Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 05:49
Static task
static1
Behavioral task
behavioral1
Sample
ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe
-
Size
157KB
-
MD5
ae15e63bf0c4f026a3e3a744f191f3b5
-
SHA1
38e4729d2f43d41c62a96c958834654095966935
-
SHA256
41bdb2a156eb347636f995c8665d9b8f57f018bd6fa4d31f3ae84f81a1f864d3
-
SHA512
1d8f70bf9f4fb814a2445e2047956922dde765ca2974d7cf18efd4cc4180176200a7b3e6f6c2cea3dcdf8e91788c4fd7c1e42e1eb53e418ffddf610534cc9f8d
-
SSDEEP
3072:OLg7gSiEuhSuvOJG05Wv9fhD62mifiXKXVrADfH5THU8D9N3GhdWg/Hdi:Jsdhdv7XVfhD62NiXiVrADRT0rWg/HI
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2428 contractstudio.exe 1288 updateupdate1.3.36.151.exe 1584 systemoperating.exe 1268 adobenppdf32.exe -
Loads dropped DLL 20 IoCs
pid Process 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1288 updateupdate1.3.36.151.exe 1288 updateupdate1.3.36.151.exe 1288 updateupdate1.3.36.151.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EngineOffice = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe" ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BCSSync = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\BCSSync.exe\" /DelayServices" ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\memcopyUpdate = "c:\\program files (x86)\\google\\update\\updateupdate1.3.36.151.exe" ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoftWarepgeqtot = "c:\\program files (x86)\\windows photo viewer\\ja-jp\\systemoperating.exe" ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\EngineSource = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe" ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicrosoftContract1.2.8800.00108171148 = "c:\\program files (x86)\\common files\\microsoft shared\\vsta\\pipeline.v10.0\\contracts\\contractstudio.exe" ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeAcrobat1.2.8800.0 = "c:\\program files (x86)\\adobe\\reader 9.0\\reader\\browser\\adobenppdf32.exe" ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\memcopypgeqtot = "c:\\program files (x86)\\common files\\system\\ado\\fr-fr\\msader15windows.exe" ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\GlobalOffice14.0.4730.1010 = "c:\\program files (x86)\\microsoft office\\media\\cagcat10\\officeglobal.exe" ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\ntdll.dll.dll ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe File created C:\Windows\SysWOW64\ntdll.dll.dll contractstudio.exe File created C:\Windows\SysWOW64\ntdll.dll.dll updateupdate1.3.36.151.exe File created C:\Windows\SysWOW64\ntdll.dll.dll systemoperating.exe File created C:\Windows\SysWOW64\ntdll.dll.dll adobenppdf32.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Update\UpdateUpdate1.3.36.151.exe ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Google\Update\UpdateUpdate1.3.36.151.exe ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe File created C:\Program Files (x86)\Windows Photo Viewer\ja-JP\SystemOperating.exe ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\ContractStudio.exe ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\System\ado\fr-FR\msader15Windows.exe ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\OfficeGlobal.exe ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\AdobeNPPDF32.exe ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language contractstudio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language updateupdate1.3.36.151.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systemoperating.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobenppdf32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2428 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 31 PID 1628 wrote to memory of 2428 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 31 PID 1628 wrote to memory of 2428 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 31 PID 1628 wrote to memory of 2428 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 31 PID 1628 wrote to memory of 1288 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 32 PID 1628 wrote to memory of 1288 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 32 PID 1628 wrote to memory of 1288 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 32 PID 1628 wrote to memory of 1288 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 32 PID 1628 wrote to memory of 1288 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 32 PID 1628 wrote to memory of 1288 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 32 PID 1628 wrote to memory of 1288 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 32 PID 1628 wrote to memory of 1584 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 33 PID 1628 wrote to memory of 1584 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 33 PID 1628 wrote to memory of 1584 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 33 PID 1628 wrote to memory of 1584 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 33 PID 1628 wrote to memory of 1268 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 34 PID 1628 wrote to memory of 1268 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 34 PID 1628 wrote to memory of 1268 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 34 PID 1628 wrote to memory of 1268 1628 ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ae15e63bf0c4f026a3e3a744f191f3b5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1628 -
\??\c:\program files (x86)\common files\microsoft shared\vsta\pipeline.v10.0\contracts\contractstudio.exe"c:\program files (x86)\common files\microsoft shared\vsta\pipeline.v10.0\contracts\contractstudio.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2428
-
-
\??\c:\program files (x86)\google\update\updateupdate1.3.36.151.exe"c:\program files (x86)\google\update\updateupdate1.3.36.151.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1288
-
-
\??\c:\program files (x86)\windows photo viewer\ja-jp\systemoperating.exe"c:\program files (x86)\windows photo viewer\ja-jp\systemoperating.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1584
-
-
\??\c:\program files (x86)\adobe\reader 9.0\reader\browser\adobenppdf32.exe"c:\program files (x86)\adobe\reader 9.0\reader\browser\adobenppdf32.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\ContractStudio.exe
Filesize157KB
MD5ae15e63bf0c4f026a3e3a744f191f3b5
SHA138e4729d2f43d41c62a96c958834654095966935
SHA25641bdb2a156eb347636f995c8665d9b8f57f018bd6fa4d31f3ae84f81a1f864d3
SHA5121d8f70bf9f4fb814a2445e2047956922dde765ca2974d7cf18efd4cc4180176200a7b3e6f6c2cea3dcdf8e91788c4fd7c1e42e1eb53e418ffddf610534cc9f8d