Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe
-
Size
507KB
-
MD5
bd6d4dca49d379eb0c5f61d105fe7210
-
SHA1
cbc4453360bbbfd61e4e19cd201d20f4ea0f70fb
-
SHA256
33560a859cbb87bdd742fdcbaa62ea5346f5007c0106bb84c78fcd607a98acf3
-
SHA512
bd7da59147fbf98949f4a13949b49872387c06bce04e9dcfcf52f1b5483c8fa16e65cb038f930718a1a66f517fb1214bed9cd90fa5190824650e6d945fcc7aa3
-
SSDEEP
768:5+u501UWr+Mcpb8gYXuqAJ1Y+u4dB4puHChRT+WPq0nyiU3ktgXQ1TTGfL9:5+u503xQqvH4r+3JirQ1E9
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2796 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2540 bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe 2540 bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-08\bin\UF bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe File created C:\Program Files (x86)\Java\jre-08\bin\jusched.exe bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe 2796 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2796 2540 bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe 29 PID 2540 wrote to memory of 2796 2540 bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe 29 PID 2540 wrote to memory of 2796 2540 bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe 29 PID 2540 wrote to memory of 2796 2540 bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Java\jre-08\bin\jusched.exe"C:\Program Files (x86)\Java\jre-08\bin\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
507KB
MD5bd6d4dca49d379eb0c5f61d105fe7210
SHA1cbc4453360bbbfd61e4e19cd201d20f4ea0f70fb
SHA25633560a859cbb87bdd742fdcbaa62ea5346f5007c0106bb84c78fcd607a98acf3
SHA512bd7da59147fbf98949f4a13949b49872387c06bce04e9dcfcf52f1b5483c8fa16e65cb038f930718a1a66f517fb1214bed9cd90fa5190824650e6d945fcc7aa3