Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 03:45
Static task
static1
Behavioral task
behavioral1
Sample
b63851a599a0b28d1a875d30f345ed7b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b63851a599a0b28d1a875d30f345ed7b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b63851a599a0b28d1a875d30f345ed7b_JaffaCakes118.exe
-
Size
339KB
-
MD5
b63851a599a0b28d1a875d30f345ed7b
-
SHA1
4d74b2a65e914033ff37968c386491099c37565f
-
SHA256
943b923d2cec0e479864512947211c52f05a451739bc3c1128c728f41c99e63d
-
SHA512
d3d261d38a21c637e682fe50731c00d8ad8b51a0461db19e02888634bd14e4b8388c7f02ce951884fd2d2ae2c3acc204826f226ab9407f0511d73dfa33e14b8a
-
SSDEEP
6144:8VQpV3uWk9eGfzZJKFi+x4E9sAHsdnrMt57+qKOasOvWG6gzyxj1u:jD3uWAXfzZMx4MsAHErMH+qXanZzyVY
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion geit_super.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion geit_super.exe -
Executes dropped EXE 3 IoCs
pid Process 3040 PerX.exe 2888 geit_super.exe 2660 geit_super.exe -
Loads dropped DLL 4 IoCs
pid Process 3024 b63851a599a0b28d1a875d30f345ed7b_JaffaCakes118.exe 3024 b63851a599a0b28d1a875d30f345ed7b_JaffaCakes118.exe 3024 b63851a599a0b28d1a875d30f345ed7b_JaffaCakes118.exe 3024 b63851a599a0b28d1a875d30f345ed7b_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000c000000012284-5.dat upx behavioral1/memory/3040-15-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/3024-11-0x00000000023E0000-0x0000000002495000-memory.dmp upx behavioral1/memory/3040-36-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/3040-42-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/3040-50-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 whatismyip.akamai.com -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\geit_super.exe geit_super.exe File opened for modification C:\Windows\geit_super.exe geit_super.exe File opened for modification C:\Windows\ufr_files geit_super.exe File created C:\Windows\ufr_files\NO_PWDS_report_22-08-2024_03-45-33-EBDH.bin geit_super.exe File opened for modification C:\Windows\ufr_files\NO_PWDS_report_22-08-2024_03-45-33-EBDH.bin geit_super.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language geit_super.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language geit_super.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b63851a599a0b28d1a875d30f345ed7b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PerX.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 geit_super.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString geit_super.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier geit_super.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe 3040 PerX.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3024 wrote to memory of 3040 3024 b63851a599a0b28d1a875d30f345ed7b_JaffaCakes118.exe 31 PID 3024 wrote to memory of 3040 3024 b63851a599a0b28d1a875d30f345ed7b_JaffaCakes118.exe 31 PID 3024 wrote to memory of 3040 3024 b63851a599a0b28d1a875d30f345ed7b_JaffaCakes118.exe 31 PID 3024 wrote to memory of 3040 3024 b63851a599a0b28d1a875d30f345ed7b_JaffaCakes118.exe 31 PID 3024 wrote to memory of 2888 3024 b63851a599a0b28d1a875d30f345ed7b_JaffaCakes118.exe 32 PID 3024 wrote to memory of 2888 3024 b63851a599a0b28d1a875d30f345ed7b_JaffaCakes118.exe 32 PID 3024 wrote to memory of 2888 3024 b63851a599a0b28d1a875d30f345ed7b_JaffaCakes118.exe 32 PID 3024 wrote to memory of 2888 3024 b63851a599a0b28d1a875d30f345ed7b_JaffaCakes118.exe 32 PID 2888 wrote to memory of 2660 2888 geit_super.exe 33 PID 2888 wrote to memory of 2660 2888 geit_super.exe 33 PID 2888 wrote to memory of 2660 2888 geit_super.exe 33 PID 2888 wrote to memory of 2660 2888 geit_super.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b63851a599a0b28d1a875d30f345ed7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b63851a599a0b28d1a875d30f345ed7b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\PerX.exe"C:\Users\Admin\AppData\Local\Temp\PerX.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\geit_super.exe"C:\Users\Admin\AppData\Local\Temp\geit_super.exe"2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\geit_super.exe"C:\Windows\geit_super.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD5024c61357d01d45604201e9e517a48c0
SHA18167d2b9703ca812513bb296f43a097f4b76bf8b
SHA256d366bc1e0a21d85358a0fedd5730100ad2166122cb4c91423211c03df4afe5c7
SHA512cfe98ad7abf5fc332a70f640f2d8d18374b5c7c37312384aa09d09262a0dfb6dff76f0977f0c5a2899fe9ebc8b878f3c4e64d9f64e7d8395c13944e8e68ad2e6
-
Filesize
1KB
MD5d286b25378186e7ea7c92d0c625d7ca3
SHA1780d92d61c3f7d47c653368748c3aaec4f81410f
SHA256bdaf725e4b39fe6f7f138de87fc8c42a1625c9117328b0bb88e18ffd93ab540f
SHA5129ca47a8516486036ced9eaddadc5e7b3fb6556ffcf1cd0768461416c698e2c5fb34693b5a1a11b149c4373dcc2f7f06a6170d823af5288ef9ec03e36a55f1c6f
-
Filesize
262KB
MD5e974a7ed7fa0c096aa1f59ae6d8cce72
SHA124b215e712fa745ac94d033ee7c5a556a5df0dab
SHA256d042a6add7b1547e5165d0c0c0f0eb21ee778b44c27e0a2bbce9f02b79156c0b
SHA512156cfa7b252d8737a4d3fdc3f8095353051d7f15e1293d6c1213de36ea44d526fd94e75765b3a1f75ed83f9b02dd4329b9eab466e9188fea107e622d0c1d6ba4