Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe
-
Size
480KB
-
MD5
a6be847129d1cdb525b5a3ba114f18b4
-
SHA1
cceb30b640ad51b1f8b2266827661a42a8ee432e
-
SHA256
a6e67b7690d7334c610176aa961840a2f80eb678e2fed2c4a6c5a7e9cd3f4155
-
SHA512
f58861f24c650505e70992bafceb64a9c16177d68a8dd88d496a8cd5be4a2e60ec95d22864d1e169d48bf1141c892774e7e77fb552e3456869d34a1f1f686db2
-
SSDEEP
6144:dajvIDIUlI+0Qd/VCr2U1QaMjAlm2yMm0CAvEEw0IlaNFKGbH1XOOAlv:dII/QgVCr2UiaMjA7yMm04Ewnhv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2336 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2732 svohst.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\Deleteme.bat a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe File created C:\Windows\SysWOW64\svohst.exe a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\svohst.exe a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svohst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2336 2864 a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe 32 PID 2864 wrote to memory of 2336 2864 a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe 32 PID 2864 wrote to memory of 2336 2864 a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe 32 PID 2864 wrote to memory of 2336 2864 a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Deleteme.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2336
-
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\SysWOW64\svohst.exe -NetSata1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5c609f2e97c3b37bee494720d590961da
SHA1d2b53d184d52d13b58df0f4cb6173ef5dc945a81
SHA25633e797ced36fc8a33c46d134cd791af171eab92f005d5904b19006ae699577a1
SHA51248603f604ecd0116f5ac14aea239f18cce28efb4ec1e6411ccfd451c5c783f4cf32a5b5cd6469054cfde7da56b54497c2e187f415c41ba8f1e1d040588a2e38f
-
Filesize
480KB
MD5a6be847129d1cdb525b5a3ba114f18b4
SHA1cceb30b640ad51b1f8b2266827661a42a8ee432e
SHA256a6e67b7690d7334c610176aa961840a2f80eb678e2fed2c4a6c5a7e9cd3f4155
SHA512f58861f24c650505e70992bafceb64a9c16177d68a8dd88d496a8cd5be4a2e60ec95d22864d1e169d48bf1141c892774e7e77fb552e3456869d34a1f1f686db2