Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe
-
Size
45KB
-
MD5
b7c49c997c4f6c078602670e28021bc9
-
SHA1
94c10e85dd81e5f21b5f58755ad91046b2409074
-
SHA256
1e6cb8c1bfe58703a54f865f9979f0bf20c59cec96d2540519e74d645b698b62
-
SHA512
e035d50f4e81a5012ed1f9f49454feba586a55e448e5ba74ec030066bae10a7d43750b6561b919fb33baf710dfff4651034808fb25e9292fd912115e3e32edd8
-
SSDEEP
768:nM5H6qaGfY2SsUF2lzJQGJFARhrRGRL5GOZHMq9adEyYQUK3jSot0+FJx:nDq3Y2xVlaDRhrRGR5Lp9adiK3uKJx
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2760 aaasrvs.exe 2576 aaasrvs.exe -
Loads dropped DLL 8 IoCs
pid Process 2856 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 2856 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 2760 aaasrvs.exe 1680 WerFault.exe 1680 WerFault.exe 1680 WerFault.exe 1680 WerFault.exe 1680 WerFault.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AaA Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aaasrvs.exe" b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\AaA Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aaasrvs.exe" b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2836 set thread context of 2856 2836 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 30 PID 2760 set thread context of 2576 2760 aaasrvs.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2588 2836 WerFault.exe 29 1680 2760 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aaasrvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2836 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 2760 aaasrvs.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2856 2836 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 30 PID 2836 wrote to memory of 2856 2836 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 30 PID 2836 wrote to memory of 2856 2836 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 30 PID 2836 wrote to memory of 2856 2836 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 30 PID 2836 wrote to memory of 2856 2836 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 30 PID 2836 wrote to memory of 2856 2836 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 30 PID 2836 wrote to memory of 2856 2836 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 30 PID 2836 wrote to memory of 2856 2836 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 30 PID 2836 wrote to memory of 2856 2836 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 30 PID 2836 wrote to memory of 2588 2836 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 31 PID 2836 wrote to memory of 2588 2836 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 31 PID 2836 wrote to memory of 2588 2836 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 31 PID 2836 wrote to memory of 2588 2836 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 31 PID 2856 wrote to memory of 2760 2856 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 32 PID 2856 wrote to memory of 2760 2856 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 32 PID 2856 wrote to memory of 2760 2856 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 32 PID 2856 wrote to memory of 2760 2856 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 32 PID 2760 wrote to memory of 2576 2760 aaasrvs.exe 33 PID 2760 wrote to memory of 2576 2760 aaasrvs.exe 33 PID 2760 wrote to memory of 2576 2760 aaasrvs.exe 33 PID 2760 wrote to memory of 2576 2760 aaasrvs.exe 33 PID 2760 wrote to memory of 2576 2760 aaasrvs.exe 33 PID 2760 wrote to memory of 2576 2760 aaasrvs.exe 33 PID 2760 wrote to memory of 2576 2760 aaasrvs.exe 33 PID 2760 wrote to memory of 2576 2760 aaasrvs.exe 33 PID 2760 wrote to memory of 2576 2760 aaasrvs.exe 33 PID 2760 wrote to memory of 1680 2760 aaasrvs.exe 34 PID 2760 wrote to memory of 1680 2760 aaasrvs.exe 34 PID 2760 wrote to memory of 1680 2760 aaasrvs.exe 34 PID 2760 wrote to memory of 1680 2760 aaasrvs.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\aaasrvs.exe"C:\Users\Admin\AppData\Local\Temp\aaasrvs.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\aaasrvs.exeC:\Users\Admin\AppData\Local\Temp\aaasrvs.exe4⤵
- Executes dropped EXE
PID:2576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 1924⤵
- Loads dropped DLL
- Program crash
PID:1680
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 1922⤵
- Program crash
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5b7c49c997c4f6c078602670e28021bc9
SHA194c10e85dd81e5f21b5f58755ad91046b2409074
SHA2561e6cb8c1bfe58703a54f865f9979f0bf20c59cec96d2540519e74d645b698b62
SHA512e035d50f4e81a5012ed1f9f49454feba586a55e448e5ba74ec030066bae10a7d43750b6561b919fb33baf710dfff4651034808fb25e9292fd912115e3e32edd8