Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 16:43
Static task
static1
Behavioral task
behavioral1
Sample
b004513a8b32bedc233b4956057be033_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b004513a8b32bedc233b4956057be033_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b004513a8b32bedc233b4956057be033_JaffaCakes118.exe
-
Size
291KB
-
MD5
b004513a8b32bedc233b4956057be033
-
SHA1
5e35dceabbcd8d543620307ff12ad4133020201f
-
SHA256
2237681a8e05195486312091795a37839dcdbcfd3aa7ba970d7790243a135e0b
-
SHA512
0693c2f1e5f8bb92c91bd42f71d99c99cc839b4d543af94d2be259532d4f58362d4db79b91e74ab538b0c2c481a80a3d30b69161821df39c5195c9f6704c96b3
-
SSDEEP
6144:tFTbEMEvDpB7wY4n74fHyjZRVkcHpy7u/qbWhp+KW:tevvVZu7WoZRVvcu/qqhppW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1724 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3024 mimeda.exe -
Loads dropped DLL 2 IoCs
pid Process 2436 b004513a8b32bedc233b4956057be033_JaffaCakes118.exe 2436 b004513a8b32bedc233b4956057be033_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\{36F482E8-6FE9-AD4F-5F98-37194FCB1404} = "C:\\Users\\Admin\\AppData\\Roaming\\Ytna\\mimeda.exe" mimeda.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2436 set thread context of 1724 2436 b004513a8b32bedc233b4956057be033_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b004513a8b32bedc233b4956057be033_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Privacy b004513a8b32bedc233b4956057be033_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" b004513a8b32bedc233b4956057be033_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe 3024 mimeda.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2436 b004513a8b32bedc233b4956057be033_JaffaCakes118.exe 3024 mimeda.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2436 wrote to memory of 3024 2436 b004513a8b32bedc233b4956057be033_JaffaCakes118.exe 30 PID 2436 wrote to memory of 3024 2436 b004513a8b32bedc233b4956057be033_JaffaCakes118.exe 30 PID 2436 wrote to memory of 3024 2436 b004513a8b32bedc233b4956057be033_JaffaCakes118.exe 30 PID 2436 wrote to memory of 3024 2436 b004513a8b32bedc233b4956057be033_JaffaCakes118.exe 30 PID 3024 wrote to memory of 1040 3024 mimeda.exe 17 PID 3024 wrote to memory of 1040 3024 mimeda.exe 17 PID 3024 wrote to memory of 1040 3024 mimeda.exe 17 PID 3024 wrote to memory of 1040 3024 mimeda.exe 17 PID 3024 wrote to memory of 1040 3024 mimeda.exe 17 PID 3024 wrote to memory of 1068 3024 mimeda.exe 18 PID 3024 wrote to memory of 1068 3024 mimeda.exe 18 PID 3024 wrote to memory of 1068 3024 mimeda.exe 18 PID 3024 wrote to memory of 1068 3024 mimeda.exe 18 PID 3024 wrote to memory of 1068 3024 mimeda.exe 18 PID 3024 wrote to memory of 1092 3024 mimeda.exe 19 PID 3024 wrote to memory of 1092 3024 mimeda.exe 19 PID 3024 wrote to memory of 1092 3024 mimeda.exe 19 PID 3024 wrote to memory of 1092 3024 mimeda.exe 19 PID 3024 wrote to memory of 1092 3024 mimeda.exe 19 PID 3024 wrote to memory of 2044 3024 mimeda.exe 23 PID 3024 wrote to memory of 2044 3024 mimeda.exe 23 PID 3024 wrote to memory of 2044 3024 mimeda.exe 23 PID 3024 wrote to memory of 2044 3024 mimeda.exe 23 PID 3024 wrote to memory of 2044 3024 mimeda.exe 23 PID 3024 wrote to memory of 2436 3024 mimeda.exe 29 PID 3024 wrote to memory of 2436 3024 mimeda.exe 29 PID 3024 wrote to memory of 2436 3024 mimeda.exe 29 PID 3024 wrote to memory of 2436 3024 mimeda.exe 29 PID 3024 wrote to memory of 2436 3024 mimeda.exe 29 PID 2436 wrote to memory of 1724 2436 b004513a8b32bedc233b4956057be033_JaffaCakes118.exe 31 PID 2436 wrote to memory of 1724 2436 b004513a8b32bedc233b4956057be033_JaffaCakes118.exe 31 PID 2436 wrote to memory of 1724 2436 b004513a8b32bedc233b4956057be033_JaffaCakes118.exe 31 PID 2436 wrote to memory of 1724 2436 b004513a8b32bedc233b4956057be033_JaffaCakes118.exe 31 PID 2436 wrote to memory of 1724 2436 b004513a8b32bedc233b4956057be033_JaffaCakes118.exe 31 PID 2436 wrote to memory of 1724 2436 b004513a8b32bedc233b4956057be033_JaffaCakes118.exe 31 PID 2436 wrote to memory of 1724 2436 b004513a8b32bedc233b4956057be033_JaffaCakes118.exe 31 PID 2436 wrote to memory of 1724 2436 b004513a8b32bedc233b4956057be033_JaffaCakes118.exe 31 PID 2436 wrote to memory of 1724 2436 b004513a8b32bedc233b4956057be033_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1040
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\b004513a8b32bedc233b4956057be033_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b004513a8b32bedc233b4956057be033_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Roaming\Ytna\mimeda.exe"C:\Users\Admin\AppData\Roaming\Ytna\mimeda.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3024
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp69454fb5.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1724
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1092
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5b8daa3a0bedaae0eaef72f23c582d593
SHA1e6be9f2e49e731300aafe3934b92a3438d4035a0
SHA2564ac02550cd60aa39fc236737e5f2542b3c1b93bc135032ccafc72ea1af9fede0
SHA5120d0802c77611f89885c04ebf576769d14b21a50c5a2dd62c8613d045ae1d81314d55fa624385614164c149d93884a9f1b88f9c3623023d763040c36389c76038
-
Filesize
291KB
MD526b1a6fc8c667150ebc209f3b6f1da53
SHA12ea634a3e5409ae248d2878de355cdaee2230215
SHA25618556b821ea0e2ac655324f699b46f2c320e95926c01688d58537c8a67ae86f0
SHA5127fe7cef1ce80b8429d23d584fbb9f0024a605fb11a3e0e23b5915166ae86a1f004d7a7a3c9c50a260efc9963678a14a052d98aff33167c1eaf0329c04e3882a4