Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 10:26
Behavioral task
behavioral1
Sample
aaa3b6e224b12217592d65a7ffc844a2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aaa3b6e224b12217592d65a7ffc844a2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aaa3b6e224b12217592d65a7ffc844a2_JaffaCakes118.exe
-
Size
949KB
-
MD5
aaa3b6e224b12217592d65a7ffc844a2
-
SHA1
4b9c8271249280fe464bcb93ae45217b6fa43405
-
SHA256
437ffb21e0a393b3c6893183cb21bf35dad048b8bdbfb5f59aa281f6f035b4cf
-
SHA512
f3e6cde83e98227a92c1be9d347b0f50a777f9eb838ed2e00e92401b66e655733dc429685b2dabf263e420ecbfabe71bfd4c3116fb1e67e5b5533ad0262f4aaa
-
SSDEEP
12288:Fy30sHmR38KxpRUSTfOSpULxzMg21C62ZNAR8PwP0gxSn2FCCKEWfG0tDNH5Drp2:F20VRtUQHUtzMIveHvW2xK1OyD19pL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2796 defender.exe -
Loads dropped DLL 3 IoCs
pid Process 3004 aaa3b6e224b12217592d65a7ffc844a2_JaffaCakes118.exe 3004 aaa3b6e224b12217592d65a7ffc844a2_JaffaCakes118.exe 3004 aaa3b6e224b12217592d65a7ffc844a2_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3004-0-0x0000000000400000-0x00000000006EB000-memory.dmp upx behavioral1/files/0x0008000000018b89-10.dat upx behavioral1/memory/3004-20-0x0000000002A00000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-21-0x0000000000400000-0x0000000000A2A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Security Protection = "C:\\ProgramData\\defender.exe" defender.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: defender.exe File opened (read-only) \??\P: defender.exe File opened (read-only) \??\R: defender.exe File opened (read-only) \??\T: defender.exe File opened (read-only) \??\K: defender.exe File opened (read-only) \??\L: defender.exe File opened (read-only) \??\M: defender.exe File opened (read-only) \??\N: defender.exe File opened (read-only) \??\X: defender.exe File opened (read-only) \??\Y: defender.exe File opened (read-only) \??\E: defender.exe File opened (read-only) \??\G: defender.exe File opened (read-only) \??\U: defender.exe File opened (read-only) \??\W: defender.exe File opened (read-only) \??\Z: defender.exe File opened (read-only) \??\Q: defender.exe File opened (read-only) \??\S: defender.exe File opened (read-only) \??\J: defender.exe File opened (read-only) \??\V: defender.exe File opened (read-only) \??\H: defender.exe File opened (read-only) \??\I: defender.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 defender.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aaa3b6e224b12217592d65a7ffc844a2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language defender.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 aaa3b6e224b12217592d65a7ffc844a2_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 aaa3b6e224b12217592d65a7ffc844a2_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3004 aaa3b6e224b12217592d65a7ffc844a2_JaffaCakes118.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe 2796 defender.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2796 defender.exe 2796 defender.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2796 3004 aaa3b6e224b12217592d65a7ffc844a2_JaffaCakes118.exe 29 PID 3004 wrote to memory of 2796 3004 aaa3b6e224b12217592d65a7ffc844a2_JaffaCakes118.exe 29 PID 3004 wrote to memory of 2796 3004 aaa3b6e224b12217592d65a7ffc844a2_JaffaCakes118.exe 29 PID 3004 wrote to memory of 2796 3004 aaa3b6e224b12217592d65a7ffc844a2_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaa3b6e224b12217592d65a7ffc844a2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aaa3b6e224b12217592d65a7ffc844a2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\ProgramData\defender.exeC:\ProgramData\defender.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
861KB
MD5bd9d8d83cd4f148c57fd26526e9ed54f
SHA1a8189fbf4332f17532326eed1be0a0ca80d39f6b
SHA25677180d997c8c1fb59f459c62b3233ae59d1943eb6c7a2f90aba6213e92da6395
SHA5128a40f4fa13726dedc4534b7e268954db10d5575c8dfb10876acb4b49b8e8e75ff195226c51537aabdfccda061128c98bb278df99455dc90ddcb3a8437789a51c