Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 04:11
Behavioral task
behavioral1
Sample
d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe
-
Size
383KB
-
MD5
d99643313b63f4d16b804df58c1cf0de
-
SHA1
a90b9c961c7a322b86511daa1a30829621cc77d8
-
SHA256
a091b5a3a45f91cc7624ebc9910e9fb771cdbeae985ae5ffc448bdd6eb3bf8c6
-
SHA512
11ccfa6cebe9a6973a591e624e3897d72ee3a79415fd1ddc0efca2bd72c1ad9d505643c1deb39dd001f3a03041fe42b288a821d5d1947d7ca6c59bb6750cf587
-
SSDEEP
6144:zt/w53vJ5ITqLjOafQgO0gDAPExZ8hFIALXcvy4YNxDna3MBVzcoE7qA/GzCRuaN:zEvJ5I2LjOmQgBg8PCuIa0YNZ5hDOklM
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0009000000015cb8-10.dat acprotect -
Loads dropped DLL 4 IoCs
pid Process 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1560-0-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral1/files/0x0009000000015cb8-10.dat upx behavioral1/memory/536-12-0x0000000010000000-0x0000000010086000-memory.dmp upx behavioral1/memory/536-11-0x0000000010000000-0x0000000010086000-memory.dmp upx behavioral1/memory/1560-13-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral1/memory/536-16-0x0000000010000000-0x0000000010086000-memory.dmp upx behavioral1/memory/536-21-0x0000000010000000-0x0000000010086000-memory.dmp upx -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSIDLL = "C:\\Windows\\SysWOW64\\rundll32.exe msimjk32.dll,iGmkYRBjH" d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\msimjk32.dll d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msimjk32.dll d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2296 1560 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1560 d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe 1560 d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe 1560 d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe 1560 d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1560 wrote to memory of 536 1560 d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe 31 PID 1560 wrote to memory of 536 1560 d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe 31 PID 1560 wrote to memory of 536 1560 d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe 31 PID 1560 wrote to memory of 536 1560 d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe 31 PID 1560 wrote to memory of 536 1560 d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe 31 PID 1560 wrote to memory of 536 1560 d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe 31 PID 1560 wrote to memory of 536 1560 d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe 31 PID 1560 wrote to memory of 2296 1560 d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe 32 PID 1560 wrote to memory of 2296 1560 d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe 32 PID 1560 wrote to memory of 2296 1560 d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe 32 PID 1560 wrote to memory of 2296 1560 d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe 32 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d99643313b63f4d16b804df58c1cf0de_JaffaCakes118.exe"1⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_win_path
PID:1560 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe msimjk32.dll,iGmkYRBjH2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 3402⤵
- Program crash
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD5206f0639a111ae112d9b50f527ae809f
SHA11c1fb3832211d93533cb6d86d2bc8613ec0ea34e
SHA256e74eb584bf3c45e5e2e2b99e2a26f092db946ce7f0ed351bd79fd15afff84634
SHA51253e54bb7353120484f5bf0f46e81578952c033bdfec5cd3c361f14eb7e8fa9a388655fda34a81aba850caaa9dac20bc366f4c341413f9ad449e2a9cad4dd7f2d