Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 08:56
Static task
static1
Behavioral task
behavioral1
Sample
a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe
-
Size
309KB
-
MD5
a627237a73eb63743343a49ea95f5f2c
-
SHA1
99c6c43908418ac9b7165d82d088be590a1fdc89
-
SHA256
bc8c6da95a3d1c1b04267fac9f37f01c1c27ebc8dcb48faa4646df223660364c
-
SHA512
33eb39b36c619585dc77639acedb5ee067c0f9ad4b040f9e9927299c94cf94494d118f079310b5b9d634f145047fac668cb326dcda679ec9e788c495ba59b832
-
SSDEEP
6144:8ipx7Bq5oeVH8dJs07odRmY8B39m/6MMMm/v9ZNJKE7k1Jtj0Ssha9xP50C4:nqh66Tmvtm/IH9JJk17Lsh8dv4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1648 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2268 haqi.exe -
Loads dropped DLL 2 IoCs
pid Process 2236 a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe 2236 a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\{C6C07C68-68EF-AD4F-3837-F372201AD06F} = "C:\\Users\\Admin\\AppData\\Roaming\\Buquny\\haqi.exe" haqi.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2236 set thread context of 1648 2236 a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language haqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Privacy a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe 2268 haqi.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2236 a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe Token: SeSecurityPrivilege 2236 a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe Token: SeSecurityPrivilege 2236 a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2236 a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe 2268 haqi.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2268 2236 a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe 31 PID 2236 wrote to memory of 2268 2236 a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe 31 PID 2236 wrote to memory of 2268 2236 a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe 31 PID 2236 wrote to memory of 2268 2236 a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe 31 PID 2268 wrote to memory of 1108 2268 haqi.exe 19 PID 2268 wrote to memory of 1108 2268 haqi.exe 19 PID 2268 wrote to memory of 1108 2268 haqi.exe 19 PID 2268 wrote to memory of 1108 2268 haqi.exe 19 PID 2268 wrote to memory of 1108 2268 haqi.exe 19 PID 2268 wrote to memory of 1204 2268 haqi.exe 20 PID 2268 wrote to memory of 1204 2268 haqi.exe 20 PID 2268 wrote to memory of 1204 2268 haqi.exe 20 PID 2268 wrote to memory of 1204 2268 haqi.exe 20 PID 2268 wrote to memory of 1204 2268 haqi.exe 20 PID 2268 wrote to memory of 1224 2268 haqi.exe 21 PID 2268 wrote to memory of 1224 2268 haqi.exe 21 PID 2268 wrote to memory of 1224 2268 haqi.exe 21 PID 2268 wrote to memory of 1224 2268 haqi.exe 21 PID 2268 wrote to memory of 1224 2268 haqi.exe 21 PID 2268 wrote to memory of 752 2268 haqi.exe 25 PID 2268 wrote to memory of 752 2268 haqi.exe 25 PID 2268 wrote to memory of 752 2268 haqi.exe 25 PID 2268 wrote to memory of 752 2268 haqi.exe 25 PID 2268 wrote to memory of 752 2268 haqi.exe 25 PID 2268 wrote to memory of 2236 2268 haqi.exe 30 PID 2268 wrote to memory of 2236 2268 haqi.exe 30 PID 2268 wrote to memory of 2236 2268 haqi.exe 30 PID 2268 wrote to memory of 2236 2268 haqi.exe 30 PID 2268 wrote to memory of 2236 2268 haqi.exe 30 PID 2236 wrote to memory of 1648 2236 a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe 32 PID 2236 wrote to memory of 1648 2236 a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe 32 PID 2236 wrote to memory of 1648 2236 a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe 32 PID 2236 wrote to memory of 1648 2236 a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe 32 PID 2236 wrote to memory of 1648 2236 a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe 32 PID 2236 wrote to memory of 1648 2236 a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe 32 PID 2236 wrote to memory of 1648 2236 a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe 32 PID 2236 wrote to memory of 1648 2236 a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe 32 PID 2236 wrote to memory of 1648 2236 a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1204
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a627237a73eb63743343a49ea95f5f2c_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Roaming\Buquny\haqi.exe"C:\Users\Admin\AppData\Roaming\Buquny\haqi.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2268
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa2f06116.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1648
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5d86fe101d918d243a2ec086bb288baa4
SHA10666a0a9a9dc1f3ad92bb78a0633ef57ce12967e
SHA256ca2802f5a7762c16cc2aeb07d96f65d53c1027bf61aa0a4eb4a7cee07ff6a291
SHA51212e5c74201b97344133e500ac3c6e140c5f0cb66b05f4954782f7eae0de263628c2bfa0255136a3d8dd78246642aec4716d943a7db55256a526648dda09bc304
-
Filesize
380B
MD579202a1fec7be44abb7efd7a0393cf60
SHA1ed81ff66ce1b0281714c54b4fc72e4d20a07ded9
SHA2561f9b81f6f15371652d6a481f131e0d69553ad3efbaf5064bdfc1bee59adbef3f
SHA5127a8029c1b3e01404e214e50a4a4a009ee7c5a104b75ab710d95f7403e8c939362a684479e878b2d94b9c6356559fc765cfefa221247f9cdbef81102545c5d05c
-
Filesize
309KB
MD53e8dc2596294125f3edd34aa172d5635
SHA1b84330e7d4fe4f8dbbb05a66850f0f22f70c73c9
SHA256dadbfd02715646ca5dceb300e98311530754d8f9dde03ae3d7081712eff39609
SHA51251bb73af864554cbdd779e32843d1fe97244420c72550594c358cf0ee3fd220cbb1d6e8f7d6cef5a5d528f9266646dc44353c03397c029852435c104115289eb