Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe
-
Size
323KB
-
MD5
cfe24cb8838f20a224f66b81d359aa8e
-
SHA1
053ee9b49573c3141d322ddf848fa204b0ba2c98
-
SHA256
0ec20e64500f44e2e6522780231260a0f23f39ef575e5d76279029b539d49a5d
-
SHA512
a35f395d1e30e3833d5134722745e352ccd477bed63f00b1ec427a150231f5f88470ea80c7fcd3ec783a0b40e9d9b951f0a17bc919ad8942e0634fe879aa755d
-
SSDEEP
6144:jB0DFutpHEBEbBiE5tfFwQVXS948MjuNU7MqKep8cR0GHK2Xny/7Dqdf/aS:jB0DFqF7BiCttwaa48MjuNKMM30R2ioz
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\system = "C:\\Windows\\csrss.exe" svlhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svlhost.exe -
Executes dropped EXE 3 IoCs
pid Process 1692 svlhost.exe 2548 imtale.exe 2464 csrss.exe -
Loads dropped DLL 8 IoCs
pid Process 1452 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe 1452 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe 1452 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe 1452 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe 1452 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe 1452 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe 1452 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe 1452 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\csrss.exe svlhost.exe File opened for modification C:\Windows\csrss.exe svlhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imtale.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svlhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2548 imtale.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1692 svlhost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1452 wrote to memory of 1692 1452 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe 30 PID 1452 wrote to memory of 1692 1452 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe 30 PID 1452 wrote to memory of 1692 1452 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe 30 PID 1452 wrote to memory of 1692 1452 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe 30 PID 1452 wrote to memory of 2548 1452 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe 31 PID 1452 wrote to memory of 2548 1452 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe 31 PID 1452 wrote to memory of 2548 1452 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe 31 PID 1452 wrote to memory of 2548 1452 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe 31 PID 1692 wrote to memory of 2464 1692 svlhost.exe 32 PID 1692 wrote to memory of 2464 1692 svlhost.exe 32 PID 1692 wrote to memory of 2464 1692 svlhost.exe 32 PID 1692 wrote to memory of 2464 1692 svlhost.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\svlhost.exe"C:\Users\Admin\AppData\Local\Temp\svlhost.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\csrss.exe"C:\Windows\csrss.exe"3⤵
- Executes dropped EXE
PID:2464
-
-
-
C:\Users\Admin\AppData\Local\Temp\imtale.exe"C:\Users\Admin\AppData\Local\Temp\imtale.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292KB
MD5552acc406360f7844e79a3e6e3a859c8
SHA1725cb325e53feaccff739f4fc86762dd5c5503cc
SHA2568cf03331eaecd93d76103d62b04edcbd6593bd1c618b9137ca4d355a2936e848
SHA51294dc4c1e09e80687d684743399983d56d432a02fda52cce4e0e23660886f1ab6501f2ced80c4e9024e63d6f8d56d952f8621c8ade6d9bca0876eb3ddf68ce3e6
-
Filesize
24KB
MD5d4abdf905ff4b7936e66eaa4307c9c8a
SHA1f6fcd7b087624f91586d8323efe2eaddb346492f
SHA256e02097bba3ca04097d16766361e602366636a79f780fde28ba8ffe69aae2dc9d
SHA512adb51faf55692cc25d6bdf5412efbacc932c5c2842a0d1668c2ecb4cacbc27fd9dc8fe4949dcfde5030ac589493a9081ee41f0b8daca8880654d62d91e150194