Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe
-
Size
264KB
-
MD5
8ee5151279f21a802c7c4a35c438559e
-
SHA1
968c2a3637bab54cb8eaf3e5552e42f612ef5786
-
SHA256
c4539628a4b771a1b1276de073b43d9ebf669154c7c89fdb5cc63ec6e3230047
-
SHA512
35688680ec958269b9e764fbec21115b1533d3a99b2fc56f61da4cd132d9e5b63db9c121444d5b79e35b6973980e5809a49e451b73e18f2f2467668af25f91a0
-
SSDEEP
6144:3/nyiyjGgZdQL4MF7w8iigvookK2vhlwfk:vyzl24MRTgb2c8
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Win SVC 32 = "C:\\Program Files (x86)\\Common Files\\Win SVC 32service.exe" 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{K60TF4T6-GE47-AR3M-H9LH-2T09YC0HM05G} 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{K60TF4T6-GE47-AR3M-H9LH-2T09YC0HM05G}\StubPath = "C:\\Program Files (x86)\\Common Files\\Win SVC 32service.exe" 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2380 Win SVC 32service.exe -
Loads dropped DLL 5 IoCs
pid Process 2536 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe 2536 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe 2380 Win SVC 32service.exe 2380 Win SVC 32service.exe 2380 Win SVC 32service.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Win SVC 32 = "C:\\Program Files (x86)\\Common Files\\Win SVC 32service.exe" 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Win SVC 32 = "C:\\Program Files (x86)\\Common Files\\Win SVC 32service.exe" 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2380 set thread context of 2892 2380 Win SVC 32service.exe 32 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Win SVC 32 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\Win SVC 32service.exe 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Win SVC 32service.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command Win SVC 32service.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2536 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe 2380 Win SVC 32service.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2380 2536 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe 31 PID 2536 wrote to memory of 2380 2536 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe 31 PID 2536 wrote to memory of 2380 2536 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe 31 PID 2536 wrote to memory of 2380 2536 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe 31 PID 2536 wrote to memory of 2380 2536 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe 31 PID 2536 wrote to memory of 2380 2536 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe 31 PID 2536 wrote to memory of 2380 2536 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2892 2380 Win SVC 32service.exe 32 PID 2380 wrote to memory of 2892 2380 Win SVC 32service.exe 32 PID 2380 wrote to memory of 2892 2380 Win SVC 32service.exe 32 PID 2380 wrote to memory of 2892 2380 Win SVC 32service.exe 32 PID 2380 wrote to memory of 2892 2380 Win SVC 32service.exe 32 PID 2380 wrote to memory of 2892 2380 Win SVC 32service.exe 32 PID 2380 wrote to memory of 2892 2380 Win SVC 32service.exe 32 PID 2380 wrote to memory of 2892 2380 Win SVC 32service.exe 32 PID 2380 wrote to memory of 2892 2380 Win SVC 32service.exe 32 PID 2380 wrote to memory of 2892 2380 Win SVC 32service.exe 32 PID 2380 wrote to memory of 2892 2380 Win SVC 32service.exe 32 PID 2380 wrote to memory of 2892 2380 Win SVC 32service.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Common Files\Win SVC 32service.exe"C:\Program Files (x86)\Common Files\Win SVC 32service.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2892
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5c7fab3f0c3c415d7b1708f0679201af4
SHA12cdb6fd004237fbf8203a0a72b6fd99305d270b4
SHA2568569945915e878d2bed8690466ecd63c125b094770c9df121aa2f21f00e73ef0
SHA5121cb4a99f38a95335ace8278d4ab3f7fd2a1d12920626c4a5251d4c228e8a60291fc1c59d6f635bc61b5660268723d03c760b268386ef7fd4db36b8544fc61b3a