Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 10:56
Static task
static1
Behavioral task
behavioral1
Sample
bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe
-
Size
385KB
-
MD5
bb7096445553a9927df5474867fc91e2
-
SHA1
4c443947efe1157f0ce8b30cf14755e529a11a98
-
SHA256
5d074903e1032e1da363018eb17bc5f3548c8747991fab08f6be465f9826bf04
-
SHA512
72139fe1bab2b6726337a1387d02dc999ac54c67769b68994bebc03c12b2a4b77158752fe51ac0d2a4a27f5c688eed4dee3a4aeaab78b07b79ddd200a3dbfc72
-
SSDEEP
6144:o/82mxLy7OvyilGHUmlXExMXWCDJSw4LlKg90H65Q6UZo70+Ph:oE2mJQkvmhExcTDJSzLk7a5QTc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1956 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 664 rivuny.exe -
Loads dropped DLL 1 IoCs
pid Process 2488 bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\{75DA6328-6F30-AD4F-96DD-2BAD86C808B0} = "C:\\Users\\Admin\\AppData\\Roaming\\Tojuu\\rivuny.exe" rivuny.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2488 set thread context of 1956 2488 bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rivuny.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe 664 rivuny.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2488 bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe 664 rivuny.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2488 wrote to memory of 664 2488 bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe 29 PID 2488 wrote to memory of 664 2488 bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe 29 PID 2488 wrote to memory of 664 2488 bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe 29 PID 2488 wrote to memory of 664 2488 bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe 29 PID 664 wrote to memory of 1232 664 rivuny.exe 18 PID 664 wrote to memory of 1232 664 rivuny.exe 18 PID 664 wrote to memory of 1232 664 rivuny.exe 18 PID 664 wrote to memory of 1232 664 rivuny.exe 18 PID 664 wrote to memory of 1232 664 rivuny.exe 18 PID 664 wrote to memory of 1336 664 rivuny.exe 19 PID 664 wrote to memory of 1336 664 rivuny.exe 19 PID 664 wrote to memory of 1336 664 rivuny.exe 19 PID 664 wrote to memory of 1336 664 rivuny.exe 19 PID 664 wrote to memory of 1336 664 rivuny.exe 19 PID 664 wrote to memory of 1392 664 rivuny.exe 20 PID 664 wrote to memory of 1392 664 rivuny.exe 20 PID 664 wrote to memory of 1392 664 rivuny.exe 20 PID 664 wrote to memory of 1392 664 rivuny.exe 20 PID 664 wrote to memory of 1392 664 rivuny.exe 20 PID 664 wrote to memory of 932 664 rivuny.exe 24 PID 664 wrote to memory of 932 664 rivuny.exe 24 PID 664 wrote to memory of 932 664 rivuny.exe 24 PID 664 wrote to memory of 932 664 rivuny.exe 24 PID 664 wrote to memory of 932 664 rivuny.exe 24 PID 664 wrote to memory of 2488 664 rivuny.exe 28 PID 664 wrote to memory of 2488 664 rivuny.exe 28 PID 664 wrote to memory of 2488 664 rivuny.exe 28 PID 664 wrote to memory of 2488 664 rivuny.exe 28 PID 664 wrote to memory of 2488 664 rivuny.exe 28 PID 2488 wrote to memory of 1956 2488 bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe 30 PID 2488 wrote to memory of 1956 2488 bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe 30 PID 2488 wrote to memory of 1956 2488 bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe 30 PID 2488 wrote to memory of 1956 2488 bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe 30 PID 2488 wrote to memory of 1956 2488 bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe 30 PID 2488 wrote to memory of 1956 2488 bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe 30 PID 2488 wrote to memory of 1956 2488 bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe 30 PID 2488 wrote to memory of 1956 2488 bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe 30 PID 2488 wrote to memory of 1956 2488 bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe 30
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1232
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1336
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bb7096445553a9927df5474867fc91e2_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Roaming\Tojuu\rivuny.exe"C:\Users\Admin\AppData\Roaming\Tojuu\rivuny.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:664
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8fd606f8.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1956
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5df81bad510ffcae5239b35955189dd0c
SHA136c7c90a2cacfd8c87044e2bf7b38b3594ec18c7
SHA256bdf7cb3010ae0ebecb6a6e48f8d141699e20001311527c87072078a30ad02e03
SHA512c0df0eb36e203c5d1e0cd7116c98d20d09d835381e1820f1a38d62cdd44017da92f48ae81d880fe21c727d2ed7939ce3bfa9eb683ae26289a12c439436f0bdb2
-
Filesize
385KB
MD51649b6107839534bf42083bc9c33893b
SHA188f8fd7caef4c9a4d716d61b4b6bc1a93d58d310
SHA256276f9e3119c30fa13edf31b0b92e1f84ad09ff929109d84704cb165a2f93378f
SHA5127468bd096cb40abe77564bce3582b401f0bbbec3a96dc67e2494f67206ce71fbb078317124676620775f1856bb7f900eb171d6e9dc88c5bf32fb8fa9c9ec7514