Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 14:24
Static task
static1
Behavioral task
behavioral1
Sample
dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe
-
Size
377KB
-
MD5
dc697759329abaaf6a6dc6acf57e7124
-
SHA1
034128d9159f6484c18f2497d700b4ddeb95ddf1
-
SHA256
20069e8530e9643a75fe1a6ab6919aca3a55da640156dbbad559078ece27634c
-
SHA512
2ad9c2bee80c8febad665cdfb1288a37e3176c13c8af9ab00db3cba04d45964ad483798db3a02ec24065eb0d9c7694bc43a1fc9371ba972138a341d19a16e1af
-
SSDEEP
6144:8B8lev8CcOsW1D8fBUkEv8a6dRPMfbt4xb7s5evZ08zj6:8mlevXfsgofykHREfbSbfvZY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1244 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1732 exyn.exe -
Loads dropped DLL 2 IoCs
pid Process 1924 dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe 1924 dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D5718048-3C80-AD4F-91EC-8CC98FD5AFD4} = "C:\\Users\\Admin\\AppData\\Roaming\\Ohdy\\exyn.exe" exyn.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1924 set thread context of 1244 1924 dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exyn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Privacy dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe 1732 exyn.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1924 dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe 1732 exyn.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1924 wrote to memory of 1732 1924 dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe 30 PID 1924 wrote to memory of 1732 1924 dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe 30 PID 1924 wrote to memory of 1732 1924 dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe 30 PID 1924 wrote to memory of 1732 1924 dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe 30 PID 1732 wrote to memory of 1120 1732 exyn.exe 19 PID 1732 wrote to memory of 1120 1732 exyn.exe 19 PID 1732 wrote to memory of 1120 1732 exyn.exe 19 PID 1732 wrote to memory of 1120 1732 exyn.exe 19 PID 1732 wrote to memory of 1120 1732 exyn.exe 19 PID 1732 wrote to memory of 1176 1732 exyn.exe 20 PID 1732 wrote to memory of 1176 1732 exyn.exe 20 PID 1732 wrote to memory of 1176 1732 exyn.exe 20 PID 1732 wrote to memory of 1176 1732 exyn.exe 20 PID 1732 wrote to memory of 1176 1732 exyn.exe 20 PID 1732 wrote to memory of 1208 1732 exyn.exe 21 PID 1732 wrote to memory of 1208 1732 exyn.exe 21 PID 1732 wrote to memory of 1208 1732 exyn.exe 21 PID 1732 wrote to memory of 1208 1732 exyn.exe 21 PID 1732 wrote to memory of 1208 1732 exyn.exe 21 PID 1732 wrote to memory of 1288 1732 exyn.exe 25 PID 1732 wrote to memory of 1288 1732 exyn.exe 25 PID 1732 wrote to memory of 1288 1732 exyn.exe 25 PID 1732 wrote to memory of 1288 1732 exyn.exe 25 PID 1732 wrote to memory of 1288 1732 exyn.exe 25 PID 1732 wrote to memory of 1924 1732 exyn.exe 29 PID 1732 wrote to memory of 1924 1732 exyn.exe 29 PID 1732 wrote to memory of 1924 1732 exyn.exe 29 PID 1732 wrote to memory of 1924 1732 exyn.exe 29 PID 1732 wrote to memory of 1924 1732 exyn.exe 29 PID 1924 wrote to memory of 1244 1924 dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe 31 PID 1924 wrote to memory of 1244 1924 dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe 31 PID 1924 wrote to memory of 1244 1924 dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe 31 PID 1924 wrote to memory of 1244 1924 dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe 31 PID 1924 wrote to memory of 1244 1924 dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe 31 PID 1924 wrote to memory of 1244 1924 dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe 31 PID 1924 wrote to memory of 1244 1924 dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe 31 PID 1924 wrote to memory of 1244 1924 dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe 31 PID 1924 wrote to memory of 1244 1924 dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc697759329abaaf6a6dc6acf57e7124_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Roaming\Ohdy\exyn.exe"C:\Users\Admin\AppData\Roaming\Ohdy\exyn.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1732
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp53d1968a.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1244
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD56c059b0c73e539ced64b75169ac900b5
SHA1d8655d6c09d40c01a1546d8f1d35b2efc0e40680
SHA2568f626c5fc1c51caeb3c3edc697df233792da30593ed97fd6de7db35e3fdcf061
SHA5127ab5f011008d34d292140a7b65fb66037e54f83cf5bdd596f9b9871588471336c61604582a04fad77e25c9acc0d1cadfe698ed0e548d1fe5c2d0047c5ab74881
-
Filesize
377KB
MD5266e1d5bc2e10b48c1aef10168d25bb6
SHA1c9abfe606f195ee60850649e5313f17bea9dde7c
SHA256194cd7c603112a79089a81fe5eb5493c44f4088993a41d36bff4dac977b57482
SHA5125cb261f5227523430e5b56d7a48650ae9ac736cd2cf5def2d16d5b62002a2abc5bde770e0ba63496ce184c90c97b4a0e2a77ce5ecc288a947d98a61b77f38412