Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
946d398e364e0187b1a249b62d2d4022_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
946d398e364e0187b1a249b62d2d4022_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
946d398e364e0187b1a249b62d2d4022_JaffaCakes118.exe
-
Size
218KB
-
MD5
946d398e364e0187b1a249b62d2d4022
-
SHA1
c83ae9278c094872a3cee741a496f6144c59819b
-
SHA256
fa0d3ff1aada852fe0861a98a965cd9af3748bc803c9ace577b23d6f7468d734
-
SHA512
6f2c10db7135df7f9f1e4095f05676a7dd3097528503587e00d612e4069f6a7cb8a4c2d9edea9b2a08daf3b29745afcf658856362251f9d2c133c2d49d11cae2
-
SSDEEP
3072:5CtI+7rPcv5Cvk3ksYIJmEOvhCqld/bb9o3TszuR3h4wkmXG/deJ2ovlBQl2jiHV:MI+na9nl6VlFhoDsKR3jRBlBQ2iHeL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 332 csrss.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created \systemroot\assembly\GAC_32\Desktop.ini csrss.exe File created \systemroot\assembly\GAC_64\Desktop.ini csrss.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2028 328 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 946d398e364e0187b1a249b62d2d4022_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 328 946d398e364e0187b1a249b62d2d4022_JaffaCakes118.exe 328 946d398e364e0187b1a249b62d2d4022_JaffaCakes118.exe 328 946d398e364e0187b1a249b62d2d4022_JaffaCakes118.exe 332 csrss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 328 946d398e364e0187b1a249b62d2d4022_JaffaCakes118.exe Token: SeDebugPrivilege 328 946d398e364e0187b1a249b62d2d4022_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 332 csrss.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 328 wrote to memory of 332 328 946d398e364e0187b1a249b62d2d4022_JaffaCakes118.exe 2 PID 328 wrote to memory of 2028 328 946d398e364e0187b1a249b62d2d4022_JaffaCakes118.exe 30 PID 328 wrote to memory of 2028 328 946d398e364e0187b1a249b62d2d4022_JaffaCakes118.exe 30 PID 328 wrote to memory of 2028 328 946d398e364e0187b1a249b62d2d4022_JaffaCakes118.exe 30 PID 328 wrote to memory of 2028 328 946d398e364e0187b1a249b62d2d4022_JaffaCakes118.exe 30 PID 332 wrote to memory of 2428 332 csrss.exe 31 PID 332 wrote to memory of 2428 332 csrss.exe 31 PID 332 wrote to memory of 868 332 csrss.exe 13
Processes
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:332
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:868
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R2⤵PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\946d398e364e0187b1a249b62d2d4022_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\946d398e364e0187b1a249b62d2d4022_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 1882⤵
- Program crash
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD563e99b675a1337db6d8430195ea3efd2
SHA11baead2bf8f433dc82f9b2c03fd65ce697a92155
SHA2566616179477849205eb4075b75a042056d196f45d67f78929dbb3317a35ccbea9
SHA512f5b986eafa38dbc9ad7759784ac887ecbb9c8d8009a3f33e91b9c9ceeaf043ed3e4ddab8e6b6b77e54aed9fcecab02442c8ff253f2136ea06996d05ddd68199f
-
Filesize
2KB
MD5655b4155655bec8db0155a6d6db0c6f0
SHA16381d5e82db671de73a2a6e00a33d3c9aff30a58
SHA2565cd2c40e5c243491042b141d3f34fe3e711ceef665c1fa64f4567436ff1b798f
SHA5129f2d3d8c678451824a42d50e963e74677e55f540f5e509bbd9dd575205aa3165a196c45a3175b101a6c053e41f6dc95675626d776c73489467968c774e8a5662