Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
be2421eb7d93b963725ec2fd87a6ce42_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
be2421eb7d93b963725ec2fd87a6ce42_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
be2421eb7d93b963725ec2fd87a6ce42_JaffaCakes118.exe
-
Size
415KB
-
MD5
be2421eb7d93b963725ec2fd87a6ce42
-
SHA1
91b70e3c64553ebcc507212d764e99f56ed689a4
-
SHA256
3bb8465a64556885bdae23336b463833fa81d918a7567f1d3dd553437e43d9a5
-
SHA512
8f09df9882cfd29fc62cac8f1e4d5ccedf06b02c18456eb36c86218b49b950cd1f757b079ef4f8576b7316fb69dcb10cfead8fc15541e4ea3bee69157beea4a8
-
SSDEEP
12288:Y8OMilaWWgrHqkCpkQrQ72P6ZPSCL3TGcq77mm2:YJ9eEKfVM722PSyImm2
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\360tray = "C:\\WINDOWS\\dirtyy\\spoolsv.vbe" regedit.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run regedit.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2780 attrib.exe -
Executes dropped EXE 1 IoCs
pid Process 2696 cachev.exe -
Loads dropped DLL 1 IoCs
pid Process 2112 be2421eb7d93b963725ec2fd87a6ce42_JaffaCakes118.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\dirtyy\12.reg cachev.exe File created C:\Windows\dirtyy\down21.bat cachev.exe File opened for modification C:\Windows\dirtyy\down21.bat cachev.exe File opened for modification C:\Windows\dirtyy\2.bat cachev.exe File created C:\Windows\dirtyy\spoolsv.vbe cachev.exe File opened for modification C:\WINDOWS\dirtyy attrib.exe File opened for modification C:\WINDOWS\dirtyy cachev.exe File opened for modification C:\Windows\dirtyy\12.reg cachev.exe File created C:\Windows\dirtyy\2.bat cachev.exe File opened for modification C:\Windows\dirtyy\spoolsv.vbe cachev.exe File created C:\Windows\dirtyy\__tmp_rar_sfx_access_check_259437462 cachev.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cachev.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be2421eb7d93b963725ec2fd87a6ce42_JaffaCakes118.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2652 regedit.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2696 2112 be2421eb7d93b963725ec2fd87a6ce42_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2696 2112 be2421eb7d93b963725ec2fd87a6ce42_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2696 2112 be2421eb7d93b963725ec2fd87a6ce42_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2696 2112 be2421eb7d93b963725ec2fd87a6ce42_JaffaCakes118.exe 30 PID 2696 wrote to memory of 2468 2696 cachev.exe 31 PID 2696 wrote to memory of 2468 2696 cachev.exe 31 PID 2696 wrote to memory of 2468 2696 cachev.exe 31 PID 2696 wrote to memory of 2468 2696 cachev.exe 31 PID 2468 wrote to memory of 2916 2468 WScript.exe 32 PID 2468 wrote to memory of 2916 2468 WScript.exe 32 PID 2468 wrote to memory of 2916 2468 WScript.exe 32 PID 2468 wrote to memory of 2916 2468 WScript.exe 32 PID 2916 wrote to memory of 2780 2916 cmd.exe 34 PID 2916 wrote to memory of 2780 2916 cmd.exe 34 PID 2916 wrote to memory of 2780 2916 cmd.exe 34 PID 2916 wrote to memory of 2780 2916 cmd.exe 34 PID 2916 wrote to memory of 2652 2916 cmd.exe 35 PID 2916 wrote to memory of 2652 2916 cmd.exe 35 PID 2916 wrote to memory of 2652 2916 cmd.exe 35 PID 2916 wrote to memory of 2652 2916 cmd.exe 35 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2780 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be2421eb7d93b963725ec2fd87a6ce42_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\be2421eb7d93b963725ec2fd87a6ce42_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\cachev.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\cachev.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\WINDOWS\dirtyy\spoolsv.vbe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\WINDOWS\dirtyy\2.bat4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h C:\WINDOWS\dirtyy5⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2780
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s 12.reg5⤵
- Adds policy Run key to start application
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2652
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348B
MD570de1d90f2864ecc505010663c3dca62
SHA1f10c6fbbff68e0164ddb920c5238af9701004213
SHA2567cb1e35fbff4e3fbac6a0a0ddfe8b2c3347b3a3eca7754e1d29ed137809566e2
SHA5126793eaee3c005e0d7bf22663a47872ee8d1c6cb91afa9ff3c673dfcec79110a81cb14e470392cc3b2a85c9177706a3774d1d0e0d09a5733bcda97d40f5b78de0
-
Filesize
71B
MD5b0143a120fc58fdc5d49736325660ec0
SHA1f58b1652a4014e8147c657255e795d294e50b8e9
SHA256f2591d2c8c78d19f554242c01f81f82cdb042e5742e164ff4d85a34f612c1156
SHA51256febb85a659d2e5ba5e5ce6e850866aad6040863072dd2422a4412127dad008a3220f2b72ead3c0a76f05313015a745e50adb9aa24b97e10ad097bac107e81e
-
Filesize
289B
MD5ab9d6e99a35f34f806fc5fc7ebf1d4e3
SHA183135132184ad5ccdc4c05ad66d69cc4cb6f8cf3
SHA256a51187181e3b71609c57bd52dd358361b525e9aad21aaaaf572ae20bcad2da83
SHA5123ad734f4afe22b32d67b52d692ffaf971b70c6ac243f5f3d06ae11bf6ac927bdae4747884eacc16deb0495205d37ea75c36edbc339a5984d328e7714b595fcdb
-
Filesize
103KB
MD508221288823acbbaf568791ccbf1f101
SHA17c246dbc0db59a35e87519a31ff022978a9c8b81
SHA2569eacec7e37844cf13b1b8c8f09ba23196b5f66b8b84a7b6bb13e6c794f92710b
SHA5120342804e2a722a5e99c6f70629dfe5ba3c3c720342504bc119b044811110b9c9e114e0a2d513f7a8304cba895dc00181a75a1902df02cb91f991cfd232090377