Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe
-
Size
416KB
-
MD5
dd4c12c36bbd3a7fcb4c7368594d101d
-
SHA1
93cbd399d1aad149262b8df0cdd69e6cc2092e8e
-
SHA256
348e3e2a52ffed746bb90ddc3a2908fdc85c32fd2551d8c30223ed30290ad8a1
-
SHA512
49bd59e425a7116a6370fccaee8972df19f750a340254e9906be19153b7284c6f082f6b6b8e3e6168e72dfa4cf61f15b922cd3c4f196e94bfcaf58d076532798
-
SSDEEP
6144:GCkYKD36tLL3izjZqLnioYIzUs/P9yhfJRGkx/6Dq:M36tLLYjZYiIQMPgnx/Oq
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2932 service.exe 760 service.exe 2612 service.exe -
Loads dropped DLL 5 IoCs
pid Process 2068 dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe 2068 dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe 2068 dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe 2068 dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe 2068 dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/760-38-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/760-41-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/760-43-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/760-51-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\service.exe" reg.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum service.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2932 set thread context of 760 2932 service.exe 34 PID 760 set thread context of 2612 760 service.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2068 dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe 2932 service.exe 760 service.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2128 2068 dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2128 2068 dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2128 2068 dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2128 2068 dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe 30 PID 2128 wrote to memory of 2604 2128 cmd.exe 32 PID 2128 wrote to memory of 2604 2128 cmd.exe 32 PID 2128 wrote to memory of 2604 2128 cmd.exe 32 PID 2128 wrote to memory of 2604 2128 cmd.exe 32 PID 2068 wrote to memory of 2932 2068 dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe 33 PID 2068 wrote to memory of 2932 2068 dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe 33 PID 2068 wrote to memory of 2932 2068 dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe 33 PID 2068 wrote to memory of 2932 2068 dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe 33 PID 2932 wrote to memory of 760 2932 service.exe 34 PID 2932 wrote to memory of 760 2932 service.exe 34 PID 2932 wrote to memory of 760 2932 service.exe 34 PID 2932 wrote to memory of 760 2932 service.exe 34 PID 2932 wrote to memory of 760 2932 service.exe 34 PID 2932 wrote to memory of 760 2932 service.exe 34 PID 2932 wrote to memory of 760 2932 service.exe 34 PID 2932 wrote to memory of 760 2932 service.exe 34 PID 2932 wrote to memory of 760 2932 service.exe 34 PID 760 wrote to memory of 2612 760 service.exe 35 PID 760 wrote to memory of 2612 760 service.exe 35 PID 760 wrote to memory of 2612 760 service.exe 35 PID 760 wrote to memory of 2612 760 service.exe 35 PID 760 wrote to memory of 2612 760 service.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\259458647.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Microsoft" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\service.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2604
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\service.exe"C:\Users\Admin\AppData\Roaming\Microsoft\service.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Roaming\Microsoft\service.exe"C:\Users\Admin\AppData\Roaming\Microsoft\service.exe"3⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Roaming\Microsoft\service.exeC:\Users\Admin\AppData\Roaming\Microsoft\service.exe4⤵
- Executes dropped EXE
PID:2612
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146B
MD57eee65b102f30fd1ead48a8cd3b99827
SHA12f74a754019f280c6186c11531d460006814952e
SHA2565748c60056db288b67e61148b339778816279e36907977f4fe03b5df04f6b57f
SHA512a06de9e35ada579a95b2ba399e4c65b074d642788d456e10e0ae967896ac729c552f715261d9dc8c17fffca8d6b9144a6155ff11ab8569a82bdbd9d26109bd85
-
Filesize
416KB
MD51eb88ef5aa2533c25c88321907bd5224
SHA1e1efac481245f63dda807daace940205a21c319e
SHA2563f713418cb76c55dfed3c61ca4b939001e0ac0582de52482a38768289c3ac429
SHA512ec75dcd67d078ec33dd1c566752c76946f812f7d0c0f8690e5d3fa0ffad8565c5e5309db24afdc6c23c5eabbcdf0f7f9039349a20c97893cfbc59e723c441454