Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 11:36
Behavioral task
behavioral1
Sample
d63b2a55540458efae28ef1195bb63b1_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
d63b2a55540458efae28ef1195bb63b1_JaffaCakes118.exe
-
Size
453KB
-
MD5
d63b2a55540458efae28ef1195bb63b1
-
SHA1
33abd01baa25a515d21627f4f276f3c4e260ad8b
-
SHA256
4081085f66c8e022b8e55822166f872dad6c66221f46ef579567cd9e07b6c9dc
-
SHA512
8f1b3c5055d65bf3902c85a9b6381c2348645886a8dfbe5e13230d1783174843e4ad949d330b1d31347f2dee909fa78101f3a20bb11194d437c6f49cf59dd3a7
-
SSDEEP
6144:CEK25f5ySIcWLsxIIW4DYM6SB6v+qLnAzYmhwrxcvkzmSOpdFTnd:CMpASIcWYx2U6hAJQnm
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Deletes itself 1 IoCs
pid Process 2636 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2652 mienc.exe 2920 tewutu.exe 2736 biuzp.exe -
Loads dropped DLL 3 IoCs
pid Process 2200 d63b2a55540458efae28ef1195bb63b1_JaffaCakes118.exe 2652 mienc.exe 2920 tewutu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d63b2a55540458efae28ef1195bb63b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mienc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tewutu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biuzp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 55 IoCs
pid Process 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe 2736 biuzp.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2652 2200 d63b2a55540458efae28ef1195bb63b1_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2652 2200 d63b2a55540458efae28ef1195bb63b1_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2652 2200 d63b2a55540458efae28ef1195bb63b1_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2652 2200 d63b2a55540458efae28ef1195bb63b1_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2636 2200 d63b2a55540458efae28ef1195bb63b1_JaffaCakes118.exe 31 PID 2200 wrote to memory of 2636 2200 d63b2a55540458efae28ef1195bb63b1_JaffaCakes118.exe 31 PID 2200 wrote to memory of 2636 2200 d63b2a55540458efae28ef1195bb63b1_JaffaCakes118.exe 31 PID 2200 wrote to memory of 2636 2200 d63b2a55540458efae28ef1195bb63b1_JaffaCakes118.exe 31 PID 2652 wrote to memory of 2920 2652 mienc.exe 32 PID 2652 wrote to memory of 2920 2652 mienc.exe 32 PID 2652 wrote to memory of 2920 2652 mienc.exe 32 PID 2652 wrote to memory of 2920 2652 mienc.exe 32 PID 2920 wrote to memory of 2736 2920 tewutu.exe 35 PID 2920 wrote to memory of 2736 2920 tewutu.exe 35 PID 2920 wrote to memory of 2736 2920 tewutu.exe 35 PID 2920 wrote to memory of 2736 2920 tewutu.exe 35 PID 2920 wrote to memory of 2604 2920 tewutu.exe 36 PID 2920 wrote to memory of 2604 2920 tewutu.exe 36 PID 2920 wrote to memory of 2604 2920 tewutu.exe 36 PID 2920 wrote to memory of 2604 2920 tewutu.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\d63b2a55540458efae28ef1195bb63b1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d63b2a55540458efae28ef1195bb63b1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\mienc.exe"C:\Users\Admin\AppData\Local\Temp\mienc.exe" hi2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\tewutu.exe"C:\Users\Admin\AppData\Local\Temp\tewutu.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\biuzp.exe"C:\Users\Admin\AppData\Local\Temp\biuzp.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2736
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:2604
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD5f7bb7c2870df7377a0e25ccf205dd0e3
SHA11f720eb03e2e3be8202467bad92d0e300fea3e77
SHA256e5cfeb04a2e743f760ff8e4651a53e4459a066196bbc7a3ed3e66ea41fa4890c
SHA512eb5ff8c8db62c329460cd0ad08061e985301d0c023ea3a654e8a1d5c93829a2cf68c5e7e5b1b5444065ccdd54c5ffb6c9abd27f04c5775288a0ea428bfa96a2c
-
Filesize
224B
MD52990551e967b6ae8c7f82e8e182687d4
SHA1f97dc1cb4053e3ffaef2194505ab29c99ee4580b
SHA25620b231b9e7cd7f78a7aa78d13ad6a3fe888ea7169c583289afb1b1a357baf67c
SHA512f089e41b3098ddd1008eae528e2b058c6a316a18c492f56bce6dbf4cffa7de68b8b045701584ce4352e345a86966b09388d20901a19ff79b5dfb376d3fbb3417
-
Filesize
512B
MD5a3df3fae1355d0be373a1236f4a64406
SHA1de47433c946b1888ba2e8471bb35b2cf4ea6c2ef
SHA256d1c6e28a73ac14e47d66a7efd98f88c43f5251765f3769ea5b9730b375b583ae
SHA512134b403ed4ca2a9999d1d987aebe61c01c72c42be488e847748c4e745a12e0e529b0d54452bedb827d0acb107c81adff56fb19a3d69595c3a0d9871e1a8636c3
-
Filesize
453KB
MD585a9ac7d632e65d178ff2abaf26c8eb1
SHA182b3ea8beddcf8ad41363e640a2279273f710b4c
SHA25691450a6974c4baa7691ea442457631db69420aa48f63a1528a7bf3c7c4f36db0
SHA512e35dbde86c24208a77fe9ccf4dc9776c72c67e6efe01b91185d3e9eee04c29e98002a2c6463b8233136b37d54cd7572cbfeef70e89fad8d4e20d60f9a385937e
-
Filesize
223KB
MD54f8c3fed501032936e81c7002a190445
SHA1e8e6c9264345811406c0ada044497f659df1e2db
SHA25636dbe859fab899e78c4366fd46c5086c8a7d0424a6101e0bd2143a870cc6a06c
SHA512a587de9a6a3a47de280bfa52e2efc271f1fb9c094d36f7134d49508a4a6b90970dfe8ea46f4e2f631a838d368822ee4a7379634447f437f331d17bc9aaed5541
-
Filesize
453KB
MD5f0ba89e74a5eb1c346d2d2faca1f47d8
SHA1022947ff50a4f03dd5d529099c60b83d8413ff8f
SHA256371866bb969acd22fc5e03f969e62e7016fc71bf2341fd49c6f4f01b3a937d89
SHA512e330d7137b3488770c303159e8d043554c850ee896f602e03ada9833347c41e9e4bfbd38410fbd9ed7f72644802e0a8e22dc4e77f2a040d6392f22327e95d19a