Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 09:13
Static task
static1
Behavioral task
behavioral1
Sample
da080ed5ec4b2bab4dc4fdbfdd9a8b24_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
da080ed5ec4b2bab4dc4fdbfdd9a8b24_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da080ed5ec4b2bab4dc4fdbfdd9a8b24_JaffaCakes118.exe
-
Size
45KB
-
MD5
da080ed5ec4b2bab4dc4fdbfdd9a8b24
-
SHA1
a6c7fb1919a44d2fa4f2cb4e2883909f75e4e312
-
SHA256
a8b17c52f9727aa233a371ed2d86ce8bd8de6cba2849c94badc9f5fddce85ffb
-
SHA512
9d8d314905a017e8b6e65bb7166b00e3409a4b71754e1a834b6dc1939638d03d8d5cce81cf88e162898ce401a8c5647200d1e6be1d8e213ccc1853afa2088ca9
-
SSDEEP
768:akMd0OkN0RI9+Afclq/5fkQIjiQqNzTOA/60SfVr4Yy+jaxZxyRlmdCPZ1NWYL:+mtS4+ApedjibTOAi0+VOCaIRlLr
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\husjdd8s\ImagePath = "C:\\Windows\\system32\\husjdd8s.exe -j" da080ed5ec4b2bab4dc4fdbfdd9a8b24_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2924 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2712 husjdd8s.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\husjdd8s.exe da080ed5ec4b2bab4dc4fdbfdd9a8b24_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\husjdd8s.exe da080ed5ec4b2bab4dc4fdbfdd9a8b24_JaffaCakes118.exe File created C:\Windows\SysWOW64\husjdd8s.exe husjdd8s.exe File created C:\Windows\SysWOW64\KillMe.bat da080ed5ec4b2bab4dc4fdbfdd9a8b24_JaffaCakes118.exe File created C:\Windows\SysWOW64\osiesd3.dll husjdd8s.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da080ed5ec4b2bab4dc4fdbfdd9a8b24_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language husjdd8s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2280 da080ed5ec4b2bab4dc4fdbfdd9a8b24_JaffaCakes118.exe 2712 husjdd8s.exe 2712 husjdd8s.exe 2712 husjdd8s.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2924 2280 da080ed5ec4b2bab4dc4fdbfdd9a8b24_JaffaCakes118.exe 31 PID 2280 wrote to memory of 2924 2280 da080ed5ec4b2bab4dc4fdbfdd9a8b24_JaffaCakes118.exe 31 PID 2280 wrote to memory of 2924 2280 da080ed5ec4b2bab4dc4fdbfdd9a8b24_JaffaCakes118.exe 31 PID 2280 wrote to memory of 2924 2280 da080ed5ec4b2bab4dc4fdbfdd9a8b24_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\da080ed5ec4b2bab4dc4fdbfdd9a8b24_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da080ed5ec4b2bab4dc4fdbfdd9a8b24_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\KillMe.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2924
-
-
C:\Windows\SysWOW64\husjdd8s.exeC:\Windows\SysWOW64\husjdd8s.exe -j1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239B
MD5913adf070c2e400a4b0db3c498a64a46
SHA164be61565b85139b40bdbc886d35606debdf34f2
SHA256a27b9f5c4198c33df78dcd803c082391ddb015a649f3ec5045ea3c80fcf75012
SHA512d06b83fc801f077addfd509f7dd196714428043d75d7e911d3daa508abe46783f7e9ab112446f929a9cc771fb870c51108317143755ee7e5191022827d19db4c
-
Filesize
45KB
MD5da080ed5ec4b2bab4dc4fdbfdd9a8b24
SHA1a6c7fb1919a44d2fa4f2cb4e2883909f75e4e312
SHA256a8b17c52f9727aa233a371ed2d86ce8bd8de6cba2849c94badc9f5fddce85ffb
SHA5129d8d314905a017e8b6e65bb7166b00e3409a4b71754e1a834b6dc1939638d03d8d5cce81cf88e162898ce401a8c5647200d1e6be1d8e213ccc1853afa2088ca9