Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 12:57
Static task
static1
Behavioral task
behavioral1
Sample
dc520f97398ead51ef973a1599b2749c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc520f97398ead51ef973a1599b2749c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc520f97398ead51ef973a1599b2749c_JaffaCakes118.exe
-
Size
335KB
-
MD5
dc520f97398ead51ef973a1599b2749c
-
SHA1
1ff1ae904fc50f47bae27c3201349ad4eb499810
-
SHA256
40d7d22f096d132f226a7bc08bbf68131a01ca7749def670c21b7b27db609935
-
SHA512
b825e4b264c2f69d8efe5f2dd9947ad7678e649b632cf9aacb438a7e417efd22283199aafb6f2b77d400dfc5ba64c86961ea78a09d91e69a5a830bcb64216d54
-
SSDEEP
6144:l7ItgahAb+QBXdxCY/Tv8Hqf+RoC7RoiCicubz:l7ItmrBXdxJF+vqiCi7z
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2832 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2384 ynamc.exe 2696 ynamc.EXE -
Loads dropped DLL 3 IoCs
pid Process 2256 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.EXE 2256 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.EXE 2384 ynamc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\{A88F9661-9A60-3845-C503-2C98CB64AC45} = "C:\\Users\\Admin\\AppData\\Roaming\\Izurry\\ynamc.exe" ynamc.EXE -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2232 set thread context of 2256 2232 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.exe 31 PID 2384 set thread context of 2696 2384 ynamc.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc520f97398ead51ef973a1599b2749c_JaffaCakes118.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ynamc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc520f97398ead51ef973a1599b2749c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE 2696 ynamc.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2256 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2232 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.exe 2384 ynamc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2256 2232 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2256 2232 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2256 2232 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2256 2232 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2256 2232 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2256 2232 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2256 2232 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2256 2232 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2256 2232 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2384 2256 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.EXE 32 PID 2256 wrote to memory of 2384 2256 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.EXE 32 PID 2256 wrote to memory of 2384 2256 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.EXE 32 PID 2256 wrote to memory of 2384 2256 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.EXE 32 PID 2384 wrote to memory of 2696 2384 ynamc.exe 33 PID 2384 wrote to memory of 2696 2384 ynamc.exe 33 PID 2384 wrote to memory of 2696 2384 ynamc.exe 33 PID 2384 wrote to memory of 2696 2384 ynamc.exe 33 PID 2384 wrote to memory of 2696 2384 ynamc.exe 33 PID 2384 wrote to memory of 2696 2384 ynamc.exe 33 PID 2384 wrote to memory of 2696 2384 ynamc.exe 33 PID 2384 wrote to memory of 2696 2384 ynamc.exe 33 PID 2384 wrote to memory of 2696 2384 ynamc.exe 33 PID 2256 wrote to memory of 2832 2256 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.EXE 34 PID 2256 wrote to memory of 2832 2256 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.EXE 34 PID 2256 wrote to memory of 2832 2256 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.EXE 34 PID 2256 wrote to memory of 2832 2256 dc520f97398ead51ef973a1599b2749c_JaffaCakes118.EXE 34 PID 2696 wrote to memory of 1096 2696 ynamc.EXE 19 PID 2696 wrote to memory of 1096 2696 ynamc.EXE 19 PID 2696 wrote to memory of 1096 2696 ynamc.EXE 19 PID 2696 wrote to memory of 1096 2696 ynamc.EXE 19 PID 2696 wrote to memory of 1096 2696 ynamc.EXE 19 PID 2696 wrote to memory of 1156 2696 ynamc.EXE 20 PID 2696 wrote to memory of 1156 2696 ynamc.EXE 20 PID 2696 wrote to memory of 1156 2696 ynamc.EXE 20 PID 2696 wrote to memory of 1156 2696 ynamc.EXE 20 PID 2696 wrote to memory of 1156 2696 ynamc.EXE 20 PID 2696 wrote to memory of 1188 2696 ynamc.EXE 21 PID 2696 wrote to memory of 1188 2696 ynamc.EXE 21 PID 2696 wrote to memory of 1188 2696 ynamc.EXE 21 PID 2696 wrote to memory of 1188 2696 ynamc.EXE 21 PID 2696 wrote to memory of 1188 2696 ynamc.EXE 21 PID 2696 wrote to memory of 1988 2696 ynamc.EXE 23 PID 2696 wrote to memory of 1988 2696 ynamc.EXE 23 PID 2696 wrote to memory of 1988 2696 ynamc.EXE 23 PID 2696 wrote to memory of 1988 2696 ynamc.EXE 23 PID 2696 wrote to memory of 1988 2696 ynamc.EXE 23 PID 2696 wrote to memory of 2832 2696 ynamc.EXE 34 PID 2696 wrote to memory of 2832 2696 ynamc.EXE 34 PID 2696 wrote to memory of 2832 2696 ynamc.EXE 34 PID 2696 wrote to memory of 2832 2696 ynamc.EXE 34 PID 2696 wrote to memory of 2832 2696 ynamc.EXE 34 PID 2696 wrote to memory of 288 2696 ynamc.EXE 36 PID 2696 wrote to memory of 288 2696 ynamc.EXE 36 PID 2696 wrote to memory of 288 2696 ynamc.EXE 36 PID 2696 wrote to memory of 288 2696 ynamc.EXE 36 PID 2696 wrote to memory of 288 2696 ynamc.EXE 36 PID 2696 wrote to memory of 2396 2696 ynamc.EXE 37 PID 2696 wrote to memory of 2396 2696 ynamc.EXE 37 PID 2696 wrote to memory of 2396 2696 ynamc.EXE 37 PID 2696 wrote to memory of 2396 2696 ynamc.EXE 37 PID 2696 wrote to memory of 2396 2696 ynamc.EXE 37 PID 2696 wrote to memory of 1508 2696 ynamc.EXE 38 PID 2696 wrote to memory of 1508 2696 ynamc.EXE 38 PID 2696 wrote to memory of 1508 2696 ynamc.EXE 38
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1096
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1156
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\dc520f97398ead51ef973a1599b2749c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc520f97398ead51ef973a1599b2749c_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\dc520f97398ead51ef973a1599b2749c_JaffaCakes118.EXE"C:\Users\Admin\AppData\Local\Temp\dc520f97398ead51ef973a1599b2749c_JaffaCakes118.EXE"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Roaming\Izurry\ynamc.exe"C:\Users\Admin\AppData\Roaming\Izurry\ynamc.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Roaming\Izurry\ynamc.EXE"C:\Users\Admin\AppData\Roaming\Izurry\ynamc.EXE"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp381e3d6b.bat"4⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2832
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1988
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:288
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2396
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1508
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD53d8b37f0299865ee3e6b6174583cfa1b
SHA130ccf58e0dce95076603d1333e860c1016ecaf91
SHA256c8f5a4ca23d011c2147e15c281cdc80a3d08f827a9da5fcb2342b634d3fcccb8
SHA512f917f563bd36ec27a4cafd620d3277918e63f3b12361baceb0ce92d9814200eebfd27febec8c3467b96761c2398fe531677a4aa9fac45156c212a0e1959c2b66
-
Filesize
335KB
MD511f13e4cf20ac75ad824216718434976
SHA10bcc2590b6ab2fdd782d7c59b55febbdc20d9944
SHA256ac81f445491e69cc3fb2db70b9f800b5fe988013cb9bb74b757e83d8a2db1f5e
SHA512f9fd99dd7370354ad64417ced49e3a5d268e6603d3db39380bd5635b89b88f096ebfe17bdd94cb9621a850e93159332fdb1a28136e5fb4bee751d28fd1974f36