Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
8d3e0e19c791f2ff44ac2f70fb1ca6d7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8d3e0e19c791f2ff44ac2f70fb1ca6d7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8d3e0e19c791f2ff44ac2f70fb1ca6d7_JaffaCakes118.exe
-
Size
597KB
-
MD5
8d3e0e19c791f2ff44ac2f70fb1ca6d7
-
SHA1
148ac486bf1429edb7a18aad370f381b9e492830
-
SHA256
231acfa8dce1762e738b15a0ffd0b815d08529b8e9cec50ab74c594a838d0faa
-
SHA512
ee6bf2667ffeeaa021a6b1bdbb5276a794df2e64ff91e2cd7869064c100c097482d6617ee69ac17ece29e3d7083c26a9e048596046e4c9a8f786d81ac5036c68
-
SSDEEP
12288:on0yj3congXXc1sZmOijVZ71kEGuy6/+/+C+IMFml/v0rOxT+Lal:onvzcongXXc1+mOs6Ruy6/+WbrOu6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3012 MSN.exe -
Loads dropped DLL 5 IoCs
pid Process 600 8d3e0e19c791f2ff44ac2f70fb1ca6d7_JaffaCakes118.exe 600 8d3e0e19c791f2ff44ac2f70fb1ca6d7_JaffaCakes118.exe 484 WerFault.exe 484 WerFault.exe 484 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 484 3012 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d3e0e19c791f2ff44ac2f70fb1ca6d7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSN.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 600 8d3e0e19c791f2ff44ac2f70fb1ca6d7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 600 wrote to memory of 3012 600 8d3e0e19c791f2ff44ac2f70fb1ca6d7_JaffaCakes118.exe 30 PID 600 wrote to memory of 3012 600 8d3e0e19c791f2ff44ac2f70fb1ca6d7_JaffaCakes118.exe 30 PID 600 wrote to memory of 3012 600 8d3e0e19c791f2ff44ac2f70fb1ca6d7_JaffaCakes118.exe 30 PID 600 wrote to memory of 3012 600 8d3e0e19c791f2ff44ac2f70fb1ca6d7_JaffaCakes118.exe 30 PID 3012 wrote to memory of 484 3012 MSN.exe 31 PID 3012 wrote to memory of 484 3012 MSN.exe 31 PID 3012 wrote to memory of 484 3012 MSN.exe 31 PID 3012 wrote to memory of 484 3012 MSN.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d3e0e19c791f2ff44ac2f70fb1ca6d7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8d3e0e19c791f2ff44ac2f70fb1ca6d7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Users\Admin\AppData\Local\Temp\MSN.exe"C:\Users\Admin\AppData\Local\Temp\MSN.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 363⤵
- Loads dropped DLL
- Program crash
PID:484
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD59cd907f6b88fd2717b6422b73a0551af
SHA1eca573bcbcef1c8320fb45870d7a8233bae7d594
SHA25651737d4ded7dc2a208a177e55474cf50d262f9ee9631bfcb87538ec879fd23ec
SHA5123f30e182a6a275843a72ba943348a9fb739374e7de3361efc63b65d9f3d2b4898168fadb67a7b1e6f3fa4975d6c782d3f27c31f4f4b2d225868fbf7442439161