Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe
-
Size
60KB
-
MD5
a4e5991a9ba6205c10af79d7586b99b1
-
SHA1
f0fb071c61dc0e3242bf5c40dd4187f2fa37d923
-
SHA256
cc5e115bf8ee2063790ce5ce6f08d90d60ab00ee0cab5eab34784b56028a2ebe
-
SHA512
63f2db6054025b7fd245ff690729653e6ebf530baf9fd7825c84ef87c5b402e6cdcbc555ae270b742ac180eb603e4ad24a1a8b43bb482089a6e01b26c66c702e
-
SSDEEP
1536:V3cpyORJLuB4P4AJJv4Romu/v4ptqrmX+lE8QG+M:V3c1fP4AJJv45SlwI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3004 cmd.exe -
Loads dropped DLL 7 IoCs
pid Process 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\Internat Explorar\Desktop.ini a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe File opened for modification C:\Users\Public\Desktop\Internat Explorar\Desktop.ini a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\tbgw.ico a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe File opened for modification C:\Windows\tbgw.ico a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2752 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 30 PID 1544 wrote to memory of 2752 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 30 PID 1544 wrote to memory of 2752 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 30 PID 1544 wrote to memory of 2752 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 30 PID 1544 wrote to memory of 2752 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 30 PID 1544 wrote to memory of 2752 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 30 PID 1544 wrote to memory of 2752 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 30 PID 1544 wrote to memory of 2756 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 31 PID 1544 wrote to memory of 2756 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 31 PID 1544 wrote to memory of 2756 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 31 PID 1544 wrote to memory of 2756 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 31 PID 1544 wrote to memory of 2756 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 31 PID 1544 wrote to memory of 2756 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 31 PID 1544 wrote to memory of 2756 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 31 PID 2756 wrote to memory of 2564 2756 cmd.exe 34 PID 2756 wrote to memory of 2564 2756 cmd.exe 34 PID 2756 wrote to memory of 2564 2756 cmd.exe 34 PID 2756 wrote to memory of 2564 2756 cmd.exe 34 PID 2756 wrote to memory of 2564 2756 cmd.exe 34 PID 2756 wrote to memory of 2564 2756 cmd.exe 34 PID 2756 wrote to memory of 2564 2756 cmd.exe 34 PID 1544 wrote to memory of 3004 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 35 PID 1544 wrote to memory of 3004 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 35 PID 1544 wrote to memory of 3004 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 35 PID 1544 wrote to memory of 3004 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 35 PID 1544 wrote to memory of 3004 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 35 PID 1544 wrote to memory of 3004 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 35 PID 1544 wrote to memory of 3004 1544 a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe 35 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2564 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a4e5991a9ba6205c10af79d7586b99b1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move "C:\Users\Admin\AppData\Local\Temp\Internat Explorar" "C:\Users\Public\Desktop\Internat Explorar"2⤵
- System Location Discovery: System Language Discovery
PID:2752
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib "C:\Users\Public\Desktop\Internat Explorar" +s2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Public\Desktop\Internat Explorar" +s3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2564
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\temp_tmp.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214B
MD5645b0a932036970137e4f52c7cf5ef35
SHA1f18a45d36b64f272e9e50ae0a5d9de3ab819d6dc
SHA256d4379baa0c430f1ccaf8d39be467aeb9a96487136af01920e72a7cb6db025960
SHA512bbb1752dba9bfbecd11a66b7fdc03d87f3a5d87cf0e0dac96f3d155538019b4accb223e10341857345c7be5265e5f1da0a90cacfa159359f1052859dc6935ab4
-
Filesize
1KB
MD55ffaf2527bc8e175c988c8dc53dbc484
SHA17c069a0e54469453fdc91d57bfb0e82e2e539777
SHA2562f58298a3e901293b80ad5ebc164e53e76e079c3e86252f1b34f702c55ada96e
SHA512f90556ed1bd94a994d3a6573757f1214cfacb03ee5d6e1b8d277fb00f95371045e279b3a05189de7baf832605845d11a99196ac85de6c0ce050c611a9ab3b8ba
-
Filesize
10KB
MD5055f4f9260e07fc83f71877cbb7f4fad
SHA1a245131af1a182de99bd74af9ff1fab17977a72f
SHA2564209588362785b690d08d15cd982b8d1c62c348767ca19114234b21d5df74ddc
SHA512a8e82dc4435ed938f090f43df953ddad9b0075f16218c09890c996299420162d64b1dbfbf613af37769ae796717eec78204dc786b757e8b1d13d423d4ee82e26
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667