Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 00:27
Static task
static1
Behavioral task
behavioral1
Sample
c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe
-
Size
2.7MB
-
MD5
c1e8bab3c5ed255d7ff964f32f7e1f74
-
SHA1
bbfbf1437eec181473b8328eb24368ced4b34bdd
-
SHA256
e7c7458e55faf52c86b67eba26d006733898e9f28fd69eff7cf85218fb9c5ca2
-
SHA512
5e079f67e3da9cb59926f821e52ead42c57192fe4ee7cf7f8406ff5a2150e89bf04f3bc844b582a42ddb90eb713296a8a6a6f1aa9d0a2694bacd197b61f1bbc8
-
SSDEEP
49152:AwfxsUM6BmxTHqz2E4j8rGKPaMTBZTzcjjzXRrP+9EYemB90t:AwA6sxTHqnz6KPaMjejT8aiW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2712 Windows Desing.exe -
Loads dropped DLL 2 IoCs
pid Process 2436 c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe 2436 c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinLogen2 = "C:\\Windows\\Memdir2.exe" Windows Desing.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Windows Defender\setup\sro20100914.jpg c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe File created C:\Program Files\Windows Defender\setup\alkare.fok c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe File created C:\Program Files\Windows Defender\setup\Windows Desing.exe c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\setup\alkare.fok c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\setup\sro20100914.jpg DllHost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Memdir2.exe Windows Desing.exe File opened for modification C:\Windows\Memdir2.exe Windows Desing.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2840 DllHost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2712 2436 c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe 32 PID 2436 wrote to memory of 2712 2436 c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe 32 PID 2436 wrote to memory of 2712 2436 c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe 32 PID 2436 wrote to memory of 2712 2436 c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c1e8bab3c5ed255d7ff964f32f7e1f74_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files\Windows Defender\setup\Windows Desing.exe"C:\Program Files\Windows Defender\setup\Windows Desing.exe" NULL2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
PID:2712
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
592KB
MD55663d485e7b624b2e9ab05b3963b223e
SHA10a7652726386444f683ee3cf6e28bf847725b144
SHA2567b017140b668c327e5e2c083a84936c904e48384c4e6ddb02063a0163faa09c1
SHA512602a50ab089322242f628f75c4d588f82833fe306d2e793d1e8d3cca61def9551526b25f649971e2cae106844c213781b95a9bff159bf373fa01d0f28fb80090
-
Filesize
210KB
MD5d037f41299da8e013e432d74d171c807
SHA11206a9325c60b0df3e527bfe8197b30af16a88c3
SHA2560dec1fc954fbe5cd4bd71e919ecadd1d8a1ad352fbdf7641b6b7ce61d2dec6cd
SHA512c4aaaad7c1806bec41afb47b1adbd8d30a1dc0024a81e1cd293de076f97da74e586ca79a353d3303efac192b1d78eeaeaf9bf4641dcf47bfd4a4c70ade62b43a