Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe
-
Size
301KB
-
MD5
bf7b71f1f42c9e7dccb590b39b7f5844
-
SHA1
cb8317d7dd54ff2ee020847c17c1c1e0e6a3768c
-
SHA256
a663c067d85d1300cba2770cc16591bb2c089017d96af554b2fe367f06f1d50a
-
SHA512
97e91f671b9a0b2d8cc2bae9b332cd7aaa7b65710f80a4dde9f74dda929b5dae458fc9ae7bd466cc0931df4f574eed1efbd7956d8bf293022c09917ef8a603ac
-
SSDEEP
6144:BtuIDeTpxqdSzLWPu7g/Hc2dwv/rCPCE+nPTzojQNHJCOdZUDfQ6w6BumD01QX:BttD382t/Hcmwv/rCK1nCQNHJ1wsmumF
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2432 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2572 lepu.exe 2780 lepu.exe -
Loads dropped DLL 5 IoCs
pid Process 2640 bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe 2480 WerFault.exe 2480 WerFault.exe 2480 WerFault.exe 2480 WerFault.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2972 set thread context of 2640 2972 bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe 29 PID 2572 set thread context of 2780 2572 lepu.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2480 2780 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lepu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lepu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2640 2972 bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2640 2972 bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2640 2972 bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2640 2972 bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2640 2972 bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2640 2972 bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2640 2972 bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2640 2972 bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2640 2972 bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe 29 PID 2640 wrote to memory of 2572 2640 bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe 30 PID 2640 wrote to memory of 2572 2640 bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe 30 PID 2640 wrote to memory of 2572 2640 bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe 30 PID 2640 wrote to memory of 2572 2640 bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe 30 PID 2572 wrote to memory of 2780 2572 lepu.exe 31 PID 2572 wrote to memory of 2780 2572 lepu.exe 31 PID 2572 wrote to memory of 2780 2572 lepu.exe 31 PID 2572 wrote to memory of 2780 2572 lepu.exe 31 PID 2572 wrote to memory of 2780 2572 lepu.exe 31 PID 2572 wrote to memory of 2780 2572 lepu.exe 31 PID 2572 wrote to memory of 2780 2572 lepu.exe 31 PID 2572 wrote to memory of 2780 2572 lepu.exe 31 PID 2572 wrote to memory of 2780 2572 lepu.exe 31 PID 2640 wrote to memory of 2432 2640 bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe 32 PID 2640 wrote to memory of 2432 2640 bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe 32 PID 2640 wrote to memory of 2432 2640 bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe 32 PID 2640 wrote to memory of 2432 2640 bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe 32 PID 2780 wrote to memory of 2480 2780 lepu.exe 33 PID 2780 wrote to memory of 2480 2780 lepu.exe 33 PID 2780 wrote to memory of 2480 2780 lepu.exe 33 PID 2780 wrote to memory of 2480 2780 lepu.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bf7b71f1f42c9e7dccb590b39b7f5844_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Roaming\Feyzaz\lepu.exe"C:\Users\Admin\AppData\Roaming\Feyzaz\lepu.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Roaming\Feyzaz\lepu.exe"C:\Users\Admin\AppData\Roaming\Feyzaz\lepu.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 1805⤵
- Loads dropped DLL
- Program crash
PID:2480
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpd6ed93dc.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD52fa82cc4370ed22494fbe720068e18c1
SHA1dcf3dc02e4206a54e8fffaa5ebc9463cd2bc6543
SHA25611e3422d71aec5e6123094e2ac780ae98837eef368be414a295f76484b5a6357
SHA512d874eda4abfbbffe92ad964fcf1f618612b4cf4ac8d26bf4ed10a020da77f29279f9824e40882e65603e177d890b21c198ccd7c5e6dce184636be4a50be9fdd2
-
Filesize
301KB
MD5a2930806aa30a54964cb6c08cb08b156
SHA1bfa90a406fdd5c52ecd03b7dfda2a844564582e4
SHA25685e1d1d6c1aae7c3a1fe4245980068992b60389d5822dc57e8319fad2de05227
SHA5123894a460daf819a584d505a4f256ce5d545b81a064329005d1574c83683afd7a9e66fc4b9e2b321e19294febccf2e3265cf241f7dde072073f24dcdf1cf30887