Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 08:51
Behavioral task
behavioral1
Sample
bb10ae274a261e335f62dabba65bba62_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bb10ae274a261e335f62dabba65bba62_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bb10ae274a261e335f62dabba65bba62_JaffaCakes118.exe
-
Size
3.3MB
-
MD5
bb10ae274a261e335f62dabba65bba62
-
SHA1
8b4f6cc2a1cbc7a40a192d18da05906761e0d161
-
SHA256
a0723d39c36bced9e97672b86461e67c25d2159c9c2197f25a8735df01864a80
-
SHA512
59d2a5dc181a919f609938b751e287af6e7573606788addf11a424a520758b9c076bde3153cfe32b6ccef0c0ff004db64941cf239069620dc7ea6ce6a98e103a
-
SSDEEP
98304:ck5HDykWXgoh6c0IR3F1LxRO4b7+R/QKxkmmN:P5jRWXgohL11pxRhH+jQ
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2700-4-0x0000000000400000-0x0000000000ECD000-memory.dmp themida behavioral1/memory/2700-5-0x0000000000400000-0x0000000000ECD000-memory.dmp themida behavioral1/memory/2700-6-0x0000000000400000-0x0000000000ECD000-memory.dmp themida behavioral1/memory/2700-8-0x0000000000400000-0x0000000000ECD000-memory.dmp themida behavioral1/memory/2700-9-0x0000000000400000-0x0000000000ECD000-memory.dmp themida behavioral1/memory/2700-10-0x0000000000400000-0x0000000000ECD000-memory.dmp themida behavioral1/memory/2700-11-0x0000000000400000-0x0000000000ECD000-memory.dmp themida behavioral1/memory/2700-13-0x0000000000400000-0x0000000000ECD000-memory.dmp themida behavioral1/memory/2700-14-0x0000000000400000-0x0000000000ECD000-memory.dmp themida behavioral1/memory/2700-15-0x0000000000400000-0x0000000000ECD000-memory.dmp themida behavioral1/memory/2700-16-0x0000000000400000-0x0000000000ECD000-memory.dmp themida behavioral1/memory/2700-17-0x0000000000400000-0x0000000000ECD000-memory.dmp themida behavioral1/memory/2700-18-0x0000000000400000-0x0000000000ECD000-memory.dmp themida behavioral1/memory/2700-19-0x0000000000400000-0x0000000000ECD000-memory.dmp themida behavioral1/memory/2700-20-0x0000000000400000-0x0000000000ECD000-memory.dmp themida behavioral1/memory/2700-21-0x0000000000400000-0x0000000000ECD000-memory.dmp themida behavioral1/memory/2700-22-0x0000000000400000-0x0000000000ECD000-memory.dmp themida behavioral1/memory/2700-23-0x0000000000400000-0x0000000000ECD000-memory.dmp themida behavioral1/memory/2700-24-0x0000000000400000-0x0000000000ECD000-memory.dmp themida behavioral1/memory/2700-25-0x0000000000400000-0x0000000000ECD000-memory.dmp themida behavioral1/memory/2700-26-0x0000000000400000-0x0000000000ECD000-memory.dmp themida behavioral1/memory/2700-27-0x0000000000400000-0x0000000000ECD000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\msig = "C:\\Windows\\system32\\disk10.exe" bb10ae274a261e335f62dabba65bba62_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\key55.ini bb10ae274a261e335f62dabba65bba62_JaffaCakes118.exe File created C:\Windows\SysWOW64\disk10.exe bb10ae274a261e335f62dabba65bba62_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\disk10.exe bb10ae274a261e335f62dabba65bba62_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb10ae274a261e335f62dabba65bba62_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2700 bb10ae274a261e335f62dabba65bba62_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2700 bb10ae274a261e335f62dabba65bba62_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb10ae274a261e335f62dabba65bba62_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bb10ae274a261e335f62dabba65bba62_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2700