Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
a8c9627989d461079b6de9b837f4da18_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a8c9627989d461079b6de9b837f4da18_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a8c9627989d461079b6de9b837f4da18_JaffaCakes118.exe
-
Size
378KB
-
MD5
a8c9627989d461079b6de9b837f4da18
-
SHA1
a82c8609050f8af942f3083e70d501b6fcf6caeb
-
SHA256
85d35bdfda88e08f81656c341f1ff9fd38f6835dfa700156ef09280afcc66b45
-
SHA512
9ab9f8cf6f74bb3758151806be4aaa9b7b25b3224766f1d6c89e66a85836213e53f9f7a452308d4fc69357099ad11afd9913d7b5ad79967e5191c72ede0c90bc
-
SSDEEP
6144:EsRudWIB4shhBWb1jqugi1lbF7QsjCyWJT+3HnGfCpN5j:EsR29tWb1jq81lPj5XGqV
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2792 svchost.exe 2728 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2792 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\svchost.exe a8c9627989d461079b6de9b837f4da18_JaffaCakes118.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2360 set thread context of 1800 2360 a8c9627989d461079b6de9b837f4da18_JaffaCakes118.exe 30 PID 2792 set thread context of 2728 2792 svchost.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8c9627989d461079b6de9b837f4da18_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2728 svchost.exe 2728 svchost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1800 2360 a8c9627989d461079b6de9b837f4da18_JaffaCakes118.exe 30 PID 2360 wrote to memory of 1800 2360 a8c9627989d461079b6de9b837f4da18_JaffaCakes118.exe 30 PID 2360 wrote to memory of 1800 2360 a8c9627989d461079b6de9b837f4da18_JaffaCakes118.exe 30 PID 2360 wrote to memory of 1800 2360 a8c9627989d461079b6de9b837f4da18_JaffaCakes118.exe 30 PID 2360 wrote to memory of 1800 2360 a8c9627989d461079b6de9b837f4da18_JaffaCakes118.exe 30 PID 2360 wrote to memory of 1800 2360 a8c9627989d461079b6de9b837f4da18_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2728 2792 svchost.exe 32 PID 2792 wrote to memory of 2728 2792 svchost.exe 32 PID 2792 wrote to memory of 2728 2792 svchost.exe 32 PID 2792 wrote to memory of 2728 2792 svchost.exe 32 PID 2792 wrote to memory of 2728 2792 svchost.exe 32 PID 2792 wrote to memory of 2728 2792 svchost.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8c9627989d461079b6de9b837f4da18_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a8c9627989d461079b6de9b837f4da18_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\a8c9627989d461079b6de9b837f4da18_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a8c9627989d461079b6de9b837f4da18_JaffaCakes118.exe"2⤵
- Drops file in System32 directory
PID:1800
-
-
C:\Windows\SysWOW64\config\svchost.exeC:\Windows\SysWOW64\config\svchost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\config\svchost.exeC:\Windows\SysWOW64\config\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
378KB
MD5a8c9627989d461079b6de9b837f4da18
SHA1a82c8609050f8af942f3083e70d501b6fcf6caeb
SHA25685d35bdfda88e08f81656c341f1ff9fd38f6835dfa700156ef09280afcc66b45
SHA5129ab9f8cf6f74bb3758151806be4aaa9b7b25b3224766f1d6c89e66a85836213e53f9f7a452308d4fc69357099ad11afd9913d7b5ad79967e5191c72ede0c90bc