Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 13:46
Static task
static1
Behavioral task
behavioral1
Sample
b7df8182f6cc54ca873b17eab97f1052_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b7df8182f6cc54ca873b17eab97f1052_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7df8182f6cc54ca873b17eab97f1052_JaffaCakes118.exe
-
Size
297KB
-
MD5
b7df8182f6cc54ca873b17eab97f1052
-
SHA1
0e278c8e15a078f484b9f4be69c7d393417f60ba
-
SHA256
a2145c3c4de9f579e9e692ec576c8217a2b61ca29bfa767482cb48258e86795b
-
SHA512
2c24eff59e445e0d792c6d42b9e0a7aa18b60b4dd4ec13dce1f140299071ec0c870a3df17f045d673589c0820d70bb223c8eec6b3adc7c415d54418a81607737
-
SSDEEP
6144:9vDB+sclf76BsT+pt4WbMZVnFM80vWReLGNP376PlcwHgMYR:9LB+9lf76GGsV3ReLiK7gbR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2120 WinXPs.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2120 set thread context of 2840 2120 WinXPs.com 32 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\WinXPs.com b7df8182f6cc54ca873b17eab97f1052_JaffaCakes118.exe File created C:\Windows\WinXPs.com b7df8182f6cc54ca873b17eab97f1052_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7df8182f6cc54ca873b17eab97f1052_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinXPs.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2164 b7df8182f6cc54ca873b17eab97f1052_JaffaCakes118.exe Token: SeDebugPrivilege 2120 WinXPs.com -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2840 2120 WinXPs.com 32 PID 2120 wrote to memory of 2840 2120 WinXPs.com 32 PID 2120 wrote to memory of 2840 2120 WinXPs.com 32 PID 2120 wrote to memory of 2840 2120 WinXPs.com 32 PID 2120 wrote to memory of 2840 2120 WinXPs.com 32 PID 2120 wrote to memory of 2840 2120 WinXPs.com 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7df8182f6cc54ca873b17eab97f1052_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b7df8182f6cc54ca873b17eab97f1052_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
C:\Windows\WinXPs.comC:\Windows\WinXPs.com1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\WINDOWS\SysWOW64\svchost.exeC:\WINDOWS\system32\svchost.exe2⤵PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297KB
MD5b7df8182f6cc54ca873b17eab97f1052
SHA10e278c8e15a078f484b9f4be69c7d393417f60ba
SHA256a2145c3c4de9f579e9e692ec576c8217a2b61ca29bfa767482cb48258e86795b
SHA5122c24eff59e445e0d792c6d42b9e0a7aa18b60b4dd4ec13dce1f140299071ec0c870a3df17f045d673589c0820d70bb223c8eec6b3adc7c415d54418a81607737