Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe
-
Size
583KB
-
MD5
b4a698ebdf4225fe62b22917e607265c
-
SHA1
641fd9ee715c2777b2b7d9bfd3657c41fbf2e9d0
-
SHA256
1c50f00eacf16bc5c4f77c97910e56391a29a532a95bcaf7d8910563f30f2676
-
SHA512
6ab02418b1cd39db60da1985ca5e69c7b77f1897a6546f18ca2157b1d440c1497cd7550e652d95b83745a91d7131a7a72f8bc1df917947be61e8ee32c66c9588
-
SSDEEP
12288:+FNEGdAYnaj+S1OlEjUdNAgv4M5b4bIzdsTX0ET+znl2Z59Pqd:1AAYn8xiEjUdOgvHbGIzdsTXZO6E
Malware Config
Signatures
-
Executes dropped EXE 20 IoCs
pid Process 2268 Microsoft Update 2192 Microsoft Update 2688 Microsoft Update 2620 Microsoft Update 2656 Microsoft Update 3036 Microsoft Update 332 Microsoft Update 1004 Microsoft Update 1860 Microsoft Update 1996 Microsoft Update 1132 Microsoft Update 704 Microsoft Update 2792 Microsoft Update 2968 Microsoft Update 1432 Microsoft Update 1668 Microsoft Update 2668 Microsoft Update 2448 Microsoft Update 2096 Microsoft Update 1728 Microsoft Update -
Loads dropped DLL 20 IoCs
pid Process 1844 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 2268 Microsoft Update 2192 Microsoft Update 2688 Microsoft Update 2620 Microsoft Update 2656 Microsoft Update 3036 Microsoft Update 332 Microsoft Update 1004 Microsoft Update 1860 Microsoft Update 1996 Microsoft Update 1132 Microsoft Update 704 Microsoft Update 2792 Microsoft Update 2968 Microsoft Update 1432 Microsoft Update 1668 Microsoft Update 2668 Microsoft Update 2448 Microsoft Update 2096 Microsoft Update -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Microsoft Update b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Microsoft Update Microsoft Update File created C:\Windows\SysWOW64\Microsoft Update Microsoft Update File opened for modification C:\Windows\SysWOW64\Microsoft Update Microsoft Update File opened for modification C:\Windows\SysWOW64\Microsoft Update Microsoft Update File created C:\Windows\SysWOW64\Microsoft Update Microsoft Update File opened for modification C:\Windows\SysWOW64\Microsoft Update Microsoft Update File opened for modification C:\Windows\SysWOW64\Microsoft Update Microsoft Update File created C:\Windows\SysWOW64\Microsoft Update Microsoft Update File opened for modification C:\Windows\SysWOW64\Microsoft Update Microsoft Update File created C:\Windows\SysWOW64\Microsoft Update Microsoft Update File created C:\Windows\SysWOW64\Microsoft Update Microsoft Update File created C:\Windows\SysWOW64\Microsoft Update Microsoft Update File opened for modification C:\Windows\SysWOW64\Microsoft Update Microsoft Update File created C:\Windows\SysWOW64\Microsoft Update Microsoft Update File created C:\Windows\SysWOW64\Microsoft Update Microsoft Update File opened for modification C:\Windows\SysWOW64\Microsoft Update Microsoft Update File created C:\Windows\SysWOW64\Microsoft Update b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe File created C:\Windows\SysWOW64\Microsoft Update Microsoft Update File opened for modification C:\Windows\SysWOW64\Microsoft Update Microsoft Update File created C:\Windows\SysWOW64\Microsoft Update Microsoft Update File opened for modification C:\Windows\SysWOW64\Microsoft Update Microsoft Update -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 2028 set thread context of 1844 2028 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 30 PID 2268 set thread context of 2192 2268 Microsoft Update 32 PID 2688 set thread context of 2620 2688 Microsoft Update 35 PID 2656 set thread context of 3036 2656 Microsoft Update 37 PID 332 set thread context of 1004 332 Microsoft Update 39 PID 1860 set thread context of 1996 1860 Microsoft Update 41 PID 1132 set thread context of 704 1132 Microsoft Update 43 PID 2792 set thread context of 2968 2792 Microsoft Update 45 PID 1432 set thread context of 1668 1432 Microsoft Update 47 PID 2668 set thread context of 2448 2668 Microsoft Update 49 PID 2096 set thread context of 1728 2096 Microsoft Update 51 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Update -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1844 2028 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 30 PID 2028 wrote to memory of 1844 2028 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 30 PID 2028 wrote to memory of 1844 2028 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 30 PID 2028 wrote to memory of 1844 2028 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 30 PID 2028 wrote to memory of 1844 2028 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 30 PID 2028 wrote to memory of 1844 2028 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 30 PID 1844 wrote to memory of 2268 1844 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 31 PID 1844 wrote to memory of 2268 1844 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 31 PID 1844 wrote to memory of 2268 1844 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 31 PID 1844 wrote to memory of 2268 1844 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 31 PID 1844 wrote to memory of 2268 1844 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 31 PID 1844 wrote to memory of 2268 1844 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 31 PID 1844 wrote to memory of 2268 1844 b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe 31 PID 2268 wrote to memory of 2192 2268 Microsoft Update 32 PID 2268 wrote to memory of 2192 2268 Microsoft Update 32 PID 2268 wrote to memory of 2192 2268 Microsoft Update 32 PID 2268 wrote to memory of 2192 2268 Microsoft Update 32 PID 2268 wrote to memory of 2192 2268 Microsoft Update 32 PID 2268 wrote to memory of 2192 2268 Microsoft Update 32 PID 2268 wrote to memory of 2192 2268 Microsoft Update 32 PID 2268 wrote to memory of 2192 2268 Microsoft Update 32 PID 2268 wrote to memory of 2192 2268 Microsoft Update 32 PID 2192 wrote to memory of 2688 2192 Microsoft Update 34 PID 2192 wrote to memory of 2688 2192 Microsoft Update 34 PID 2192 wrote to memory of 2688 2192 Microsoft Update 34 PID 2192 wrote to memory of 2688 2192 Microsoft Update 34 PID 2192 wrote to memory of 2688 2192 Microsoft Update 34 PID 2192 wrote to memory of 2688 2192 Microsoft Update 34 PID 2192 wrote to memory of 2688 2192 Microsoft Update 34 PID 2688 wrote to memory of 2620 2688 Microsoft Update 35 PID 2688 wrote to memory of 2620 2688 Microsoft Update 35 PID 2688 wrote to memory of 2620 2688 Microsoft Update 35 PID 2688 wrote to memory of 2620 2688 Microsoft Update 35 PID 2688 wrote to memory of 2620 2688 Microsoft Update 35 PID 2688 wrote to memory of 2620 2688 Microsoft Update 35 PID 2688 wrote to memory of 2620 2688 Microsoft Update 35 PID 2688 wrote to memory of 2620 2688 Microsoft Update 35 PID 2688 wrote to memory of 2620 2688 Microsoft Update 35 PID 2620 wrote to memory of 2656 2620 Microsoft Update 36 PID 2620 wrote to memory of 2656 2620 Microsoft Update 36 PID 2620 wrote to memory of 2656 2620 Microsoft Update 36 PID 2620 wrote to memory of 2656 2620 Microsoft Update 36 PID 2620 wrote to memory of 2656 2620 Microsoft Update 36 PID 2620 wrote to memory of 2656 2620 Microsoft Update 36 PID 2620 wrote to memory of 2656 2620 Microsoft Update 36 PID 2656 wrote to memory of 3036 2656 Microsoft Update 37 PID 2656 wrote to memory of 3036 2656 Microsoft Update 37 PID 2656 wrote to memory of 3036 2656 Microsoft Update 37 PID 2656 wrote to memory of 3036 2656 Microsoft Update 37 PID 2656 wrote to memory of 3036 2656 Microsoft Update 37 PID 2656 wrote to memory of 3036 2656 Microsoft Update 37 PID 2656 wrote to memory of 3036 2656 Microsoft Update 37 PID 2656 wrote to memory of 3036 2656 Microsoft Update 37 PID 2656 wrote to memory of 3036 2656 Microsoft Update 37 PID 3036 wrote to memory of 332 3036 Microsoft Update 38 PID 3036 wrote to memory of 332 3036 Microsoft Update 38 PID 3036 wrote to memory of 332 3036 Microsoft Update 38 PID 3036 wrote to memory of 332 3036 Microsoft Update 38 PID 3036 wrote to memory of 332 3036 Microsoft Update 38 PID 3036 wrote to memory of 332 3036 Microsoft Update 38 PID 3036 wrote to memory of 332 3036 Microsoft Update 38 PID 332 wrote to memory of 1004 332 Microsoft Update 39 PID 332 wrote to memory of 1004 332 Microsoft Update 39 PID 332 wrote to memory of 1004 332 Microsoft Update 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\Microsoft UpdateC:\Windows\system32\Microsoft Update 432 "C:\Users\Admin\AppData\Local\Temp\b4a698ebdf4225fe62b22917e607265c_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\Microsoft Update"C:\Windows\SysWOW64\Microsoft Update"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\Microsoft UpdateC:\Windows\system32\Microsoft Update 588 "C:\Windows\SysWOW64\Microsoft Update"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\Microsoft Update"C:\Windows\SysWOW64\Microsoft Update"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\Microsoft UpdateC:\Windows\system32\Microsoft Update 576 "C:\Windows\SysWOW64\Microsoft Update"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\Microsoft Update"C:\Windows\SysWOW64\Microsoft Update"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\Microsoft UpdateC:\Windows\system32\Microsoft Update 576 "C:\Windows\SysWOW64\Microsoft Update"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\Microsoft Update"C:\Windows\SysWOW64\Microsoft Update"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1004 -
C:\Windows\SysWOW64\Microsoft UpdateC:\Windows\system32\Microsoft Update 576 "C:\Windows\SysWOW64\Microsoft Update"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Windows\SysWOW64\Microsoft Update"C:\Windows\SysWOW64\Microsoft Update"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1996 -
C:\Windows\SysWOW64\Microsoft UpdateC:\Windows\system32\Microsoft Update 576 "C:\Windows\SysWOW64\Microsoft Update"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1132 -
C:\Windows\SysWOW64\Microsoft Update"C:\Windows\SysWOW64\Microsoft Update"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:704 -
C:\Windows\SysWOW64\Microsoft UpdateC:\Windows\system32\Microsoft Update 576 "C:\Windows\SysWOW64\Microsoft Update"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2792 -
C:\Windows\SysWOW64\Microsoft Update"C:\Windows\SysWOW64\Microsoft Update"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\Microsoft UpdateC:\Windows\system32\Microsoft Update 576 "C:\Windows\SysWOW64\Microsoft Update"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1432 -
C:\Windows\SysWOW64\Microsoft Update"C:\Windows\SysWOW64\Microsoft Update"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Windows\SysWOW64\Microsoft UpdateC:\Windows\system32\Microsoft Update 576 "C:\Windows\SysWOW64\Microsoft Update"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2668 -
C:\Windows\SysWOW64\Microsoft Update"C:\Windows\SysWOW64\Microsoft Update"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2448 -
C:\Windows\SysWOW64\Microsoft UpdateC:\Windows\system32\Microsoft Update 576 "C:\Windows\SysWOW64\Microsoft Update"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Windows\SysWOW64\Microsoft Update"C:\Windows\SysWOW64\Microsoft Update"22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1728
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
583KB
MD5b4a698ebdf4225fe62b22917e607265c
SHA1641fd9ee715c2777b2b7d9bfd3657c41fbf2e9d0
SHA2561c50f00eacf16bc5c4f77c97910e56391a29a532a95bcaf7d8910563f30f2676
SHA5126ab02418b1cd39db60da1985ca5e69c7b77f1897a6546f18ca2157b1d440c1497cd7550e652d95b83745a91d7131a7a72f8bc1df917947be61e8ee32c66c9588