Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 04:59
Behavioral task
behavioral1
Sample
8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe
-
Size
351KB
-
MD5
8d693029cddf88f890c47f7cc60b58a8
-
SHA1
c5d0a280952b06612206168991c5fd93fbbb58b1
-
SHA256
d04544f5bdc06884d71d095b7f7048a7a4c86a5177787deaab076d52b3246203
-
SHA512
d75235c02a7edf6448175b7ffcd6d3985802ff29f05ffd69a2415afb377155a54737daf776c0ad59517563ea3d3ba1c278a9943e58a8d620df0e38ff60f609e4
-
SSDEEP
3072:rqRAFgKD5iLDeZl/AtADljPzXbMrawgkeAubbixuB2MiOQHQRvOxop0o:rqKgmwfeZlVt7graw1uKoQwUn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2932 Wvopoa.exe -
resource yara_rule behavioral1/memory/2340-1-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/files/0x0008000000016c66-11.dat upx behavioral1/memory/2932-13-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\5NZQ29B3L2 = "C:\\Windows\\Wvopoa.exe" Wvopoa.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe File created C:\Windows\Wvopoa.exe 8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe File opened for modification C:\Windows\Wvopoa.exe 8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wvopoa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main Wvopoa.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main 8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe 2932 Wvopoa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2340 8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe 2932 Wvopoa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2932 2340 8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe 30 PID 2340 wrote to memory of 2932 2340 8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe 30 PID 2340 wrote to memory of 2932 2340 8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe 30 PID 2340 wrote to memory of 2932 2340 8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8d693029cddf88f890c47f7cc60b58a8_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\Wvopoa.exeC:\Windows\Wvopoa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372B
MD599ed06e344906a5ff8df06afeabffc05
SHA1e5560a3d7127fecf5afeb7bdc9d0979c57ee596a
SHA256d4d9e517763a84499de1cb66b01bdd56bb9f9b38235ee697c6184b46b661bd6c
SHA5121ff915df1bd793bb2d58af5642891f1b5e446a2e96799d6fd26fd791813ad375a7e57bdfabba07499860ad8187c185dc3f5e3ed76060fc0b03409dde5f2b7409
-
Filesize
351KB
MD58d693029cddf88f890c47f7cc60b58a8
SHA1c5d0a280952b06612206168991c5fd93fbbb58b1
SHA256d04544f5bdc06884d71d095b7f7048a7a4c86a5177787deaab076d52b3246203
SHA512d75235c02a7edf6448175b7ffcd6d3985802ff29f05ffd69a2415afb377155a54737daf776c0ad59517563ea3d3ba1c278a9943e58a8d620df0e38ff60f609e4