Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
b8dee22db8524617fceeb0ee62815ae6_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b8dee22db8524617fceeb0ee62815ae6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b8dee22db8524617fceeb0ee62815ae6_JaffaCakes118.exe
-
Size
151KB
-
MD5
b8dee22db8524617fceeb0ee62815ae6
-
SHA1
cf5471234667d44316c8e6175f47925938a0dc05
-
SHA256
55e459082bfb1bdc8dae09a5f5a95cdb73709f9747c6d65968358fd54a7a4f91
-
SHA512
a5b992c2cb278fd95562aa84597bbf7ef884f5cc57f2da9fb4e039336e39701df596a38e92f2b797cabda44100a5f48d713a131082e72c84f3f41f2bc2c2c1ca
-
SSDEEP
3072:twxVMhOC/dTDbq91+mno3t4QZQ3rt8iJkoBoyPmbQ4hGpEj:tTfFDbRnOTrt5JboyPgQpG
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2984 6001yy.exe 2812 DS805.EXE -
Loads dropped DLL 6 IoCs
pid Process 2632 WScript.exe 2632 WScript.exe 2632 WScript.exe 2984 6001yy.exe 2984 6001yy.exe 2984 6001yy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6001yy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DS805.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8dee22db8524617fceeb0ee62815ae6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1548 wrote to memory of 2632 1548 b8dee22db8524617fceeb0ee62815ae6_JaffaCakes118.exe 30 PID 1548 wrote to memory of 2632 1548 b8dee22db8524617fceeb0ee62815ae6_JaffaCakes118.exe 30 PID 1548 wrote to memory of 2632 1548 b8dee22db8524617fceeb0ee62815ae6_JaffaCakes118.exe 30 PID 1548 wrote to memory of 2632 1548 b8dee22db8524617fceeb0ee62815ae6_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2984 2632 WScript.exe 31 PID 2632 wrote to memory of 2984 2632 WScript.exe 31 PID 2632 wrote to memory of 2984 2632 WScript.exe 31 PID 2632 wrote to memory of 2984 2632 WScript.exe 31 PID 2632 wrote to memory of 2984 2632 WScript.exe 31 PID 2632 wrote to memory of 2984 2632 WScript.exe 31 PID 2632 wrote to memory of 2984 2632 WScript.exe 31 PID 2632 wrote to memory of 2812 2632 WScript.exe 32 PID 2632 wrote to memory of 2812 2632 WScript.exe 32 PID 2632 wrote to memory of 2812 2632 WScript.exe 32 PID 2632 wrote to memory of 2812 2632 WScript.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8dee22db8524617fceeb0ee62815ae6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8dee22db8524617fceeb0ee62815ae6_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\vbs.vbs"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\6001yy.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\6001yy.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\DS805.EXE"C:\Users\Admin\AppData\Local\Temp\RarSFX0\DS805.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD51c483442afae578502d9fcab1dd930ba
SHA1fa453db53916e8729e896a73ea31fc233ea0b54c
SHA2569e031c9d57c29ab1b5c553a08917376f907a0fafbb56a7a9dbeacd662df34f2a
SHA512a168bfeb4524bcc9dd0c81bf0eeeaaa5204c4f31ba417697d02f93c6849e4844423542a2cfd4db2458bcd9c7b37cdf7fd6b387c0130f7a8af850a4bd6c205e2f
-
Filesize
26KB
MD58a609bbba4f3796d0b6980b17a8a47ba
SHA1312e95b09bd9d6694a0f889624af0adbdd4d6d4c
SHA256f622974c641931fcdea84b76f715c71a8cd1d431e6338e9076e3caa64369d5c3
SHA5123670ffb7c17bebbebc81aa3fa6ad1645c6751754d8bfb89cf62a4b8c6ed0600230e89656425d6ca02ae0b3825d0e81a43586168fae1ddcbf266e5397f9b7b9c9
-
Filesize
121B
MD5397767bbf05ba893ea9ddb407c2b4167
SHA1bde2e22aa7a576e943ce35e5274ac91503f22bf3
SHA256d415f59a360d78e9c35fd7b9524c8653925b03e9a333ef3fbf4082ff8ed389bb
SHA512734539157cff569fab590d7fc7a29ccf8f64891637e9715584330cc57abea355e472d381b5b8a422e12a4c2ba2be7dd098e2603b9fe5a445dba9acfe8ec1ea70