Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 06:33
Behavioral task
behavioral1
Sample
c026e501c46f2c3b9f0ca413943d2b39_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
c026e501c46f2c3b9f0ca413943d2b39_JaffaCakes118.exe
-
Size
419KB
-
MD5
c026e501c46f2c3b9f0ca413943d2b39
-
SHA1
b9fd3dee8747f1bfd81585c8c92869aaf8fc78d3
-
SHA256
f971170b410f967d1108b58bee38b7b5a9965be4063435f782124ac89f239101
-
SHA512
45f1bf1c57a4e2f933de0bbc807d6b9fe388d5295ef6280f49c28844ef66aaa8751afca14e7ba6c167fb67249fc2c82ede5a1dd7dc27f642a78303ff8fd9c2e5
-
SSDEEP
6144:mLKL3Af375K/cKH2+f0T3Hy/LSvZQoH00ldK+pPMGyHb3bf3xwltFgUV1nVlVdne:SlKv0TC+RQoDlQ+pByHbVw7GRGZ1h
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2732 E70F7709546.exe 2884 7MmA66D.exe -
Loads dropped DLL 4 IoCs
pid Process 2296 c026e501c46f2c3b9f0ca413943d2b39_JaffaCakes118.exe 2296 c026e501c46f2c3b9f0ca413943d2b39_JaffaCakes118.exe 2732 E70F7709546.exe 2732 E70F7709546.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2296-0-0x0000000000400000-0x000000000049B000-memory.dmp upx behavioral1/memory/2296-2-0x0000000000400000-0x000000000049B000-memory.dmp upx behavioral1/memory/2296-5-0x0000000000400000-0x000000000049B000-memory.dmp upx behavioral1/memory/2296-11-0x0000000000400000-0x000000000049B000-memory.dmp upx behavioral1/files/0x002e000000018f6e-12.dat upx behavioral1/memory/2732-20-0x0000000000400000-0x000000000049B000-memory.dmp upx behavioral1/memory/2732-21-0x0000000000400000-0x000000000049B000-memory.dmp upx behavioral1/memory/2732-27-0x0000000000400000-0x000000000049B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\3Y9I3J1W6YUD6F0ISNOYSIRF = "C:\\Acrotra.Bin\\E70F7709546.exe /q" 7MmA66D.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum E70F7709546.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 E70F7709546.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum c026e501c46f2c3b9f0ca413943d2b39_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 c026e501c46f2c3b9f0ca413943d2b39_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c026e501c46f2c3b9f0ca413943d2b39_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E70F7709546.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7MmA66D.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PhishingFilter 7MmA66D.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" 7MmA66D.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" 7MmA66D.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery 7MmA66D.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" 7MmA66D.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2296 c026e501c46f2c3b9f0ca413943d2b39_JaffaCakes118.exe 2296 c026e501c46f2c3b9f0ca413943d2b39_JaffaCakes118.exe 2732 E70F7709546.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe 2884 7MmA66D.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2296 c026e501c46f2c3b9f0ca413943d2b39_JaffaCakes118.exe Token: SeDebugPrivilege 2296 c026e501c46f2c3b9f0ca413943d2b39_JaffaCakes118.exe Token: SeDebugPrivilege 2296 c026e501c46f2c3b9f0ca413943d2b39_JaffaCakes118.exe Token: SeDebugPrivilege 2296 c026e501c46f2c3b9f0ca413943d2b39_JaffaCakes118.exe Token: SeDebugPrivilege 2732 E70F7709546.exe Token: SeDebugPrivilege 2732 E70F7709546.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe Token: SeDebugPrivilege 2884 7MmA66D.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2732 2296 c026e501c46f2c3b9f0ca413943d2b39_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2732 2296 c026e501c46f2c3b9f0ca413943d2b39_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2732 2296 c026e501c46f2c3b9f0ca413943d2b39_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2732 2296 c026e501c46f2c3b9f0ca413943d2b39_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2884 2732 E70F7709546.exe 31 PID 2732 wrote to memory of 2884 2732 E70F7709546.exe 31 PID 2732 wrote to memory of 2884 2732 E70F7709546.exe 31 PID 2732 wrote to memory of 2884 2732 E70F7709546.exe 31 PID 2732 wrote to memory of 2884 2732 E70F7709546.exe 31 PID 2732 wrote to memory of 2884 2732 E70F7709546.exe 31 PID 2884 wrote to memory of 2296 2884 7MmA66D.exe 29 PID 2884 wrote to memory of 2296 2884 7MmA66D.exe 29 PID 2884 wrote to memory of 2296 2884 7MmA66D.exe 29 PID 2884 wrote to memory of 2296 2884 7MmA66D.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c026e501c46f2c3b9f0ca413943d2b39_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c026e501c46f2c3b9f0ca413943d2b39_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Acrotra.Bin\E70F7709546.exe"C:\Acrotra.Bin\E70F7709546.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\7MmA66D.exe"C:\Users\Admin\AppData\Local\Temp\7MmA66D.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD557c537a7b814dfae30c4597d61a32885
SHA191f7d37e5ec5e0174c53c8c92c6ad93789801d46
SHA2563969cf11be1b543438fd8eac4bdbc35a3633951e3663bf147f4a9dc7f1ae7a5a
SHA512c41b68c2bd3bbc54ea2ea7e92856eaefb63bdab43d8e608aa348b05bf62f9f7cae8312f7a57cc36368111518d8cc9963704393c2461733773a43c8e1ce111d89
-
Filesize
419KB
MD5c026e501c46f2c3b9f0ca413943d2b39
SHA1b9fd3dee8747f1bfd81585c8c92869aaf8fc78d3
SHA256f971170b410f967d1108b58bee38b7b5a9965be4063435f782124ac89f239101
SHA51245f1bf1c57a4e2f933de0bbc807d6b9fe388d5295ef6280f49c28844ef66aaa8751afca14e7ba6c167fb67249fc2c82ede5a1dd7dc27f642a78303ff8fd9c2e5
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be