Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
de81ada18a0f3f728798f00bec43bfa0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de81ada18a0f3f728798f00bec43bfa0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
de81ada18a0f3f728798f00bec43bfa0_JaffaCakes118.exe
-
Size
3.5MB
-
MD5
de81ada18a0f3f728798f00bec43bfa0
-
SHA1
e56944b4b88297ac2f6d89b7dcbbefec57477c42
-
SHA256
d579f20cda5946f1fdcaf495c8accff9041f5c367a53672c8468bec35d54caf8
-
SHA512
62aa39e0f2fc5bed63a07871098b5bb9e1371f73abbf1cac16e892210b1558199427ad70313a03f82d02714e4375fe05fb83d1ef1b62aace66d0698291c60ac7
-
SSDEEP
98304:33bobVkwiXFlJboUaQXK1XR0ZNSHm8GeRLfWFZzX:nbeirfa1GZN+PhLIZD
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2672 drvprosetup.exe 2880 drvprosetup.tmp -
Loads dropped DLL 5 IoCs
pid Process 2104 de81ada18a0f3f728798f00bec43bfa0_JaffaCakes118.exe 2672 drvprosetup.exe 2880 drvprosetup.tmp 2880 drvprosetup.tmp 2880 drvprosetup.tmp -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de81ada18a0f3f728798f00bec43bfa0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drvprosetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drvprosetup.tmp -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 drvprosetup.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString drvprosetup.tmp -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2672 2104 de81ada18a0f3f728798f00bec43bfa0_JaffaCakes118.exe 30 PID 2104 wrote to memory of 2672 2104 de81ada18a0f3f728798f00bec43bfa0_JaffaCakes118.exe 30 PID 2104 wrote to memory of 2672 2104 de81ada18a0f3f728798f00bec43bfa0_JaffaCakes118.exe 30 PID 2104 wrote to memory of 2672 2104 de81ada18a0f3f728798f00bec43bfa0_JaffaCakes118.exe 30 PID 2104 wrote to memory of 2672 2104 de81ada18a0f3f728798f00bec43bfa0_JaffaCakes118.exe 30 PID 2104 wrote to memory of 2672 2104 de81ada18a0f3f728798f00bec43bfa0_JaffaCakes118.exe 30 PID 2104 wrote to memory of 2672 2104 de81ada18a0f3f728798f00bec43bfa0_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2880 2672 drvprosetup.exe 31 PID 2672 wrote to memory of 2880 2672 drvprosetup.exe 31 PID 2672 wrote to memory of 2880 2672 drvprosetup.exe 31 PID 2672 wrote to memory of 2880 2672 drvprosetup.exe 31 PID 2672 wrote to memory of 2880 2672 drvprosetup.exe 31 PID 2672 wrote to memory of 2880 2672 drvprosetup.exe 31 PID 2672 wrote to memory of 2880 2672 drvprosetup.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\de81ada18a0f3f728798f00bec43bfa0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\de81ada18a0f3f728798f00bec43bfa0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\drvprosetup.exeC:\Users\Admin\AppData\Local\Temp\\drvprosetup.exe /VERYSILENT2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\is-025ID.tmp\drvprosetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-025ID.tmp\drvprosetup.tmp" /SL5="$70120,2744501,85504,C:\Users\Admin\AppData\Local\Temp\drvprosetup.exe" /VERYSILENT3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2880
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD53107c28da15cc8db52ecaeb41e92fa27
SHA19498f3281c0b79a8f051ca9aeb0d6132dcf0ca0f
SHA256e9318226bff1cf3225c26f0bde46ad08f2a745fe9de55153a41c7bf7eb194325
SHA5128b2d0c2744584899ac8cc15786dd13b977958c4d3c8f2cb50b7afeb52b0a6f647bf8b20ab19d5d3b562d8804f92b8fb5828f971124b4e089c0858f0a6ad1a2b8
-
Filesize
1.1MB
MD591c38c395631d57254356e90b9a6e554
SHA1cbe8ae15ec5c8a392b00ddbc71cf92eddd5645b4
SHA256e9804fa0e9a0b249a69539bf9ba3f2df95648f56676a61b8988e6648308ae83d
SHA5129f95567ceb618167899d954387771312b4895d03dcf65e5402c284af50e1ac1ec5d452a8069528a4761894dba02be7a97849be01626d1d688dc4059abf65f119
-
Filesize
1.3MB
MD5dfd23a69f1a7f5385eafafde8f5582f4
SHA1e578e02964582382d4cf90ac003bffa9dcd1dd30
SHA256701db9616b8ca5f24694a3b9fde8b96b08fbbe14871d9f7eeb721ff29d3259d2
SHA512740dda51de539a6c889fecfeeb157ae3ae706e9b6c59931c715ec4a660420b6667b2e01954b511ae872164bdb90be887cf3beddfb2fafad3ee945c92ecf6b174
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3