Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 08:19
Behavioral task
behavioral1
Sample
baf9c0a056f7ffa4af2e6f473b6e86a1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
baf9c0a056f7ffa4af2e6f473b6e86a1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
baf9c0a056f7ffa4af2e6f473b6e86a1_JaffaCakes118.exe
-
Size
11KB
-
MD5
baf9c0a056f7ffa4af2e6f473b6e86a1
-
SHA1
b9877d5c7cc4261b4542e7c00d0caa92ff37c618
-
SHA256
39164ad2ffb29451ba6e3f97206a46fddf942876fa8085f326d1daabd7f67e12
-
SHA512
d1be7026785efdcdc764a49b751ef5ab3f3c1ffcc0efbb4d1b119d4f5d88e044fded808af24221703c54e1bbe49c7437d5d4e4480474f1f83e57bbd086e30c60
-
SSDEEP
192:RyFqv0hZ9juHQJ41DIBFLe/DKuXqT/WCBc8DCz4rUocRhrZeIyASN4cKBUOwzc+:Ics5/J41DkleGukWCBc8DdrKroeGOwA+
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Deletes itself 1 IoCs
pid Process 2768 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2640 comboausk.exe -
Loads dropped DLL 2 IoCs
pid Process 2964 baf9c0a056f7ffa4af2e6f473b6e86a1_JaffaCakes118.exe 2964 baf9c0a056f7ffa4af2e6f473b6e86a1_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2964-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x00360000000160e7-3.dat upx behavioral1/memory/2964-18-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2640-20-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\comboaus.dll baf9c0a056f7ffa4af2e6f473b6e86a1_JaffaCakes118.exe File created C:\Windows\SysWOW64\comboausk.exe baf9c0a056f7ffa4af2e6f473b6e86a1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\comboausk.exe baf9c0a056f7ffa4af2e6f473b6e86a1_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language baf9c0a056f7ffa4af2e6f473b6e86a1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2964 baf9c0a056f7ffa4af2e6f473b6e86a1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2640 2964 baf9c0a056f7ffa4af2e6f473b6e86a1_JaffaCakes118.exe 30 PID 2964 wrote to memory of 2640 2964 baf9c0a056f7ffa4af2e6f473b6e86a1_JaffaCakes118.exe 30 PID 2964 wrote to memory of 2640 2964 baf9c0a056f7ffa4af2e6f473b6e86a1_JaffaCakes118.exe 30 PID 2964 wrote to memory of 2640 2964 baf9c0a056f7ffa4af2e6f473b6e86a1_JaffaCakes118.exe 30 PID 2964 wrote to memory of 2768 2964 baf9c0a056f7ffa4af2e6f473b6e86a1_JaffaCakes118.exe 31 PID 2964 wrote to memory of 2768 2964 baf9c0a056f7ffa4af2e6f473b6e86a1_JaffaCakes118.exe 31 PID 2964 wrote to memory of 2768 2964 baf9c0a056f7ffa4af2e6f473b6e86a1_JaffaCakes118.exe 31 PID 2964 wrote to memory of 2768 2964 baf9c0a056f7ffa4af2e6f473b6e86a1_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\baf9c0a056f7ffa4af2e6f473b6e86a1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\baf9c0a056f7ffa4af2e6f473b6e86a1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\comboausk.exeC:\Windows\system32\comboausk.exe ˜‰2⤵
- Executes dropped EXE
PID:2640
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\baf9c0a056f7ffa4af2e6f473b6e86a1_JaffaCakes118.exe.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD580d1279c415507489ef705c7565463b1
SHA1f4da326529eefcdba7b4ea46a0c376bdc3f5a6bd
SHA256b7c8ea03fcbf8e75cd15280b126cc8bfa1008c9e3f3609fcb355d9e8f44fce6a
SHA512faa5867a5d980f623e98b5fb89a4002ea0a25201dbe77071253465d2d5e851f266f1e9bb0011e80dec1e3449477b95db543ca33f6caf009b7631c7393c57a7cb
-
Filesize
11KB
MD5baf9c0a056f7ffa4af2e6f473b6e86a1
SHA1b9877d5c7cc4261b4542e7c00d0caa92ff37c618
SHA25639164ad2ffb29451ba6e3f97206a46fddf942876fa8085f326d1daabd7f67e12
SHA512d1be7026785efdcdc764a49b751ef5ab3f3c1ffcc0efbb4d1b119d4f5d88e044fded808af24221703c54e1bbe49c7437d5d4e4480474f1f83e57bbd086e30c60