Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe
-
Size
298KB
-
MD5
df448b99aebcf3a6d49f45a057540f1c
-
SHA1
497b21a11ec053219f501cb09f1c01136fb48163
-
SHA256
dce5bd6a0593f8c3ff54379e5c8b77e92a5eb46f5ea3bc78c24c51716732b34a
-
SHA512
2919f2714f38deaab25703da7665d07b27ba865d733b9b6d6dba9280a488de734f2c1a50e50d9a67204df7c2cd16d9bb79468ea79e6d9b6a0c362f83de22db83
-
SSDEEP
3072:FBpe7XPX5omWqLEnCYvcvIXRTy1hmUI0xlOcwkSIvS3oGcFuG9hFoHk148GzMwFn:9eXCvDx8hzNxl8vIvSiFxTO8GzMc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2612 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2260 ozudu.exe -
Loads dropped DLL 1 IoCs
pid Process 1868 df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D9E5F948-3C80-AD4F-E7F9-6BD2C10548CF} = "C:\\Users\\Admin\\AppData\\Roaming\\Jyusz\\ozudu.exe" ozudu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1868 set thread context of 2612 1868 df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ozudu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Privacy df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe 2260 ozudu.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1868 df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe 2260 ozudu.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2260 1868 df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe 30 PID 1868 wrote to memory of 2260 1868 df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe 30 PID 1868 wrote to memory of 2260 1868 df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe 30 PID 1868 wrote to memory of 2260 1868 df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe 30 PID 2260 wrote to memory of 1088 2260 ozudu.exe 19 PID 2260 wrote to memory of 1088 2260 ozudu.exe 19 PID 2260 wrote to memory of 1088 2260 ozudu.exe 19 PID 2260 wrote to memory of 1088 2260 ozudu.exe 19 PID 2260 wrote to memory of 1088 2260 ozudu.exe 19 PID 2260 wrote to memory of 1176 2260 ozudu.exe 20 PID 2260 wrote to memory of 1176 2260 ozudu.exe 20 PID 2260 wrote to memory of 1176 2260 ozudu.exe 20 PID 2260 wrote to memory of 1176 2260 ozudu.exe 20 PID 2260 wrote to memory of 1176 2260 ozudu.exe 20 PID 2260 wrote to memory of 1200 2260 ozudu.exe 21 PID 2260 wrote to memory of 1200 2260 ozudu.exe 21 PID 2260 wrote to memory of 1200 2260 ozudu.exe 21 PID 2260 wrote to memory of 1200 2260 ozudu.exe 21 PID 2260 wrote to memory of 1200 2260 ozudu.exe 21 PID 2260 wrote to memory of 1244 2260 ozudu.exe 23 PID 2260 wrote to memory of 1244 2260 ozudu.exe 23 PID 2260 wrote to memory of 1244 2260 ozudu.exe 23 PID 2260 wrote to memory of 1244 2260 ozudu.exe 23 PID 2260 wrote to memory of 1244 2260 ozudu.exe 23 PID 2260 wrote to memory of 1868 2260 ozudu.exe 29 PID 2260 wrote to memory of 1868 2260 ozudu.exe 29 PID 2260 wrote to memory of 1868 2260 ozudu.exe 29 PID 2260 wrote to memory of 1868 2260 ozudu.exe 29 PID 2260 wrote to memory of 1868 2260 ozudu.exe 29 PID 1868 wrote to memory of 2612 1868 df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe 31 PID 1868 wrote to memory of 2612 1868 df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe 31 PID 1868 wrote to memory of 2612 1868 df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe 31 PID 1868 wrote to memory of 2612 1868 df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe 31 PID 1868 wrote to memory of 2612 1868 df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe 31 PID 1868 wrote to memory of 2612 1868 df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe 31 PID 1868 wrote to memory of 2612 1868 df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe 31 PID 1868 wrote to memory of 2612 1868 df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe 31 PID 1868 wrote to memory of 2612 1868 df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1088
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df448b99aebcf3a6d49f45a057540f1c_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Roaming\Jyusz\ozudu.exe"C:\Users\Admin\AppData\Roaming\Jyusz\ozudu.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2260
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp802a43df.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2612
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD582a53ac0e57be1ce270d7ac7d498616d
SHA12bfe249945d69c0e13d074a3c3917dd6323db4e4
SHA256e5c3e4774b0d08c11d894ce6c1c5bcdfa38ef512a5ccd2dcfdd3b92096fa70df
SHA5123e45efb05213c198ba0c5bdfc131d06f2bbe49274a875b063db77c8bf6427ebfb5cd184a1bf7a4352c6ab292b1eebb28c3a520eb57b37abb1f3c61b128fb2fff
-
Filesize
298KB
MD5f5aee0eb477146ecbb150c95a03a489a
SHA1e3d6bb4a0077492884ed506d39a09b7e0b1ea280
SHA256733204334353752675a00d706c19077e73c3d7813a70c11fd4289e87280dab7d
SHA51220fc76295117085440458e11144d8cfbe69270df41e8b3267d4f7223c6e7e8f40d51c2603dceee889bc10e0149bfc51bfb656c05f1f650278f14178a167ead36