Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 15:01
Static task
static1
Behavioral task
behavioral1
Sample
ab7b715fc32b384bd7d3d4c191a1350a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ab7b715fc32b384bd7d3d4c191a1350a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ab7b715fc32b384bd7d3d4c191a1350a_JaffaCakes118.exe
-
Size
48KB
-
MD5
ab7b715fc32b384bd7d3d4c191a1350a
-
SHA1
54e01ca09fcf1bb1e6fef881a2328d4803997d3d
-
SHA256
d4fb4c11e2099a60d7143ee6ee727c45880d73741ee6470a5ac89ecb7d181d3b
-
SHA512
ab95b559be6bfcba4ee11e66d00171f74adcc52fcf5d97bce04210c515e6e5882a4897149d01a8e09aa0174da7380f140fe8f1be2f75973fbd1f43c8dd4f5abc
-
SSDEEP
384:JAFyhhh2x9dmHgy98seYmlgyw1CYEmCSHZrwH8EfpyDXkyp7z3F0j9X9YlHMsMN2:L8CACReRgxExJHEkG0j9XCHMsaM/
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VaccP = "C:\\Program Files\\VaccinePro\\VaccPD.exe" ab7b715fc32b384bd7d3d4c191a1350a_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab7b715fc32b384bd7d3d4c191a1350a_JaffaCakes118.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\s_winwin = "1" ab7b715fc32b384bd7d3d4c191a1350a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\AboutURLs ab7b715fc32b384bd7d3d4c191a1350a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab7b715fc32b384bd7d3d4c191a1350a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ab7b715fc32b384bd7d3d4c191a1350a_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2136