Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 16:27
Static task
static1
Behavioral task
behavioral1
Sample
b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe
-
Size
92KB
-
MD5
b85647797fd08c0ca3a691f3e869f551
-
SHA1
14cedc4a6b9107b2a4c66b9b7ea562a514655f01
-
SHA256
7921a4742ff222d57c1e9c48274c51af4a8421991808d3b0ccea2f562755bdb8
-
SHA512
0185858a415b611599ae11a11c1e506c2e8f8ac0d73b66fed48614fc1752c7076cfc57b662568e1d839a2a276b622b4efedfa62414d0b566bef99f3f4ec4654e
-
SSDEEP
1536:uWHR0quA7x1mHcFBN7CCeBk+0vpWSDk9UHaELhebc9bjNJPhjdUV4g:pdAHCan0BWSuU6ELh+WXhBUV4g
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2692 loader.exe 2804 install.exe 2776 4BNB5.exe 1844 qnefcbqn.exe -
Loads dropped DLL 14 IoCs
pid Process 2152 b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe 2152 b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe 2152 b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe 2152 b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe 2152 b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe 2636 WerFault.exe 2804 install.exe 2636 WerFault.exe 2636 WerFault.exe 2804 install.exe 2804 install.exe 2636 WerFault.exe 2776 4BNB5.exe 2776 4BNB5.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\braviax = "C:\\Windows\\system32\\braviax.exe" install.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\braviax = "C:\\Windows\\system32\\braviax.exe" install.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\braviax.exe install.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 2636 2692 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4BNB5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qnefcbqn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2692 2152 b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe 31 PID 2152 wrote to memory of 2692 2152 b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe 31 PID 2152 wrote to memory of 2692 2152 b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe 31 PID 2152 wrote to memory of 2692 2152 b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe 31 PID 2152 wrote to memory of 2804 2152 b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe 32 PID 2152 wrote to memory of 2804 2152 b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe 32 PID 2152 wrote to memory of 2804 2152 b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe 32 PID 2152 wrote to memory of 2804 2152 b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe 32 PID 2152 wrote to memory of 2804 2152 b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe 32 PID 2152 wrote to memory of 2804 2152 b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe 32 PID 2152 wrote to memory of 2804 2152 b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe 32 PID 2692 wrote to memory of 2636 2692 loader.exe 33 PID 2692 wrote to memory of 2636 2692 loader.exe 33 PID 2692 wrote to memory of 2636 2692 loader.exe 33 PID 2692 wrote to memory of 2636 2692 loader.exe 33 PID 2152 wrote to memory of 2776 2152 b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe 34 PID 2152 wrote to memory of 2776 2152 b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe 34 PID 2152 wrote to memory of 2776 2152 b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe 34 PID 2152 wrote to memory of 2776 2152 b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe 34 PID 2804 wrote to memory of 2524 2804 install.exe 35 PID 2804 wrote to memory of 2524 2804 install.exe 35 PID 2804 wrote to memory of 2524 2804 install.exe 35 PID 2804 wrote to memory of 2524 2804 install.exe 35 PID 2804 wrote to memory of 2524 2804 install.exe 35 PID 2804 wrote to memory of 2524 2804 install.exe 35 PID 2804 wrote to memory of 2524 2804 install.exe 35 PID 2776 wrote to memory of 1844 2776 4BNB5.exe 38 PID 2776 wrote to memory of 1844 2776 4BNB5.exe 38 PID 2776 wrote to memory of 1844 2776 4BNB5.exe 38 PID 2776 wrote to memory of 1844 2776 4BNB5.exe 38 PID 2776 wrote to memory of 2228 2776 4BNB5.exe 39 PID 2776 wrote to memory of 2228 2776 4BNB5.exe 39 PID 2776 wrote to memory of 2228 2776 4BNB5.exe 39 PID 2776 wrote to memory of 2228 2776 4BNB5.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b85647797fd08c0ca3a691f3e869f551_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 883⤵
- Loads dropped DLL
- Program crash
PID:2636
-
-
-
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\delself.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2524
-
-
-
C:\Users\Admin\AppData\Local\Temp\4BNB5.exe"C:\Users\Admin\AppData\Local\Temp\4BNB5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\ProgramData\ofmhupqp\qnefcbqn.exeC:\ProgramData\ofmhupqp\qnefcbqn.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1844
-
-
C:\Windows\SysWOW64\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\4BNB5.exe.bak >> NUL3⤵
- System Location Discovery: System Language Discovery
PID:2228
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD596161c05b0a77109a14f40d98e9dd9d6
SHA1e80438e8fe21a523aa1c51635df0f4b8653a6199
SHA2565790197a67a3ff0dea89b128a704fe0f6e16df95509ffa972cf95d69792539c8
SHA5127018b96248b375ab59649c8d7a09274bb6b3bbf8405b00b60f103f180248f8a9fa00ae021f3cc0124d107c54e56a64b86f6a126cc672c0a3ba52737671eeb343
-
Filesize
152B
MD50f0e068269add9b61c4ba2de8e175e69
SHA1fbf91d10934a212aa3e3654ff246ff20ffa9e943
SHA256b9ce21e0d4adb06e7e816c0606c708b37b79c1e54f6ff811b7c47aa60956b3c5
SHA5120377ac7deb8af01936d37ec88ff732a543a926a9bedc778007fd2377d801012c8b8245b51b1cf6e00b3dbeb28c7188235e2127d3960c0c328c07c0db561c35de
-
Filesize
40KB
MD5932c1880583abdef7770c2231d85c8a6
SHA10eba6ec240dd5ecba997fc9c976838add0a6b6ca
SHA2566ed6ec3a1b76e94fd9b6033ee37bd04dd5d7c2aa76c4ffde1a66ece01c7e1c45
SHA512e2f08bd17201cc8bd0050594f35322ca98f5abdff1cce0705b99ae59db8df0dfeabb3585db171da97ac136902fe992e7b1dc55c7edfe111e959a9f8db8cb09f3
-
Filesize
15KB
MD524dbf2aa6fb1f8c0bca36048d9df761a
SHA10bd7e8850e7f94cac852640a5590eb914effd1b0
SHA256a8f5933e0dbea9b6ea39485a3e02ddc6ebab358ae4f34779401c058c45f6367a
SHA512cfd62d8b267ddbaf0cf70236d90ba54091c8a1e662ab4b88c42848b1483f950b82ca96e6bca2a29f497fa5ab85393f8c6f9d3f70161a0a2ef828da7bb5e3aeab