Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
945d4803d2dfe3dbe302c705ad8c69fd_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
945d4803d2dfe3dbe302c705ad8c69fd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
945d4803d2dfe3dbe302c705ad8c69fd_JaffaCakes118.exe
-
Size
48KB
-
MD5
945d4803d2dfe3dbe302c705ad8c69fd
-
SHA1
229ff5e185dd33a1be00322a8a3c24ce5f717aac
-
SHA256
7fa59c53f696df67809ce6b964fb62ff305ff4c39c0627381097f3befdfe356f
-
SHA512
4ff5de4f5f94a306fb3191f61a7d5835e6b78dac3a3071a430855a16a2e5e0267f90ec0bc2d79a6992f592226d76bc504bfada9fa4b7d8bc4756dd2e5d0211ba
-
SSDEEP
768:xq4Zrrrrrir/6pAsZFrM3MoXf0cQgmfLhZKUW/OOc6Ik3dwZRn:xq4m6pANvOzXKU2c6IRn
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\svc.exe 945d4803d2dfe3dbe302c705ad8c69fd_JaffaCakes118.exe File opened for modification C:\Windows\kwab.dll 945d4803d2dfe3dbe302c705ad8c69fd_JaffaCakes118.exe File created C:\Windows\TMP_4.TMP 945d4803d2dfe3dbe302c705ad8c69fd_JaffaCakes118.exe File opened for modification C:\Windows\j459kdf9n6r0e5.PAC 945d4803d2dfe3dbe302c705ad8c69fd_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 945d4803d2dfe3dbe302c705ad8c69fd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 945d4803d2dfe3dbe302c705ad8c69fd_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2196 945d4803d2dfe3dbe302c705ad8c69fd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2568 2196 945d4803d2dfe3dbe302c705ad8c69fd_JaffaCakes118.exe 31 PID 2196 wrote to memory of 2568 2196 945d4803d2dfe3dbe302c705ad8c69fd_JaffaCakes118.exe 31 PID 2196 wrote to memory of 2568 2196 945d4803d2dfe3dbe302c705ad8c69fd_JaffaCakes118.exe 31 PID 2196 wrote to memory of 2568 2196 945d4803d2dfe3dbe302c705ad8c69fd_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2620 2568 cmd.exe 33 PID 2568 wrote to memory of 2620 2568 cmd.exe 33 PID 2568 wrote to memory of 2620 2568 cmd.exe 33 PID 2568 wrote to memory of 2620 2568 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\945d4803d2dfe3dbe302c705ad8c69fd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\945d4803d2dfe3dbe302c705ad8c69fd_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\cmd.execmd /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v AutoConfigURL /t REG_MULTI_SZ /d file://C:\Windows\j459kdf9n6r0e5.PAC /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v AutoConfigURL /t REG_MULTI_SZ /d file://C:\Windows\j459kdf9n6r0e5.PAC /f3⤵
- System Location Discovery: System Language Discovery
PID:2620
-
-