Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 14:25
Static task
static1
Behavioral task
behavioral1
Sample
a700f3fa0a5022c8f6e7e8dee63f7980_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a700f3fa0a5022c8f6e7e8dee63f7980_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a700f3fa0a5022c8f6e7e8dee63f7980_JaffaCakes118.exe
-
Size
136KB
-
MD5
a700f3fa0a5022c8f6e7e8dee63f7980
-
SHA1
9b7bb5746970f6c19b431c848fdd3412f70d9391
-
SHA256
90faf09201883b1c21cd12ee971565d74b56a0485d9e8130666dc51d40ee718f
-
SHA512
e51633b9fec76019134ccc8dc8f57928b5659a61c86079f2096ef0361b61961f35f4e6bedd205b6a3478996e67860e4abb50fee8c7edfb9c5df68ad777541ee2
-
SSDEEP
3072:h/B/FFRm6XZtztFaSy3kJzXMF8i8I4SE1bMppw1lXOPXsInXVb:h/LmxUZsDPZE1Mppw1lXOPXsInl
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SystemMigration = "C:\\Windows\\WinMedia.exe" a700f3fa0a5022c8f6e7e8dee63f7980_JaffaCakes118.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\WINDOWS\lala.txt cmd.exe File created C:\WINDOWS\lala2.txt a700f3fa0a5022c8f6e7e8dee63f7980_JaffaCakes118.exe File created C:\Windows\WinMedia.exe a700f3fa0a5022c8f6e7e8dee63f7980_JaffaCakes118.exe File opened for modification C:\Windows\WinMedia.exe a700f3fa0a5022c8f6e7e8dee63f7980_JaffaCakes118.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a700f3fa0a5022c8f6e7e8dee63f7980_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2180 a700f3fa0a5022c8f6e7e8dee63f7980_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2744 2180 a700f3fa0a5022c8f6e7e8dee63f7980_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2744 2180 a700f3fa0a5022c8f6e7e8dee63f7980_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2744 2180 a700f3fa0a5022c8f6e7e8dee63f7980_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2744 2180 a700f3fa0a5022c8f6e7e8dee63f7980_JaffaCakes118.exe 30 PID 2744 wrote to memory of 1064 2744 cmd.exe 32 PID 2744 wrote to memory of 1064 2744 cmd.exe 32 PID 2744 wrote to memory of 1064 2744 cmd.exe 32 PID 2744 wrote to memory of 1064 2744 cmd.exe 32 PID 2180 wrote to memory of 2732 2180 a700f3fa0a5022c8f6e7e8dee63f7980_JaffaCakes118.exe 34 PID 2180 wrote to memory of 2732 2180 a700f3fa0a5022c8f6e7e8dee63f7980_JaffaCakes118.exe 34 PID 2180 wrote to memory of 2732 2180 a700f3fa0a5022c8f6e7e8dee63f7980_JaffaCakes118.exe 34 PID 2180 wrote to memory of 2732 2180 a700f3fa0a5022c8f6e7e8dee63f7980_JaffaCakes118.exe 34 PID 2732 wrote to memory of 2672 2732 cmd.exe 36 PID 2732 wrote to memory of 2672 2732 cmd.exe 36 PID 2732 wrote to memory of 2672 2732 cmd.exe 36 PID 2732 wrote to memory of 2672 2732 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\a700f3fa0a5022c8f6e7e8dee63f7980_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a700f3fa0a5022c8f6e7e8dee63f7980_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\cmd.execmd.exe /c netsh dump > C:/WINDOWS/lala.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\netsh.exenetsh dump3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1064
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c netsh exec C:/WINDOWS/lala2.txt2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\netsh.exenetsh exec C:/WINDOWS/lala2.txt3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2672
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5dfe4f6b192a47c468a6dc3aff4d95691
SHA10eaaed79b8ea2c6946d739fabbe32e99ccd13076
SHA2563177a401de08418239baad1c9fdcf3d6539c76c63f3b8e434be41cdcb1864e60
SHA512b2c8cdf7310c681e8133da83e96a150c8dc14ac80a6d6bde6d898a2edfba0da96d8a2c5bc032224d780b6001de686c1491fa107668dcea67e1b9d860c7903b2d
-
Filesize
7KB
MD5de5028745569d8d1916152524614a229
SHA10539eca1c005061f0c0a40021e83852fac73632a
SHA2566573e66f33bfbab8003c7868aba2b66a29d9c8ed4cba0a60b7112a92a8f2d0fa
SHA5121803d606a805bbdc63a6b98cbd978287e663e253b034b4a1ae08cb2391540b49d958af78310b937ba43f7aae97ed674e12365e6211426b9ca7d234ba5391fe08