Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 10:12
Static task
static1
Behavioral task
behavioral1
Sample
be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe
-
Size
138KB
-
MD5
be602ca6ddd24492bc74c749d313646d
-
SHA1
e45b6d37792e4a6f47245fe90ab69dd4d0363af9
-
SHA256
c6d8baad06ed74c83df58922e84d2ac0ef42913d0c281045f1df15d28d697c97
-
SHA512
68158201b5fd92094bd03ef225f5808433ab84b959ce41fd9101b0c7470b0c1ac962bb7734923a27dda3637f53200a3b49c35f327534888f27fd10897eb647a7
-
SSDEEP
3072:7tsaT9r2uHKN/BDzh/5jrCIHer7Zmv3HSruNyLamWjMAKdWrc:7Gahr2uHKNfYJmaiNyVWPdrc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3000 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3040 otme.exe -
Loads dropped DLL 2 IoCs
pid Process 2544 be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe 2544 be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7727D04D-753C-9C27-1042-6AD8E6613E9C} = "C:\\Users\\Admin\\AppData\\Roaming\\Wuywvu\\otme.exe" otme.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2544 set thread context of 3000 2544 be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language otme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Privacy be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\783A47A8-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe 3040 otme.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2544 be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe Token: SeSecurityPrivilege 2544 be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe Token: SeSecurityPrivilege 2544 be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe Token: SeManageVolumePrivilege 2140 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2140 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2140 WinMail.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2544 wrote to memory of 3040 2544 be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe 30 PID 2544 wrote to memory of 3040 2544 be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe 30 PID 2544 wrote to memory of 3040 2544 be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe 30 PID 2544 wrote to memory of 3040 2544 be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe 30 PID 3040 wrote to memory of 1120 3040 otme.exe 19 PID 3040 wrote to memory of 1120 3040 otme.exe 19 PID 3040 wrote to memory of 1120 3040 otme.exe 19 PID 3040 wrote to memory of 1120 3040 otme.exe 19 PID 3040 wrote to memory of 1120 3040 otme.exe 19 PID 3040 wrote to memory of 1228 3040 otme.exe 20 PID 3040 wrote to memory of 1228 3040 otme.exe 20 PID 3040 wrote to memory of 1228 3040 otme.exe 20 PID 3040 wrote to memory of 1228 3040 otme.exe 20 PID 3040 wrote to memory of 1228 3040 otme.exe 20 PID 3040 wrote to memory of 1276 3040 otme.exe 21 PID 3040 wrote to memory of 1276 3040 otme.exe 21 PID 3040 wrote to memory of 1276 3040 otme.exe 21 PID 3040 wrote to memory of 1276 3040 otme.exe 21 PID 3040 wrote to memory of 1276 3040 otme.exe 21 PID 3040 wrote to memory of 628 3040 otme.exe 25 PID 3040 wrote to memory of 628 3040 otme.exe 25 PID 3040 wrote to memory of 628 3040 otme.exe 25 PID 3040 wrote to memory of 628 3040 otme.exe 25 PID 3040 wrote to memory of 628 3040 otme.exe 25 PID 3040 wrote to memory of 2544 3040 otme.exe 29 PID 3040 wrote to memory of 2544 3040 otme.exe 29 PID 3040 wrote to memory of 2544 3040 otme.exe 29 PID 3040 wrote to memory of 2544 3040 otme.exe 29 PID 3040 wrote to memory of 2544 3040 otme.exe 29 PID 2544 wrote to memory of 3000 2544 be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe 32 PID 2544 wrote to memory of 3000 2544 be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe 32 PID 2544 wrote to memory of 3000 2544 be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe 32 PID 2544 wrote to memory of 3000 2544 be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe 32 PID 2544 wrote to memory of 3000 2544 be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe 32 PID 2544 wrote to memory of 3000 2544 be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe 32 PID 2544 wrote to memory of 3000 2544 be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe 32 PID 2544 wrote to memory of 3000 2544 be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe 32 PID 2544 wrote to memory of 3000 2544 be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe 32 PID 3040 wrote to memory of 2508 3040 otme.exe 34 PID 3040 wrote to memory of 2508 3040 otme.exe 34 PID 3040 wrote to memory of 2508 3040 otme.exe 34 PID 3040 wrote to memory of 2508 3040 otme.exe 34 PID 3040 wrote to memory of 2508 3040 otme.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1228
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\be602ca6ddd24492bc74c749d313646d_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Roaming\Wuywvu\otme.exe"C:\Users\Admin\AppData\Roaming\Wuywvu\otme.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3040
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp55a2a0aa.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3000
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:628
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2140
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5a9e66de51be12b6e70e17f98fa7bc871
SHA13824f33951d6aab57dcfba571704d1ca9a631ca7
SHA256d8fdb6095b14b1ae00a6b0e9bb51028c55cfad430ef80b2cf2ae6837b048d9ca
SHA5124dda5136a2a78c59c4cd00e2cfe12ccea0d7f4a6eeb3c49779d0c34cb0bff3eb5598d2c11d07db57d86288e28ccee74c63a9e915fda53cf71db818a9842ea1c9
-
Filesize
271B
MD5ad390b8d69dcea8c611c8424b28ebb23
SHA14c18eeb906be6dcaf5976895f3fe378fd9b281c7
SHA256f97e78d5027fd970069ce5f26add6ec942b07c79e5b0754b188da13e0c671462
SHA512eeb5e4565deca6eb93ef2af243debe7dbb588869a7c1d525ca2bf4c20de65690edb0aa7be5902e665901e644e6a33d0577187e6a78f31b395d37239c886e458f
-
Filesize
380B
MD560a978c44dd341217bb06c8af76c80c6
SHA109ec84578acd92a19ef5fc4ad26a3079891a56a2
SHA2565a28386cca3011960eb124b3958edb992574f181e31f63b01ad20668af1dc1e3
SHA51216a3cddbe0cd666825e6ef7a0760baaaf347b1b876f878153101063e9f537c91f010ae86150631dc15d89502bf5c321d8afc0cf5b1003bc521a61fcf539804be
-
Filesize
138KB
MD5e91a163aeb3ecd60d479a0056f06b2c9
SHA1055e62d9a2db3f34b7c69d226888169ccb13b3ef
SHA256682c2c582b8ec1f11794a23d8126659b44633b12acc4723e4803dac9c4df5447
SHA5128fa082aa52f50f5358e444d286a98d57c47fecf999b896113a23e7463e9a9dd287f5fb8e392efded391639eb6f74f7fe4f475323822e89dd819f8c3c3da090f1