Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
defc9d452668ea45d9ae227c7e03b297_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
defc9d452668ea45d9ae227c7e03b297_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
defc9d452668ea45d9ae227c7e03b297_JaffaCakes118.exe
-
Size
171KB
-
MD5
defc9d452668ea45d9ae227c7e03b297
-
SHA1
c557a904f86188c7c5f4f461f8c470442fda52c0
-
SHA256
7b85de170ce879dbcbb803d563d60735007f17eb336025cfc88aa5d1e4d30b86
-
SHA512
bb570c53261055b0fe8aa64407d7979e800f32ea5b93b0d97fefc8f75bfc55ab46440986749823968b88da62330930545531e308a2362499928083628d4b76e4
-
SSDEEP
3072:w6pQc+sSxnTrGadgsFqZeo4pwkhUmZr3hPsOraS87FYqjTZbn4TGz:w6p2sSxTrGvsFUejWyZr3hPswa1TZjxz
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language defc9d452668ea45d9ae227c7e03b297_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2548 defc9d452668ea45d9ae227c7e03b297_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2384 2548 defc9d452668ea45d9ae227c7e03b297_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2384 2548 defc9d452668ea45d9ae227c7e03b297_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2384 2548 defc9d452668ea45d9ae227c7e03b297_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2384 2548 defc9d452668ea45d9ae227c7e03b297_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2372 2384 cmd.exe 32 PID 2384 wrote to memory of 2372 2384 cmd.exe 32 PID 2384 wrote to memory of 2372 2384 cmd.exe 32 PID 2384 wrote to memory of 2372 2384 cmd.exe 32 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2372 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\defc9d452668ea45d9ae227c7e03b297_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\defc9d452668ea45d9ae227c7e03b297_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\vnp50D7.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\defc9d452668ea45d9ae227c7e03b297_JaffaCakes118.exe""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\defc9d452668ea45d9ae227c7e03b297_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2372
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59B
MD5937ee141334d9145e80e86ee4d89ccb5
SHA127e45777eccfb46b32b4998aab8b97aa7726a590
SHA2562b448ff8c70c9f66a381540e705bf16f55e0a1179e42b257425fc3e0132b16d3
SHA512c654efbf0acabfcd06b46dae7e5591ed7ca002982909f0031860bb57abc0b4525e93b94e97e97f9ee4515ea7cb915b61b72a44543c6453a6337b2ebb006c65a1