Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe
-
Size
876KB
-
MD5
bfea4675295e4a8ead5b26fa5ea3419d
-
SHA1
531a472f08ec742442acc39967d903a91da9bbd1
-
SHA256
21470d4b99d4afbca480a1dd896638babcea1f51e4bbceeac9dea1cd8b2f292e
-
SHA512
959c78718891ab5b8432890297c30ee17940f563e06703166159f5f868fc6fa77beddf01c7cc4b774ba85f370fff964fee14802227de3af2cadc7121dfb8e04b
-
SSDEEP
24576:G4MLKmtvPyHu7h8v5aLy9pNg4W7HMc/cN+2QHCAFb:BiKmHyOFo5aPp7scGQD
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2348 bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe 2348 bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe 2348 bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe 2348 bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2388 3056 bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe 30 PID 3056 wrote to memory of 2388 3056 bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe 30 PID 3056 wrote to memory of 2388 3056 bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe 30 PID 3056 wrote to memory of 2388 3056 bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe 30 PID 3056 wrote to memory of 2388 3056 bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe 30 PID 3056 wrote to memory of 2388 3056 bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe 30 PID 3056 wrote to memory of 2388 3056 bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe 30 PID 2388 wrote to memory of 2348 2388 bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2348 2388 bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2348 2388 bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2348 2388 bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2348 2388 bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2348 2388 bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2348 2388 bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bfea4675295e4a8ead5b26fa5ea3419d_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:2348
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5131e1778db03bc44987a3cac4bde8e36
SHA13baf3db9d6c569344eb66e00bc71eb6b2c33e6d6
SHA25661844276d597e9f5aaaa32e06130764035d3a09bc32a6ba81b81498123de4650
SHA512a6d91f7c5a7c305982aff491fdeb8a4af593736e270eec3a124917eba0945117e8a4d32b2e0fcfc66fb166922e66c2f3c898d305e5f02c5cc55d2052ee824b5e
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD531eaad95e64f496d41fac4649f6b89cf
SHA110eb99a833437ff6b550b96fe41f4bdbaf87ee48
SHA256b6bd52ad2b30948be4746147caffab6b9564a4613c924d260308c98df54c2040
SHA512315f92b7c8a446b99fc1303e34d85ff74ca28e8f0b159cf94c7aed96ab016d40f3aa4898a98ed7a1d3b33436160ea895806cb3045680b3012036d6462475c09d