Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 22:55
Static task
static1
Behavioral task
behavioral1
Sample
dd3193762c3515c65abd4ec5f704f0d2_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dd3193762c3515c65abd4ec5f704f0d2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dd3193762c3515c65abd4ec5f704f0d2_JaffaCakes118.exe
-
Size
946KB
-
MD5
dd3193762c3515c65abd4ec5f704f0d2
-
SHA1
29baed3498eaf872fa8821263a40f04b48acec30
-
SHA256
40332590793bf2c35cdb46695fddb62422b20aadfce5b5936db7159040fe5aa0
-
SHA512
3bb60b29c3d2293c8ad54bb35a7c410b5fe06a20fb3bdc2be9d6beff42c695739cd62c716282dd550cab7ba395d33672422271331208a3c002108c0517b1b0b8
-
SSDEEP
24576:8vIycEkSjb5p/tkSvyJi4qgjHDrys33Rgc9idCqSV:hyvX1TvYjjNxjKSV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2444 ShowMyPC.exe -
Loads dropped DLL 3 IoCs
pid Process 1824 dd3193762c3515c65abd4ec5f704f0d2_JaffaCakes118.exe 1824 dd3193762c3515c65abd4ec5f704f0d2_JaffaCakes118.exe 2444 ShowMyPC.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dd3193762c3515c65abd4ec5f704f0d2_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd3193762c3515c65abd4ec5f704f0d2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ShowMyPC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2444 ShowMyPC.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2444 1824 dd3193762c3515c65abd4ec5f704f0d2_JaffaCakes118.exe 28 PID 1824 wrote to memory of 2444 1824 dd3193762c3515c65abd4ec5f704f0d2_JaffaCakes118.exe 28 PID 1824 wrote to memory of 2444 1824 dd3193762c3515c65abd4ec5f704f0d2_JaffaCakes118.exe 28 PID 1824 wrote to memory of 2444 1824 dd3193762c3515c65abd4ec5f704f0d2_JaffaCakes118.exe 28 PID 1824 wrote to memory of 2444 1824 dd3193762c3515c65abd4ec5f704f0d2_JaffaCakes118.exe 28 PID 1824 wrote to memory of 2444 1824 dd3193762c3515c65abd4ec5f704f0d2_JaffaCakes118.exe 28 PID 1824 wrote to memory of 2444 1824 dd3193762c3515c65abd4ec5f704f0d2_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd3193762c3515c65abd4ec5f704f0d2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd3193762c3515c65abd4ec5f704f0d2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ShowMyPC.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ShowMyPC.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD5ab3ab62c71f6781368ef1507545f12ea
SHA1410b9d60058c190ff22f54d731ae9ee2d8d6ecf3
SHA256f00e8c45aa32f183226f338f95da85ef1ed32d30c1f15d1165627626a69ce5b0
SHA5123b8b6aece5516740bbf41173ddec87060ead0e825070b5f0f88b92bcc35c0c33c3486f189f7da2263b28060e7fb9124369eb02261e68f9128708990cdd0f0538
-
Filesize
29KB
MD54691ca9909a05864068b27e0bc925a3a
SHA15d395a285652dd785b12c2932e18a1e5ce10b2a5
SHA25660eee4921f7c1bc736a2486b4868ac65691c430890861d8973782ea8d3b6c7bc
SHA512c5c6114194a507cd256c7902ec9fd81a2b414bb9ed368e7fe0ec0be4019c094dee935e6498ca2ead3bd308db4435ba7b9db0a25ebec3a2ff73a5568b17555bf3
-
Filesize
1.8MB
MD5051e44a77c7b201ce6e69ae59a67b62d
SHA11cfb49575e2d6e5014b7640b13572d3accb93f0a
SHA2560d35b421957ad675975a6255f911c845aeffbe291d8dfe4fe830843817676ca3
SHA512fc541524a5aee3856221d15a420fb6d3078c9432035d9b4876203b24c7c08a6982a7e2947a2fc6a54f0257c13e65df3c77febc918ff753292fe5bb35926fde37