Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe
-
Size
14KB
-
MD5
c7e9e1c758c0620227dce1f7a56e1e55
-
SHA1
a49f67eb92b375cf31f1b634255d6c4f7390863c
-
SHA256
873eb966ad8f181a1725d5a783c90f83c4dd23b19e0da3d2a792b629693cc099
-
SHA512
1683e58a2ed034eb24c79a0b8e576b28744c4e5e52e20435a95b6171558d7ce9dc6c29e54d25aee340e58e6f6a58405a2c9aeef414a23ac554e9a0cc2730c3ca
-
SSDEEP
384:w620+EZL4zoNzrNk0ifS7osikY6SZuAlM:5aExvrG0yYLY6SZuv
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\tscfgwmijxsj.dll = "{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8}" c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 3020 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2908 c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\tscfgwmijxsj.tmp c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\tscfgwmijxsj.nls c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe File created C:\Windows\SysWOW64\tscfgwmijxsj.tmp c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8} c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8}\InProcServer32 c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8}\InProcServer32\ = "C:\\Windows\\SysWow64\\tscfgwmijxsj.dll" c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8}\InProcServer32\ThreadingModel = "Apartment" c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2908 c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2908 c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe 2908 c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe 2908 c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2908 wrote to memory of 3020 2908 c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe 31 PID 2908 wrote to memory of 3020 2908 c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe 31 PID 2908 wrote to memory of 3020 2908 c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe 31 PID 2908 wrote to memory of 3020 2908 c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7e9e1c758c0620227dce1f7a56e1e55_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\227E.tmp.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD5fc090e967f82acc37eb8723d694404e9
SHA1fb43faf7523149e56aa8cac9fd4741cf5b376314
SHA2568e0bd597404f092c1ec67e78890cbe081d2420b8bb920ca9279b4e577aa80309
SHA5121c48d71dd715870403bc375966b475e8ee72c87042249bd01a47696b2b43c61c90d03f10eca6642895359feaa7b588e1c77e95d548a037e9cc54254ab2de78b4
-
Filesize
428B
MD57eade39ebf9b643d26e82cdde0ce7597
SHA1728fe5030f09b3c841eff45296b3613b61ebfc88
SHA256b045ff0046c49c958503ce5951c37e949c7fb0151be6defb98260511964f1339
SHA512a3671c26ee838283c2941647849727add0f3884d78d19c1596d4cd2c616e69142be507d3dbc739b923c6cf025d99acadc5cba7a93b3b9acde118e3d3baaace96
-
Filesize
2.3MB
MD54f5fa6d206c10a696660b8f108ce8e8e
SHA1df6a235a4f4dac04911dddfdf4df4aaa031d7040
SHA256f9013add73f066de201b106d202e15ad206e60397819753c299430907a1a0223
SHA512c4df338d016f442add474726b7409d53ad0abc3cd1ba6e9ce31b94123348931ce1859c4218be55bebdf087cf906de5f6d7720a255bb35a024448a793d94ad007