Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 21:28
Static task
static1
Behavioral task
behavioral1
Sample
cdfd855173f734ba2bee2773a7929562_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cdfd855173f734ba2bee2773a7929562_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cdfd855173f734ba2bee2773a7929562_JaffaCakes118.exe
-
Size
2.1MB
-
MD5
cdfd855173f734ba2bee2773a7929562
-
SHA1
8e8e1abf640ad25cc328b2cd321ded42b06e1ef9
-
SHA256
da8ae99cd509ba91bb3ea4bd73ba9abc4e524911ad8e91a3f3fbbd3c817d3643
-
SHA512
063d6cb364e04b40f29d2f332eb0776167bb81e5cd8cce92bc3f9a4f5fcccf60111e33cffe3e07dc72c6ad8dbceb59476f9556d9ca1ccc03deace25f6f7d6c15
-
SSDEEP
24576:yKh/tmBIbmy14rwwDx5qgOg5fP0/nxFxdd+yHpMFiGJz+gJGFiGJz496IeL:LYBy4sQqgVfcxGyHpMFi4zeFi4z49mL
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\docjm.exe cdfd855173f734ba2bee2773a7929562_JaffaCakes118.exe File created C:\Windows\SysWOW64\docjm.exe cdfd855173f734ba2bee2773a7929562_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdfd855173f734ba2bee2773a7929562_JaffaCakes118.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\folder\shell\docjm cdfd855173f734ba2bee2773a7929562_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\docjm\ = "Ö»¶Á¼ÓÃÜ(&E)" cdfd855173f734ba2bee2773a7929562_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\folder\shell\docjm\command cdfd855173f734ba2bee2773a7929562_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\docjm\command\ = "C:\\Windows\\SysWow64\\docjm.exe %1" cdfd855173f734ba2bee2773a7929562_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 840 cdfd855173f734ba2bee2773a7929562_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdfd855173f734ba2bee2773a7929562_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cdfd855173f734ba2bee2773a7929562_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5741ef597e9cc36226bb500c87160f176
SHA1f2e6e1c67c1fe4952ff6c78065f81e93caf6a533
SHA25653da325032567765c055e0cf347c772ebf9eb6ad4bfc6f3a990a5be54aa266e4
SHA5126a6d5502af1d1f3b05829c0a2950b09f9ea34315324acc15490b80f4e3d20466eb54ea954c9053e941a162f38bb174949340ce072ef5948a1a0aff640d753fd2