Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
ce129cee5be5d9b0f76598f8421704ef_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ce129cee5be5d9b0f76598f8421704ef_JaffaCakes118.exe
-
Size
341KB
-
MD5
ce129cee5be5d9b0f76598f8421704ef
-
SHA1
cafa55c44306c7b34da136ae58e4a8ee5dec2bd0
-
SHA256
b1bb113dfb88b0d924755df1bf3c01ee53cb4e0f4d863adc6473a2bd67c301a3
-
SHA512
8e48d4d00913e21784a8a6eba3eb42163e148178f3cb4e611930b2adbe8c3220d8ea9550cc1176bb864e42ae2705080a1b6959f6a3a9cf9d74cc144d53ecf122
-
SSDEEP
6144:eob2C77P99/Aj78Ryyw8AalYFkQKssGuHZdiyuZscShDeDJzUOu9:evO9h7yyFqiQxfsBNeN
Malware Config
Signatures
-
Trickbot x86 loader 7 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/2720-13-0x0000000000250000-0x000000000027D000-memory.dmp trickbot_loader32 behavioral1/memory/2720-12-0x0000000000220000-0x000000000024C000-memory.dmp trickbot_loader32 behavioral1/memory/2720-10-0x0000000000250000-0x000000000027D000-memory.dmp trickbot_loader32 behavioral1/memory/2720-14-0x0000000000250000-0x000000000027D000-memory.dmp trickbot_loader32 behavioral1/memory/2720-17-0x0000000000250000-0x000000000027D000-memory.dmp trickbot_loader32 behavioral1/memory/2128-25-0x0000000000250000-0x000000000027D000-memory.dmp trickbot_loader32 behavioral1/memory/2128-26-0x0000000000250000-0x000000000027D000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
pid Process 2720 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 2128 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe -
Loads dropped DLL 2 IoCs
pid Process 2664 ce129cee5be5d9b0f76598f8421704ef_JaffaCakes118.exe 2664 ce129cee5be5d9b0f76598f8421704ef_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce129cee5be5d9b0f76598f8421704ef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 2236 svchost.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2720 2664 ce129cee5be5d9b0f76598f8421704ef_JaffaCakes118.exe 30 PID 2664 wrote to memory of 2720 2664 ce129cee5be5d9b0f76598f8421704ef_JaffaCakes118.exe 30 PID 2664 wrote to memory of 2720 2664 ce129cee5be5d9b0f76598f8421704ef_JaffaCakes118.exe 30 PID 2664 wrote to memory of 2720 2664 ce129cee5be5d9b0f76598f8421704ef_JaffaCakes118.exe 30 PID 2720 wrote to memory of 2576 2720 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 31 PID 2720 wrote to memory of 2576 2720 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 31 PID 2720 wrote to memory of 2576 2720 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 31 PID 2720 wrote to memory of 2576 2720 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 31 PID 2720 wrote to memory of 2576 2720 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 31 PID 2720 wrote to memory of 2576 2720 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 31 PID 3032 wrote to memory of 2128 3032 taskeng.exe 34 PID 3032 wrote to memory of 2128 3032 taskeng.exe 34 PID 3032 wrote to memory of 2128 3032 taskeng.exe 34 PID 3032 wrote to memory of 2128 3032 taskeng.exe 34 PID 2128 wrote to memory of 2236 2128 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 35 PID 2128 wrote to memory of 2236 2128 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 35 PID 2128 wrote to memory of 2236 2128 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 35 PID 2128 wrote to memory of 2236 2128 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 35 PID 2128 wrote to memory of 2236 2128 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 35 PID 2128 wrote to memory of 2236 2128 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce129cee5be5d9b0f76598f8421704ef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ce129cee5be5d9b0f76598f8421704ef_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\ProgramData\合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe"C:\ProgramData\合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2576
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D5C3A1C0-5884-4263-ADD1-915545492B04} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Roaming\netcloud\合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exeC:\Users\Admin\AppData\Roaming\netcloud\合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
341KB
MD5ce129cee5be5d9b0f76598f8421704ef
SHA1cafa55c44306c7b34da136ae58e4a8ee5dec2bd0
SHA256b1bb113dfb88b0d924755df1bf3c01ee53cb4e0f4d863adc6473a2bd67c301a3
SHA5128e48d4d00913e21784a8a6eba3eb42163e148178f3cb4e611930b2adbe8c3220d8ea9550cc1176bb864e42ae2705080a1b6959f6a3a9cf9d74cc144d53ecf122