db7acb562b5c_JaffaCakes118.exe
-
Size
21KB
-
MD5
8d24e4108a97f5fb6c44db7acb562b5c
-
SHA1
c26d9981579a51a2ad2d9a4df3f2f473ace74fdf
-
SHA256
726a85d278aa8ffa2313567d46f80f847ea70f0c21f570d430e1c063ca5f337d
-
SHA512
17b96624f28525ee3a4e56c95ded789e3821e687593be14ba665846f0c164bf8a594b7d1e875414348f998e4593e96e382826f5533620a2f93b5a5ebc66e6257
-
SSDEEP
384:ZOF/Jl5cNx0Sb2t57qnO8Sg/yLlVAuxNuwFTABfx+ov3cZUhH3StNECtMToH:Q/JB/SnlZGlVpxNuEUBfsodhHaztM+
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000a000000012029-3.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2352 8d24e4108a97f5fb6c44db7acb562b5c_JaffaCakes118.exe -
resource yara_rule behavioral1/files/0x000a000000012029-3.dat upx behavioral1/memory/2352-6-0x0000000000290000-0x00000000002A0000-memory.dmp upx behavioral1/memory/2352-7-0x0000000000290000-0x00000000002A0000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\8d24e4108a97f5fb6c44db7acb562b5c_JaffaCakes118hd.dll 8d24e4108a97f5fb6c44db7acb562b5c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\8d24e4108a97f5fb6c44db7acb562b5c_JaffaCakes118hd.dll 8d24e4108a97f5fb6c44db7acb562b5c_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d24e4108a97f5fb6c44db7acb562b5c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2352 8d24e4108a97f5fb6c44db7acb562b5c_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d24e4108a97f5fb6c44db7acb562b5c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8d24e4108a97f5fb6c44db7acb562b5c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5e656bcc5725dda9d374a677122d51239
SHA1fada15ec7291d9fe29eee89e23fe63307e3adccb
SHA256fcc30966bed49968545140ed2bb5f66825b3429d2cd05d183153e218ab1315d8
SHA5128652e8419c79930cd8be8541e2d994c7dc715ce493be27ec91e98a96db41dd7a9520176857455434c51a4c69a0d62b6f90c259602c4d406f8f8f36cfd93208bd