Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 08:06
Behavioral task
behavioral1
Sample
95441238d078e72c1c6bebd9afb7a8c3_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
95441238d078e72c1c6bebd9afb7a8c3_JaffaCakes118.exe
-
Size
119KB
-
MD5
95441238d078e72c1c6bebd9afb7a8c3
-
SHA1
9919fa828e3f44bd8869ff17b413ec77fd3950e6
-
SHA256
40265262d42302433078dc23d74ae9ef7816961e03dcd372cc76d10a4d684ea9
-
SHA512
b2240d32266d56eb16271ea6bbcc247688935bbd21246f798e7b69d076cbf22639ea10c047210c2bf40e6590f9b8edb3c118f06770cd1f86d6f3173f341029ec
-
SSDEEP
3072:gPjkUqTgBHoS6wPi2t9o9TqoOurLsX+osPtBouti:grkUkGHoS6wVtONdOIPtBoS
Malware Config
Signatures
-
Drops file in Drivers directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\s2tx33hp.sys 95441238d078e72c1c6bebd9afb7a8c3_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers\ivyg95irk.sys 95441238d078e72c1c6bebd9afb7a8c3_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\ivyg95irk.sys 95441238d078e72c1c6bebd9afb7a8c3_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers\s2tx33hp.sys 95441238d078e72c1c6bebd9afb7a8c3_JaffaCakes118.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ivyg95irk\ImagePath = "system32\\drivers\\ivyg95irk.sys" 95441238d078e72c1c6bebd9afb7a8c3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\s2tx33hp\ImagePath = "system32\\drivers\\s2tx33hp.sys" 95441238d078e72c1c6bebd9afb7a8c3_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2028-0-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2028-4-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2028-10-0x0000000000400000-0x0000000000447000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\5xgz2.dll 95441238d078e72c1c6bebd9afb7a8c3_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\5xgz2.dll 95441238d078e72c1c6bebd9afb7a8c3_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95441238d078e72c1c6bebd9afb7a8c3_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 480 Process not Found 480 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\95441238d078e72c1c6bebd9afb7a8c3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\95441238d078e72c1c6bebd9afb7a8c3_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2028