Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
ac8a19aa396c0e36de3062b555a0710f
-
SHA1
4f876961a6ee86b029ecdf33bdccb1e35f299460
-
SHA256
34abdf449c108aa88b479eaa59ba4e8ddbde0a6e2e34869af0392d5f2865d6ee
-
SHA512
005d4d7e07f45690667190c193916cbe6907d6d430d4ec80da99711c4a6881ff68050e37f7e632f06c88756b5d356570151fbeaa8440d7655d19a33f1f77bc95
-
SSDEEP
24576:4ZxTIGZ5daCDmWMfeCc85BuHkW1yKHl8V/4AIpLlouWQYNyBcSdC96L6q4TPaxPM:4XT3ZHDKFBsBl8VAHsxN73RNLDR
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0003000000017801-6.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 1616 CNL.exe 2972 STB-09.exe -
Loads dropped DLL 5 IoCs
pid Process 2192 ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe 2192 ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe 2192 ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe 1616 CNL.exe 2972 STB-09.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CNL Start = "C:\\Windows\\SysWOW64\\FHSEXG\\CNL.exe" CNL.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\FHSEXG\CNL.004 ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe File created C:\Windows\SysWOW64\FHSEXG\CNL.001 ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe File created C:\Windows\SysWOW64\FHSEXG\CNL.002 ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe File created C:\Windows\SysWOW64\FHSEXG\AKV.exe ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe File created C:\Windows\SysWOW64\FHSEXG\CNL.exe ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\FHSEXG\ CNL.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CNL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language STB-09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 1616 CNL.exe Token: SeIncBasePriorityPrivilege 1616 CNL.exe Token: SeIncBasePriorityPrivilege 1616 CNL.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1616 CNL.exe 1616 CNL.exe 1616 CNL.exe 1616 CNL.exe 2972 STB-09.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2192 wrote to memory of 1616 2192 ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe 30 PID 2192 wrote to memory of 1616 2192 ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe 30 PID 2192 wrote to memory of 1616 2192 ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe 30 PID 2192 wrote to memory of 1616 2192 ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2972 2192 ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe 31 PID 2192 wrote to memory of 2972 2192 ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe 31 PID 2192 wrote to memory of 2972 2192 ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe 31 PID 2192 wrote to memory of 2972 2192 ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe 31 PID 1616 wrote to memory of 2592 1616 CNL.exe 32 PID 1616 wrote to memory of 2592 1616 CNL.exe 32 PID 1616 wrote to memory of 2592 1616 CNL.exe 32 PID 1616 wrote to memory of 2592 1616 CNL.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\FHSEXG\CNL.exe"C:\Windows\system32\FHSEXG\CNL.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\FHSEXG\CNL.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:2592
-
-
-
C:\Users\Admin\AppData\Local\Temp\STB-09.exe"C:\Users\Admin\AppData\Local\Temp\STB-09.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
249KB
MD566df62cccbef60a833c5fc35f0c784d7
SHA1368750b0e379ed242867bc442ebeac3e6d9c3c61
SHA25655cbb6a102bda34a54b2bacfdd2a5f02926a5ccd78d17a375b3dba15a0c37f39
SHA51239dd3ce0c83ad0af71991f05fff5c3c482c8eb2432e508abfd312245da1b0345db0d6425f8ae7dd1c39072fcbc25b1c6b152de6b8ee895db29eacac97813e82d
-
Filesize
456KB
MD5a65c554c77c4607a4efdef07b9503fb9
SHA14faa215bd772deb3223dac1601972fce2f6c05f1
SHA2567d32aa95d682ac91df6efa4efc01e5675f69e72fc9821632006111df44e08d7c
SHA51244be9403aff24e3bdb886a883b7ad8fa06950d969ef1588c4dab43fcc030768d4797fd4ce645ddfe49949d6a97fac5061f2d840ab086b5e43189e5adb441438a
-
Filesize
43KB
MD5c04e0de732e8f56b401e409c4417149c
SHA17b260b3600345fb72af9fd0e4025b4a125c8dd08
SHA2560d359c2c70001f56c14e7e29a12456c82606bb9a46f9db1f8216a9087775dec6
SHA512d9e2bf02bcb144a8c37e05cb2544ca46fe93e1f2b5a4e08832d533ab9348ddb9153b5c36efa4186d625a80af5d546331d740a13f43c5195ccb4829c98eaa69b0
-
Filesize
1KB
MD50bd62bfd704775e87ad02803fa43a08d
SHA171d1b148f9a02a41ae9fb9509afd8b8c30c659bc
SHA256003705607c52e94082e387bb103c75b59cc523d401408fe28aecc9f82891e14b
SHA51255d8160a75b999c7f0de2c90d0884d5050b22616c26b58a30fa02ae5b97ffd1e9bf0ef969b0b2970111816da6382c5b0328cfe50d8308fa15918f7088521c186
-
Filesize
61KB
MD586b63726200d9ff6662fd2de00b9fcaa
SHA1f4ecf611b4dca6c60901993a10b44e8c485f9b95
SHA256b203eb072b0e912d402ba0c5652a13f788d3b69abf6ef73ca01d9ad9317b7eaf
SHA512ce116dfb3244fe68b8fb42875fba4e512f4cdc586bec5945428f4a0a539169ac84292cdb3310e4974eb2c4342b6205e8fee32e47a2840b104cf28db9e1750c3a
-
Filesize
1.5MB
MD582dc38922620ab6a5850f391584d2657
SHA1ef30f091ff7aa242600f19e87f2b7b0cd7b0764f
SHA256b464e42b8dfef6629030283e19c20bcc69d6d7c1bf9bb7e8df472f762debcea2
SHA5124ec72c1d1599721ee1205f46a74a71fb67801e4d7aa6ca55907c2461a03c41cc3e1333e0b4ed9631b92e2310f45bf27cf865a5cc7ee2507e92f58cdb467023e8