Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
68s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
a4d194a281b7b1a5c3dd31b9df406b7d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a4d194a281b7b1a5c3dd31b9df406b7d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a4d194a281b7b1a5c3dd31b9df406b7d_JaffaCakes118.exe
-
Size
175KB
-
MD5
a4d194a281b7b1a5c3dd31b9df406b7d
-
SHA1
68a2728241d8b6295905ba650329ed632b2e151c
-
SHA256
3cfd48abc285db2cd706d204c6c8990e3afb9ec9338537ebfb5c91e943cace71
-
SHA512
cba7d37e71fcd79cf60817ba84ad176dd7f2979a938ec12fccb093a12cfe911f0921e236fd39addaa06ca5027916155625b3d2ee9c8671112447a52bcb260b79
-
SSDEEP
3072:JXred4YI4gHwWehX2SoaOL71Jri0I2XsftcgNvzXy1H:JXre2YOHkt2gO/1JO04tfNbiJ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\A489B\\E1ED3.exe" a4d194a281b7b1a5c3dd31b9df406b7d_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2564-2-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2360-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2360-12-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2564-15-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2564-16-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2304-83-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2564-84-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2564-158-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4d194a281b7b1a5c3dd31b9df406b7d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4d194a281b7b1a5c3dd31b9df406b7d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4d194a281b7b1a5c3dd31b9df406b7d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2360 2564 a4d194a281b7b1a5c3dd31b9df406b7d_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2360 2564 a4d194a281b7b1a5c3dd31b9df406b7d_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2360 2564 a4d194a281b7b1a5c3dd31b9df406b7d_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2360 2564 a4d194a281b7b1a5c3dd31b9df406b7d_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2304 2564 a4d194a281b7b1a5c3dd31b9df406b7d_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2304 2564 a4d194a281b7b1a5c3dd31b9df406b7d_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2304 2564 a4d194a281b7b1a5c3dd31b9df406b7d_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2304 2564 a4d194a281b7b1a5c3dd31b9df406b7d_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4d194a281b7b1a5c3dd31b9df406b7d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a4d194a281b7b1a5c3dd31b9df406b7d_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\a4d194a281b7b1a5c3dd31b9df406b7d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a4d194a281b7b1a5c3dd31b9df406b7d_JaffaCakes118.exe startC:\Program Files (x86)\LP\D3AA\FE5.exe%C:\Program Files (x86)\LP\D3AA2⤵
- System Location Discovery: System Language Discovery
PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\a4d194a281b7b1a5c3dd31b9df406b7d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a4d194a281b7b1a5c3dd31b9df406b7d_JaffaCakes118.exe startC:\Program Files (x86)\9B30B\lvvm.exe%C:\Program Files (x86)\9B30B2⤵
- System Location Discovery: System Language Discovery
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fed0c3ee8ec0826e2dfabcddbd22ae15
SHA18af732d04b133dba6f951c5d4506e945e5b07d3b
SHA2560a8e84dd798b05cc4af860546a34db6a3a2fd79bf541d164d42ab1d3e3574e19
SHA512dca1d5d1387d168fa9f0597d911c65cd2bd48e42dd920bd79e1525828d5c5af1ba99d5be5a2fdfc515fd4c3cd65380d559eb4945854fea8795a835bfda105a2c
-
Filesize
600B
MD5d4df2a344226a1fce0305c80158444e7
SHA13e000fb3f5cdf9175f9eed7f14fba989f4f1c58a
SHA2565c5b9257ae74febbde8eed081867ba3b2b5ad0947c312ddd3f36cef6526736c3
SHA512ba418785bff5e77600a64864f7dce7ed95ccb12b2c04a23e4327b783c6ede09560e4444316d7d40c58d83f82cfc1c825e800e42d60d72f67d4581b541f4bb8b8
-
Filesize
996B
MD50bb328c07837501b91e3ccfd79396b27
SHA1107fadeea81974ecd4112abf15f85ef9faf937cc
SHA2562ae532f99c077f344d264d70d1e623dc33e6cd78c76a9ab06deeda820f9d1419
SHA5129dcb672a5ff3dbe1cc5e90d96d258b2616083a39c5d0d050add851683d279bc5f0f21e9dc2d2b0b0828ec5a9e43d7e79eddd2c29bc6bc5018da45eebe6a1f390