Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 16:27
Behavioral task
behavioral1
Sample
aff5c63b84a430a7c61de6c845833a35_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aff5c63b84a430a7c61de6c845833a35_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aff5c63b84a430a7c61de6c845833a35_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
aff5c63b84a430a7c61de6c845833a35
-
SHA1
78bae340d1dce238204f1321af69f3ac7b42f620
-
SHA256
d27e429b30898e790cd3507fc16a6f257c653279169e2acb93350226a225335e
-
SHA512
ae62076f9faef2610de5d9cb74afaf02f3394e375c83aa62049af28e14ccd4f68cde11fbcd232883ed77af04b33647bea60193d69690ad1c4420d6376dc86d82
-
SSDEEP
49152:cHjsdFMMSlhd9j7H3jeKoW1PjTT1v7Sr82Wap:n0MSv7Xj19PjN2v
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0005000000018fac-21.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 2848 install.exe 2604 CXJL.exe -
Loads dropped DLL 11 IoCs
pid Process 2848 install.exe 2848 install.exe 2848 install.exe 2604 CXJL.exe 2604 CXJL.exe 2604 CXJL.exe 2604 CXJL.exe 2604 CXJL.exe 652 DllHost.exe 652 DllHost.exe 2848 install.exe -
resource yara_rule behavioral1/memory/2728-4-0x0000000000400000-0x0000000000700000-memory.dmp themida behavioral1/memory/2728-11-0x0000000000400000-0x0000000000700000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CXJL Agent = "C:\\Windows\\SysWOW64\\28463\\CXJL.exe" CXJL.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\CXJL.001 install.exe File created C:\Windows\SysWOW64\28463\CXJL.006 install.exe File created C:\Windows\SysWOW64\28463\CXJL.007 install.exe File created C:\Windows\SysWOW64\28463\CXJL.exe install.exe File created C:\Windows\SysWOW64\28463\AKV.exe install.exe File opened for modification C:\Windows\SysWOW64\28463 CXJL.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\install.exe aff5c63b84a430a7c61de6c845833a35_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aff5c63b84a430a7c61de6c845833a35_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CXJL.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2728 aff5c63b84a430a7c61de6c845833a35_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2604 CXJL.exe Token: SeIncBasePriorityPrivilege 2604 CXJL.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 652 DllHost.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2604 CXJL.exe 2604 CXJL.exe 2604 CXJL.exe 2604 CXJL.exe 2604 CXJL.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2848 2728 aff5c63b84a430a7c61de6c845833a35_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2848 2728 aff5c63b84a430a7c61de6c845833a35_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2848 2728 aff5c63b84a430a7c61de6c845833a35_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2848 2728 aff5c63b84a430a7c61de6c845833a35_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2848 2728 aff5c63b84a430a7c61de6c845833a35_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2848 2728 aff5c63b84a430a7c61de6c845833a35_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2848 2728 aff5c63b84a430a7c61de6c845833a35_JaffaCakes118.exe 30 PID 2848 wrote to memory of 2604 2848 install.exe 31 PID 2848 wrote to memory of 2604 2848 install.exe 31 PID 2848 wrote to memory of 2604 2848 install.exe 31 PID 2848 wrote to memory of 2604 2848 install.exe 31 PID 2848 wrote to memory of 2604 2848 install.exe 31 PID 2848 wrote to memory of 2604 2848 install.exe 31 PID 2848 wrote to memory of 2604 2848 install.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\aff5c63b84a430a7c61de6c845833a35_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aff5c63b84a430a7c61de6c845833a35_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\install.exe"C:\Windows\install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\28463\CXJL.exe"C:\Windows\system32\28463\CXJL.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2604
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD500e6725f261d4ce29024138ac9f8739b
SHA1353849cc6e72abd9676fb06405d73b6d0a9697ef
SHA25640f702f0b9e0ab3755006a00f8f70863ad23e79994037537f7785b7cdc78c3e6
SHA512d904aee8ec6a5f3091b3ea5ff64a34582179a96a608257d999232db168196d97cb862d481af870c4edf9571ef285432f46decd206e00992d472e93c8c5f3ba53
-
Filesize
394KB
MD5b87e2e56dbf34fb12705317f4d361c12
SHA13b4a6c2fddaab9f71747437c60dc7ad85661b4fa
SHA2561ed5873542484a3f4c898de6684fc04bc0929e4fc795cd09b4b86f17e817d85a
SHA5129d1bf05a200efda561f3141d3a4c70a347ba2a64fbfb5fb9b432956660b4aabc492f93fa50ba1928a3c408ec048c357a50cb79d12ba6200b28b1aeb98dbc39a0
-
Filesize
520B
MD5c4647e42f2b55e111c413c09f7d982f2
SHA1e76fd1ef6ba49b277b8636cd5e84436a2da818dc
SHA25626d2428b69a861a8cb59a1162d26dd5393f2f1f4ca1c63cf0f2182390d1cb1b5
SHA512339d4d89ab962ee75557590597004c5eca7ea839d41dc9f19ecf1b3683a7e1c330c990c5382e42e5913c3bcc547f7e4812df927bede548f6590b1838e8cba19e
-
Filesize
8KB
MD5aae8ccee5d5eed5748d13f474123efea
SHA16da78da4de3b99a55fad00be2ec53a3ad3bd06ae
SHA25610c464d1675774e0282171555d59fb8975ed6c0e6a781182490f48e66823a5b8
SHA512d370e1ffeeb81b3f07b83a9cf1e3b44635fde7aa6ac999bccafece8091dbf96f0a78257bb0e03b3689dc47fb4e96ec7deac7848a43ddef62afc9b8cc665ee8bd
-
Filesize
5KB
MD540685d22d05d92462a2cfc1bba9a81b7
SHA1f0e19012d0ed000148898b1e1264736bed438da8
SHA256cdca1e5bc4c5129caa8eeddf637c820b6241c8790ce1a341e38e8324ae95afa0
SHA51221961d2dd118b45bde4cf00b4570712791a22769d05afb5b6c54355b0aaee9b7f7de00b357845349ef957807452365134d51e11181d2d45f98ed0cc9402de90b
-
Filesize
520KB
MD5c7046ed479051d90bf1a6413a807bb06
SHA1a0170434adcaf4bf95492d9b72005d499bb684cb
SHA256a8fd606760917204a2d894cea6051f06f3fb18d412982dd40426108198af89cc
SHA512aded91e1c6b1ae126d719894efda734713f5a0089b6f89d438efeee378981fd452640fb7de4da2c145b47fa7885b7a96f2239d108ce9e9d4bf0ee78b3abffcd0
-
Filesize
4KB
MD527092ec75c1839f36bfe900a38acc484
SHA1fe14b750a0ed653246c5f358891f8c1241913bb2
SHA256e6e29699840ae26c452227f9a1c9fd0e3cda0c2413c4255df9fc066c47af0e07
SHA512815477e8681e38dd3110171adbaf06738eb9d63839671a959a296ec1a1fb17d788682dde5e6a1f0bffa3b4deda4577292ffa37ce10b95ad14276ffcd0795ac0b
-
Filesize
473KB
MD5339ae4ce820cda75bbb363b2ed1c06fd
SHA162399c6102cc98ed66cbcd88a63ff870cf7b2100
SHA2561e4a463ac0d463cee1f52f9529474484157c85d671aea1ab5f4173df12de01b6
SHA5125da8b333a839c4b169c6f4c9a1929918f166a895af7818c8223df7ed22279aac3b6ef88f89ee083a4f475f82ec6078f8e9800a9afc9547712245d090636a284a