Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
de1af5595f8812fd83f3fa031dee9bc4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de1af5595f8812fd83f3fa031dee9bc4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
de1af5595f8812fd83f3fa031dee9bc4_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
de1af5595f8812fd83f3fa031dee9bc4
-
SHA1
0facebac020f8ff1c3a111ee749b7a87e1b47e66
-
SHA256
14d39d8cdd9cdad6f44d4b9b65f99a13c95c56ba9a89f32174fd0b2d351349a1
-
SHA512
670012a152038ff22ec47bf357c64ece545457dba66a2f9d4b1d40c487c378c4f29901bad5c3ff62d1322e805f8fa88110e673068dbc69744845dc9ebaf57b6d
-
SSDEEP
24576:SozqxQKYuUMAyzpdVcFVV1SHXE6papv3b+px5uCiE8k:6QxuXAyzUwX81Lq3u08k
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2760 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2796 34199957.exe -
Loads dropped DLL 4 IoCs
pid Process 2760 cmd.exe 2760 cmd.exe 2796 34199957.exe 2796 34199957.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\de1af5595f8812fd83f3fa031dee9bc4_JaffaCakes118 = "\"C:\\Users\\Admin\\AppData\\Local\\34199957.exe\" 0 26 " de1af5595f8812fd83f3fa031dee9bc4_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\34199957 = "\"C:\\Users\\Admin\\AppData\\Local\\34199957.exe\" 0 26 " 34199957.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34199957.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de1af5595f8812fd83f3fa031dee9bc4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2876 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2796 34199957.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2796 34199957.exe 2796 34199957.exe 2796 34199957.exe 2796 34199957.exe 2796 34199957.exe 2796 34199957.exe 2796 34199957.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2796 34199957.exe 2796 34199957.exe 2796 34199957.exe 2796 34199957.exe 2796 34199957.exe 2796 34199957.exe 2796 34199957.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2760 2316 de1af5595f8812fd83f3fa031dee9bc4_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2760 2316 de1af5595f8812fd83f3fa031dee9bc4_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2760 2316 de1af5595f8812fd83f3fa031dee9bc4_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2760 2316 de1af5595f8812fd83f3fa031dee9bc4_JaffaCakes118.exe 30 PID 2760 wrote to memory of 2876 2760 cmd.exe 32 PID 2760 wrote to memory of 2876 2760 cmd.exe 32 PID 2760 wrote to memory of 2876 2760 cmd.exe 32 PID 2760 wrote to memory of 2876 2760 cmd.exe 32 PID 2760 wrote to memory of 2796 2760 cmd.exe 33 PID 2760 wrote to memory of 2796 2760 cmd.exe 33 PID 2760 wrote to memory of 2796 2760 cmd.exe 33 PID 2760 wrote to memory of 2796 2760 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\de1af5595f8812fd83f3fa031dee9bc4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\de1af5595f8812fd83f3fa031dee9bc4_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\8813890.bat" "2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v de1af5595f8812fd83f3fa031dee9bc4_JaffaCakes118 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2876
-
-
C:\Users\Admin\AppData\Local\34199957.exeC:\Users\Admin\AppData\Local\34199957.exe -i3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
439B
MD5f4a6fca33f14d9bcb71cd14eea292474
SHA1e2745b3435201ce9a6508b8aeabc9819638df77f
SHA2562984137198e19b2bf80c2a6605b2a11d4e331b5453c67581cd5647ea1ec3d261
SHA512e4be46b7ae0da0625f404eca48840515bad650e1d5a9c06ba739848a97a3ce3cb7a904a3a1ee88327ecddf1663a4ff09ef434aaf7edcff7b0ffd4cb6b45f7ed2
-
Filesize
1.1MB
MD5de1af5595f8812fd83f3fa031dee9bc4
SHA10facebac020f8ff1c3a111ee749b7a87e1b47e66
SHA25614d39d8cdd9cdad6f44d4b9b65f99a13c95c56ba9a89f32174fd0b2d351349a1
SHA512670012a152038ff22ec47bf357c64ece545457dba66a2f9d4b1d40c487c378c4f29901bad5c3ff62d1322e805f8fa88110e673068dbc69744845dc9ebaf57b6d