Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 14:11
Behavioral task
behavioral1
Sample
d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe
-
Size
194KB
-
MD5
d21e3b1afd6f4b0d2f55e15c1f156530
-
SHA1
8bc51ea7ccede9a8a72f029f8d5bbc27aa270b6f
-
SHA256
b5d47c4595452582316fff13528f9f708eec64083ee1a297aad975b8f701343e
-
SHA512
f6ca20b6b51599dec92979b89dbd102e69ca8fa0fb9f66d4236873c01d5cb29ab7d6be04ed15bdd9f34ece67df81847907ce268ecfc0ce26a2b090bfe37cf361
-
SSDEEP
3072:IKSBLv42GdwNj3Z7Iw21ozcY0UJGYs6Eue3TkxydJ+v0Bb0SWG6/FEuSm4aM6jXz:IxQhdwt08WrBsyqv0gG6/FEuSxGDDx7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1612 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3060 vugio.exe -
Loads dropped DLL 2 IoCs
pid Process 2824 d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe 2824 d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2824-0-0x0000000000400000-0x000000000080C000-memory.dmp upx behavioral1/files/0x0009000000015baa-18.dat upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D828F808-3C80-AD4F-7E84-E44A5F96C757} = "C:\\Users\\Admin\\AppData\\Roaming\\Ozedeb\\vugio.exe" vugio.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2824 set thread context of 1612 2824 d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Privacy d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe 3060 vugio.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2824 d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe Token: SeSecurityPrivilege 2824 d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe Token: SeSecurityPrivilege 2824 d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2824 wrote to memory of 3060 2824 d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe 30 PID 2824 wrote to memory of 3060 2824 d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe 30 PID 2824 wrote to memory of 3060 2824 d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe 30 PID 2824 wrote to memory of 3060 2824 d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe 30 PID 3060 wrote to memory of 1060 3060 vugio.exe 18 PID 3060 wrote to memory of 1060 3060 vugio.exe 18 PID 3060 wrote to memory of 1060 3060 vugio.exe 18 PID 3060 wrote to memory of 1060 3060 vugio.exe 18 PID 3060 wrote to memory of 1060 3060 vugio.exe 18 PID 3060 wrote to memory of 1116 3060 vugio.exe 19 PID 3060 wrote to memory of 1116 3060 vugio.exe 19 PID 3060 wrote to memory of 1116 3060 vugio.exe 19 PID 3060 wrote to memory of 1116 3060 vugio.exe 19 PID 3060 wrote to memory of 1116 3060 vugio.exe 19 PID 3060 wrote to memory of 1148 3060 vugio.exe 20 PID 3060 wrote to memory of 1148 3060 vugio.exe 20 PID 3060 wrote to memory of 1148 3060 vugio.exe 20 PID 3060 wrote to memory of 1148 3060 vugio.exe 20 PID 3060 wrote to memory of 1148 3060 vugio.exe 20 PID 3060 wrote to memory of 2040 3060 vugio.exe 23 PID 3060 wrote to memory of 2040 3060 vugio.exe 23 PID 3060 wrote to memory of 2040 3060 vugio.exe 23 PID 3060 wrote to memory of 2040 3060 vugio.exe 23 PID 3060 wrote to memory of 2040 3060 vugio.exe 23 PID 3060 wrote to memory of 2824 3060 vugio.exe 29 PID 3060 wrote to memory of 2824 3060 vugio.exe 29 PID 3060 wrote to memory of 2824 3060 vugio.exe 29 PID 3060 wrote to memory of 2824 3060 vugio.exe 29 PID 3060 wrote to memory of 2824 3060 vugio.exe 29 PID 2824 wrote to memory of 1612 2824 d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe 31 PID 2824 wrote to memory of 1612 2824 d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe 31 PID 2824 wrote to memory of 1612 2824 d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe 31 PID 2824 wrote to memory of 1612 2824 d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe 31 PID 2824 wrote to memory of 1612 2824 d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe 31 PID 2824 wrote to memory of 1612 2824 d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe 31 PID 2824 wrote to memory of 1612 2824 d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe 31 PID 2824 wrote to memory of 1612 2824 d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe 31 PID 2824 wrote to memory of 1612 2824 d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1060
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1116
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d21e3b1afd6f4b0d2f55e15c1f156530_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Roaming\Ozedeb\vugio.exe"C:\Users\Admin\AppData\Roaming\Ozedeb\vugio.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3060
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp34b6d02b.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1612
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5e9e294fd2e43783aa39ea2c897633d76
SHA1447d3e61edfad10516183276f5189f7e93346999
SHA2560de4203303c23535e66300c63155265f4879bd7bbc3b364e2c27a129a97b196b
SHA512e41a6ea54b295c28644a4909a05a448f4c1ccae4ae70ba12935408df2148e0fcd9859f80efdbf690eb1e3281753d7ca964db73ccc089b4beda0cad728235fa65
-
Filesize
380B
MD58694d049a9e6d32d010a8e2f1a14057e
SHA16ddd4ab9060e68aff8b66de76fa34a55af94f921
SHA25640f768b9f93b965d915d26b5d2d04d062b0776fca4ca86ab3b2c55d3c9455244
SHA512e89663bab73c8ebc117233778a32926d8b34e5e00b2043c9185c776c080460c02def5de95016cda796220d5d9d4e0262b4a35ae8b088a4adfec6c13331df5415
-
Filesize
194KB
MD55afd96562a301d1fede0a39327afa731
SHA12c1cee917a20643a430d8fa7b8155e9e9f6f2f93
SHA2562a9511806b2360df5c76c27462f158cbf52cbfe1caa3d6b0b6b4442ca5f74079
SHA5128850c23823359a30363cfbdb613586f9eece44361c83fcc3b4efabee831ab0ba8a32220e2b11403876f7de554970a34a09c451b93b9560da873b13d7805643e7