Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 16:56
Static task
static1
Behavioral task
behavioral1
Sample
a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe
-
Size
178KB
-
MD5
a35e2d30db8c6f69798ed3ebd78a60e5
-
SHA1
d8d814b892d58f2ec58e343d570cbc3f8808b5d9
-
SHA256
47bf70a9a7b5799a8763fbc9941fee8fc785a9b84567f9834df8153e53a76eaf
-
SHA512
ae36eb90d40df2b69dcdb98d8309f3286edde91b1652fa4db730d87b8914ef527a4de69a9d59caf9669d4d0e486e942747644a8f82038872c089329576b75ded
-
SSDEEP
3072:u0Gox2PD7tC6PNMk/WqGIvMEhc+5n6CdJK8GcBHNmjoH90DGzhQ:6ogPJWqGU/n6CbzGcBIMHIGl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2232 Szevua.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\TJHTHX1O7X = "C:\\Windows\\Szevua.exe" Szevua.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Szevua.exe a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe File opened for modification C:\Windows\Szevua.exe a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Szevua.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main Szevua.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International Szevua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe 2232 Szevua.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2232 1972 a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe 30 PID 1972 wrote to memory of 2232 1972 a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe 30 PID 1972 wrote to memory of 2232 1972 a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe 30 PID 1972 wrote to memory of 2232 1972 a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe 30 PID 1972 wrote to memory of 2232 1972 a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe 30 PID 1972 wrote to memory of 2232 1972 a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe 30 PID 1972 wrote to memory of 2232 1972 a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\Szevua.exeC:\Windows\Szevua.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD5a35e2d30db8c6f69798ed3ebd78a60e5
SHA1d8d814b892d58f2ec58e343d570cbc3f8808b5d9
SHA25647bf70a9a7b5799a8763fbc9941fee8fc785a9b84567f9834df8153e53a76eaf
SHA512ae36eb90d40df2b69dcdb98d8309f3286edde91b1652fa4db730d87b8914ef527a4de69a9d59caf9669d4d0e486e942747644a8f82038872c089329576b75ded
-
Filesize
372B
MD538a874aaec900eb698979b6a005f1fc9
SHA11d172f53f33ed8d5e6e9a414eaff5d028a2a9315
SHA256979749b2b482a2a3819bcf8979f2bdc3ebc19a0cdfda5f8a9c28219bb96999cc
SHA512ffdb5b9c4935c9f7daa818be499778bf9b1d1846e62dbdc62233f5b5ae5d8b50fbcdc1108e622f2d503cbe78553636f5cf412a993f5fd4289aa2cbd05e9e1124