Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
20s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 04:49
Static task
static1
Behavioral task
behavioral1
Sample
a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe
-
Size
236KB
-
MD5
a14124a3f85e4b827de7fc26f3f8a486
-
SHA1
297681b8de6ba22ddadae836772f41126565dc77
-
SHA256
1f3f62f463864cf4ed2d35f3d2b2d3ed1cf6a38c206bf19b5f3227496a4eb19f
-
SHA512
c4eff1395ff4321a09791f8581f0e86f2d72ce968a3da779ab9ce94f70b2e0ab830d340a10993fa0d3e241326269f021f78223e8ce4e5cd81d88b735b7ebdebd
-
SSDEEP
6144:hZiKocSHVJgztFoJqu4rspWcDXH4xU38PYuHSnzvQ/+:ijbHV2ZspbDXYxq8wuMzvV
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\Legacy VGA Drivers V1.0 a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\Legacy VGA Drivers V1.0\StubPath = "C:\\Windows\\certproc32.exe" a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\Legacy VGA Drivers V1.0 certproc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\Legacy VGA Drivers V1.0\StubPath = "C:\\Windows\\certproc32.exe" certproc32.exe -
Deletes itself 1 IoCs
pid Process 2768 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2268 certproc32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Legacy VGA Drivers V1.0 = "C:\\Windows\\certproc32.exe" a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Legacy VGA Drivers V1.0 = "C:\\Windows\\certproc32.exe" certproc32.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\jtcres32.dll certproc32.exe File created C:\Windows\mapisrv32.dll certproc32.exe File created C:\Windows\certproc32.exe a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language certproc32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2268 certproc32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2268 2024 a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe 30 PID 2024 wrote to memory of 2268 2024 a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe 30 PID 2024 wrote to memory of 2268 2024 a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe 30 PID 2024 wrote to memory of 2268 2024 a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe 30 PID 2024 wrote to memory of 2768 2024 a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe 31 PID 2024 wrote to memory of 2768 2024 a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe 31 PID 2024 wrote to memory of 2768 2024 a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe 31 PID 2024 wrote to memory of 2768 2024 a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe 31 PID 2268 wrote to memory of 1220 2268 certproc32.exe 21 PID 2268 wrote to memory of 764 2268 certproc32.exe 33 PID 2268 wrote to memory of 764 2268 certproc32.exe 33 PID 2268 wrote to memory of 764 2268 certproc32.exe 33 PID 2268 wrote to memory of 764 2268 certproc32.exe 33 PID 2268 wrote to memory of 764 2268 certproc32.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\certproc32.exe"C:\Windows\certproc32.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:764
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\A14124~1.EXE>> NUL3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2768
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5a14124a3f85e4b827de7fc26f3f8a486
SHA1297681b8de6ba22ddadae836772f41126565dc77
SHA2561f3f62f463864cf4ed2d35f3d2b2d3ed1cf6a38c206bf19b5f3227496a4eb19f
SHA512c4eff1395ff4321a09791f8581f0e86f2d72ce968a3da779ab9ce94f70b2e0ab830d340a10993fa0d3e241326269f021f78223e8ce4e5cd81d88b735b7ebdebd