Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 07:28
Static task
static1
Behavioral task
behavioral1
Sample
c289673501474f7fec2b16f435c90771_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c289673501474f7fec2b16f435c90771_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c289673501474f7fec2b16f435c90771_JaffaCakes118.exe
-
Size
226KB
-
MD5
c289673501474f7fec2b16f435c90771
-
SHA1
0a5ee84f20863c5db6f0a71915ead920201df177
-
SHA256
2202d569f96eb49bd8e7fc67b997aaaa7fa5563ec88d7fd33a79f932986a4798
-
SHA512
d174bb6ba349ff47e36d9065e0ce396513631f80586a6e8eaaa0eccd2b017bd673dbd7717387b37333ccc0436683e8464acecf56abcb2f5be881fc56a0b0c086
-
SSDEEP
6144:aBBXY/rEv4AA2YMHScF1VXCaailJhApl:oIZAfB1VS
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c289673501474f7fec2b16f435c90771_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe -
Deletes itself 1 IoCs
pid Process 2364 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Update = "C:\\Users\\Admin\\AppData\\Roaming\\c289673501474f7fec2b16f435c90771_JaffaCakes118.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "C:\\Users\\Admin\\AppData\\Roaming\\c289673501474f7fec2b16f435c90771_JaffaCakes118.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2496 set thread context of 1684 2496 c289673501474f7fec2b16f435c90771_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c289673501474f7fec2b16f435c90771_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2496 c289673501474f7fec2b16f435c90771_JaffaCakes118.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2496 c289673501474f7fec2b16f435c90771_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1684 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1684 svchost.exe 1684 svchost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2496 wrote to memory of 1684 2496 c289673501474f7fec2b16f435c90771_JaffaCakes118.exe 30 PID 2496 wrote to memory of 1684 2496 c289673501474f7fec2b16f435c90771_JaffaCakes118.exe 30 PID 2496 wrote to memory of 1684 2496 c289673501474f7fec2b16f435c90771_JaffaCakes118.exe 30 PID 2496 wrote to memory of 1684 2496 c289673501474f7fec2b16f435c90771_JaffaCakes118.exe 30 PID 2496 wrote to memory of 1684 2496 c289673501474f7fec2b16f435c90771_JaffaCakes118.exe 30 PID 2496 wrote to memory of 1684 2496 c289673501474f7fec2b16f435c90771_JaffaCakes118.exe 30 PID 1684 wrote to memory of 2364 1684 svchost.exe 31 PID 1684 wrote to memory of 2364 1684 svchost.exe 31 PID 1684 wrote to memory of 2364 1684 svchost.exe 31 PID 1684 wrote to memory of 2364 1684 svchost.exe 31 PID 1684 wrote to memory of 2412 1684 svchost.exe 35 PID 1684 wrote to memory of 2412 1684 svchost.exe 35 PID 1684 wrote to memory of 2412 1684 svchost.exe 35 PID 1684 wrote to memory of 2412 1684 svchost.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\c289673501474f7fec2b16f435c90771_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c289673501474f7fec2b16f435c90771_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Checks BIOS information in registry
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c for /l %i in (1, 1, 4000000000) do if not exist "C:\Users\Admin\AppData\Local\Temp\c289673501474f7fec2b16f435c90771_JaffaCakes118.exe" (exit) else (del /f "C:\Users\Admin\AppData\Local\Temp\c289673501474f7fec2b16f435c90771_JaffaCakes118.exe")3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2364
-
-
C:\Windows\SysWOW64\ctfmon.exectfmon.exe3⤵
- System Location Discovery: System Language Discovery
PID:2412
-
-