Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe
-
Size
672KB
-
MD5
b269728fbaf9b932de428bdb0d8a50cf
-
SHA1
8cfd737091bd8cb84b3dd2e5ecd797521026881b
-
SHA256
f40606eaf7beb0ab2cc3033dc9b80f041d4ad4bd38674a827d3364d7adb80dd1
-
SHA512
b28d6a2506439f4cc5b3de41ee10d4655473b0d65ea9df467e0f18a2cfe1b8a048f03a427099d8dede399ded074cef783b0b26c31bde73d858e09e077ff0ccd7
-
SSDEEP
12288:t7bbobD8VUlUdv/YKjneSVBRqHEv7G48wDDaziIo+C0o/7KgkbEajgRRny+AIOMr:tLoQ5HnWEvf8yaO047KgkbEaj6tyYOe
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\PCGWIN32.LI4 b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\{0DAB1261-533F7095-4F99B48D-E7441A06} b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\{0DAB1261-533F7095-4F99B48D-E7441A06}\ = 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 b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\{0DAB1261-533F7095-4F99B48D-E7441A06}\ = 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 b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\{D50DBC70-EDF2330C-38FF8F7C} b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\{D50DBC70-EDF2330C-38FF8F7C}\ = "2566908358" b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\{0DAB1261-533F7095-4F99B48D-E7441A06}\ = 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 b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1724 b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe 1724 b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe 1724 b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1724 b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b269728fbaf9b932de428bdb0d8a50cf_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
528B
MD5763a11b1a78ffd6a4d37fff65c4c21d6
SHA1981a4850fe6323fbc96b5f7d3d62857fb5595cb9
SHA256319d969e8b88a119f328ed5a57644f609a50bcc4094809d57abc425dc73e3015
SHA512ea86c05265d546b2404946da02df86a0f61a3c2675e598d03d2437b46b7ffe419ed38c5ec171fc21dfb68e6a08a761f25b52085417191449b130993569e13ee5