Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 09:34
Static task
static1
Behavioral task
behavioral1
Sample
aa7d288ab0a457ae86edbfa9943fe981_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aa7d288ab0a457ae86edbfa9943fe981_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aa7d288ab0a457ae86edbfa9943fe981_JaffaCakes118.exe
-
Size
45KB
-
MD5
aa7d288ab0a457ae86edbfa9943fe981
-
SHA1
c4c50942c547bbb89ef2a76495891fbdcaad7b45
-
SHA256
0045e170bd7aed40630a1a98cacf8b5fa66e3bd4a100c1addf18af14d3d25974
-
SHA512
7d859f2f31bc9d96024d2f4de68ef9b9e33f92ef19be0ccb0b3fd77c85cac91b18f17d138788ea05cf27718d0b2bf799ded9db9a33efdbc647babfe16b9c0ffd
-
SSDEEP
768:9tlynoSYfjzQSgSk9pffmkNoJz+tnHujSC1pmeAZmX:fyOfnUvpfOAm6tnHuuRS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3036 TEM9E52.tmp -
Executes dropped EXE 1 IoCs
pid Process 3036 TEM9E52.tmp -
Loads dropped DLL 1 IoCs
pid Process 3016 aa7d288ab0a457ae86edbfa9943fe981_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa7d288ab0a457ae86edbfa9943fe981_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TEM9E52.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 3036 3016 aa7d288ab0a457ae86edbfa9943fe981_JaffaCakes118.exe 30 PID 3016 wrote to memory of 3036 3016 aa7d288ab0a457ae86edbfa9943fe981_JaffaCakes118.exe 30 PID 3016 wrote to memory of 3036 3016 aa7d288ab0a457ae86edbfa9943fe981_JaffaCakes118.exe 30 PID 3016 wrote to memory of 3036 3016 aa7d288ab0a457ae86edbfa9943fe981_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa7d288ab0a457ae86edbfa9943fe981_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aa7d288ab0a457ae86edbfa9943fe981_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\TEM9E52.tmp"C:\Users\Admin\AppData\Local\Temp\TEM9E52.tmp" /c del "C:\Users\Admin\AppData\Local\Temp\aa7d288ab0a457ae86edbfa9943fe981_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
295KB
MD5ad7b9c14083b52bc532fba5948342b98
SHA1ee8cbf12d87c4d388f09b4f69bed2e91682920b5
SHA25617f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae
SHA512e12aad20c824187b39edb3c7943709290b5ddbf1b4032988db46f2e86da3cf7e7783f78c82e4dc5da232f666b8f9799a260a1f8e2694eb4d0cdaf78da710fde1