Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 14:25
Static task
static1
Behavioral task
behavioral1
Sample
d49024573cb0763c1b33259ddbf4dd72_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d49024573cb0763c1b33259ddbf4dd72_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d49024573cb0763c1b33259ddbf4dd72_JaffaCakes118.exe
-
Size
182KB
-
MD5
d49024573cb0763c1b33259ddbf4dd72
-
SHA1
01d977d66d665978ea921ee04c874ca7d16c3dbb
-
SHA256
eb6e6cdc1938ce18d7ab7b222ef38e6c82ccc78244f63b93d2b94c46c8ad12e2
-
SHA512
2a868b0a7fb7370363ee2e8d22eca5fd603035a1b11ca8b7736f48111068af6ef5fc0c94db7a96b341e24f63a26e5e0622eb5758215348360b5693bc2d2c28b1
-
SSDEEP
3072:0rkR5Qp0mB63UtF1xZTV6HT7bIq1j1FbbTS/GzDMts:04R5Z2BtIgm5S/YIq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2740 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1960 ~1tmp.exe -
Loads dropped DLL 4 IoCs
pid Process 2740 cmd.exe 1960 ~1tmp.exe 1960 ~1tmp.exe 1960 ~1tmp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\SCPolicySvc = "C:\\Users\\Admin\\AppData\\Local\\SCPolicySvc.exe" regedit.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1960 set thread context of 2056 1960 ~1tmp.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d49024573cb0763c1b33259ddbf4dd72_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ~1tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2876 regedit.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 DllHost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2740 3028 d49024573cb0763c1b33259ddbf4dd72_JaffaCakes118.exe 30 PID 3028 wrote to memory of 2740 3028 d49024573cb0763c1b33259ddbf4dd72_JaffaCakes118.exe 30 PID 3028 wrote to memory of 2740 3028 d49024573cb0763c1b33259ddbf4dd72_JaffaCakes118.exe 30 PID 3028 wrote to memory of 2740 3028 d49024573cb0763c1b33259ddbf4dd72_JaffaCakes118.exe 30 PID 2740 wrote to memory of 1960 2740 cmd.exe 33 PID 2740 wrote to memory of 1960 2740 cmd.exe 33 PID 2740 wrote to memory of 1960 2740 cmd.exe 33 PID 2740 wrote to memory of 1960 2740 cmd.exe 33 PID 2740 wrote to memory of 1960 2740 cmd.exe 33 PID 2740 wrote to memory of 1960 2740 cmd.exe 33 PID 2740 wrote to memory of 1960 2740 cmd.exe 33 PID 1960 wrote to memory of 2056 1960 ~1tmp.exe 34 PID 1960 wrote to memory of 2056 1960 ~1tmp.exe 34 PID 1960 wrote to memory of 2056 1960 ~1tmp.exe 34 PID 1960 wrote to memory of 2056 1960 ~1tmp.exe 34 PID 1960 wrote to memory of 2056 1960 ~1tmp.exe 34 PID 1960 wrote to memory of 2056 1960 ~1tmp.exe 34 PID 1960 wrote to memory of 2056 1960 ~1tmp.exe 34 PID 1960 wrote to memory of 2056 1960 ~1tmp.exe 34 PID 1960 wrote to memory of 2056 1960 ~1tmp.exe 34 PID 1960 wrote to memory of 2056 1960 ~1tmp.exe 34 PID 1960 wrote to memory of 2056 1960 ~1tmp.exe 34 PID 1960 wrote to memory of 2056 1960 ~1tmp.exe 34 PID 2056 wrote to memory of 2876 2056 svchost.exe 35 PID 2056 wrote to memory of 2876 2056 svchost.exe 35 PID 2056 wrote to memory of 2876 2056 svchost.exe 35 PID 2056 wrote to memory of 2876 2056 svchost.exe 35 PID 2056 wrote to memory of 2876 2056 svchost.exe 35 PID 2056 wrote to memory of 2876 2056 svchost.exe 35 PID 2056 wrote to memory of 2876 2056 svchost.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\d49024573cb0763c1b33259ddbf4dd72_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d49024573cb0763c1b33259ddbf4dd72_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~1tmp.bat2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\~1tmp.exe"C:\Users\Admin\AppData\Local\Temp\~1tmp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\svchost.exesvchost.exe "C:\Users\Admin\AppData\Local\Temp\~1tmp.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Users\Admin\AppData\Local\Temp\~dfds3.reg5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2876
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5a866b90d4e6cdc07f7280d08ed460b06
SHA10d8eca4be5a97006543781a51b8c4b550d3b23c7
SHA25661ec47c2b5643218f48e9ceaab066587096aa3b533a4111b5c6e2b1157a870c0
SHA51232ca80b99932edae0453bca3bad91a88cb5faa33d86186c700c4fd54856998f4a378a00fb559f07a9cf401cbdb979e466e5368697898fb7e45ff3dbaace26a49
-
Filesize
22KB
MD50108e55ab532a94c1ba1bb0d5219a2fe
SHA17d6df8d9845565bf67770f9d959af1fed97cdeeb
SHA256a136e649403a74e71c1a5c576122872bf8da0b83acb5a3c6af84ee539a846279
SHA512146864c2ff402e514cea6a0d009633b0c738fb885950b87784809f0077ebd5018f2558153e582095e005bc7dfd36c542666c67fc1b7375a91338c37b893af2fb
-
Filesize
17KB
MD515949ab0fb07a6c6453e4cd7638eceaa
SHA1a334ece66da7112a552cf2fb5819c47b775b98e7
SHA256867690628fcaa53a77e86513a57e127b9941e30de16558d2e0085016ea1a13fb
SHA512d0ea903f8f60aabac48450841fd8f2a323f583bc628199315376c4275c6da15c0bf3de2ee5246f7a5903e5b05468f31a6fe1d313d840e02895f4b57c323649c7
-
Filesize
174B
MD5ae75b08df616c4f3354de9c0ee28e0b9
SHA14cde0ec9154b4b5aae605d37fe75af64d88fec2c
SHA256351637002f89350491aacd1f9a22b084b46093630a5d2b1e536b3d12b8585240
SHA51299e432dc4b43cf3e0bbc184063bbc759c7617f9553cb960e600ea8f95d78a248035c2338ef1a498718df167c28cd749dcd4a95821913bdd32306acd268a9ac53
-
Filesize
65B
MD58cc0cf83bdf486c953f716fb4b93c64b
SHA19c7bca352736ae41a6258646444b37d624668c37
SHA256641f9f606750430a36099f4df5ea903ff8cd7cc4b2ca88aca93fe5bbc2c95fe4
SHA512281f9888ae225e323f02abf3a981a5faca586bee6f7922dcaf7cfdc6de18018781daf81e13246c5997fb8e7146b1cad325f8f9bc56a9958811b5f1802a41a852
-
Filesize
4KB
MD52be064f48a055a26202c86fc075640eb
SHA1c8bde7ea195c1ad7a15c7141d58310b3a6cc8858
SHA25680816c46c49e47d4e048a6a00c1816b39b7c68de298fef029eade88f1592376a
SHA5124ef352bd51fb25940f3064e8412df0f2b206758d478c2e1dc154783215b8a6e25d70d26d686815b6ab18a465d5860b73c349b50fc1c9eb258c46c30356f5b017