Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
32s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe
-
Size
301KB
-
MD5
a2e138f736c1dc019614455093d43a86
-
SHA1
44c11c9597383dd81c5bf1af2fcd453962f862d0
-
SHA256
8655a619d48d872a17bdc6df80976d0bc52d3c1edb59633bd1cb2e56adb65245
-
SHA512
60e7e9d2b600390086e8379b96d188e7ac9f95c8c8230c4570402dd67240f5f60f38ed2ad7dedab1ce945a5494a82c87952b5b1ed1e124ee2b97ca405a92992f
-
SSDEEP
6144:fJEYERqaQiEYixXAkmOgoUpMEEdlntRb5A+na4S3lfEQwf:h5+qntJxjfg5mxdltZ5A+na4TQwf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2828 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2728 svohst.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\svohst.exe a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\svohst.exe a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\Deleteme.bat a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svohst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2828 2348 a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2828 2348 a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2828 2348 a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2828 2348 a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Deleteme.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2828
-
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\SysWOW64\svohst.exe -NetSata1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5124b51c7c7dafa1f8e4ac41b11135c62
SHA1a8931400948a771178707e6ee1d5c350c105f0f8
SHA256accb57cc39b788af7ccb8bac5879364b48858a84ba0151d717d9bdddf98023ae
SHA512081ea21c6edf5ea5b77e87031bd42f8761fd7bb27eca76279e6d42865cc16a95a667b24782ae643485e580cb0c945f0ad7ad82ff97c3302a05c238d32cf26f6f
-
Filesize
301KB
MD5a2e138f736c1dc019614455093d43a86
SHA144c11c9597383dd81c5bf1af2fcd453962f862d0
SHA2568655a619d48d872a17bdc6df80976d0bc52d3c1edb59633bd1cb2e56adb65245
SHA51260e7e9d2b600390086e8379b96d188e7ac9f95c8c8230c4570402dd67240f5f60f38ed2ad7dedab1ce945a5494a82c87952b5b1ed1e124ee2b97ca405a92992f