Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe
-
Size
995KB
-
MD5
e27ac279696dc6b4309fd3efb516d8d6
-
SHA1
84abf4924c5e5ae5fb571dc7b3c90ae890ebfa0d
-
SHA256
364dd59b9d54d3dba476dfae0db524ef2e2a46bca22003b1bfc33f3ab2a3e261
-
SHA512
8dc43cf5b811993b2f3062731dda5e68b5056c95b828acb8ef0e1d423407b22fd0a46e5247f8da6298c21f0a66eebba5fc763e6d777bab41d1132509455a889a
-
SSDEEP
24576:Oj0oe78w/dp3lydjvE6d9LfYr8ucU0B24qJ7l/:Oj0T8w/dpIdj86d1Yr85UW27l/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2696 setup69.exe 2732 install36.exe -
Loads dropped DLL 8 IoCs
pid Process 2264 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 2696 setup69.exe 2696 setup69.exe 2696 setup69.exe 2264 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 2732 install36.exe 2732 install36.exe 2732 install36.exe -
resource yara_rule behavioral1/files/0x0008000000017403-1.dat upx behavioral1/memory/2696-6-0x0000000000400000-0x0000000000584000-memory.dmp upx behavioral1/memory/2264-4-0x00000000028D0000-0x0000000002A54000-memory.dmp upx behavioral1/memory/2696-17-0x0000000000400000-0x0000000000584000-memory.dmp upx behavioral1/files/0x0008000000017409-29.dat upx behavioral1/memory/2732-27-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2732-30-0x0000000000230000-0x00000000002F0000-memory.dmp upx behavioral1/memory/2264-24-0x0000000000AA0000-0x0000000000B60000-memory.dmp upx behavioral1/memory/2732-35-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2732-36-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2732-37-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2732-38-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2732-39-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2732-40-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2732-41-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2732-42-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2732-43-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2732-44-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2732-45-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2732-46-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2732-47-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2732-48-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2732-49-0x0000000000400000-0x00000000004C0000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language install36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe -
Gathers system information 1 TTPs 5 IoCs
Runs systeminfo.exe.
pid Process 3060 systeminfo.exe 792 systeminfo.exe 1072 systeminfo.exe 1600 systeminfo.exe 1416 systeminfo.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2732 install36.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2696 2264 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2696 2264 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2696 2264 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2696 2264 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2696 2264 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2696 2264 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2696 2264 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 30 PID 2696 wrote to memory of 2676 2696 setup69.exe 31 PID 2696 wrote to memory of 2676 2696 setup69.exe 31 PID 2696 wrote to memory of 2676 2696 setup69.exe 31 PID 2696 wrote to memory of 2676 2696 setup69.exe 31 PID 2696 wrote to memory of 2676 2696 setup69.exe 31 PID 2696 wrote to memory of 2676 2696 setup69.exe 31 PID 2696 wrote to memory of 2676 2696 setup69.exe 31 PID 2264 wrote to memory of 2732 2264 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 33 PID 2264 wrote to memory of 2732 2264 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 33 PID 2264 wrote to memory of 2732 2264 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 33 PID 2264 wrote to memory of 2732 2264 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 33 PID 2264 wrote to memory of 2732 2264 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 33 PID 2264 wrote to memory of 2732 2264 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 33 PID 2264 wrote to memory of 2732 2264 e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe 33 PID 2676 wrote to memory of 3060 2676 CMD.exe 34 PID 2676 wrote to memory of 3060 2676 CMD.exe 34 PID 2676 wrote to memory of 3060 2676 CMD.exe 34 PID 2676 wrote to memory of 3060 2676 CMD.exe 34 PID 2676 wrote to memory of 3060 2676 CMD.exe 34 PID 2676 wrote to memory of 3060 2676 CMD.exe 34 PID 2676 wrote to memory of 3060 2676 CMD.exe 34 PID 2676 wrote to memory of 792 2676 CMD.exe 37 PID 2676 wrote to memory of 792 2676 CMD.exe 37 PID 2676 wrote to memory of 792 2676 CMD.exe 37 PID 2676 wrote to memory of 792 2676 CMD.exe 37 PID 2676 wrote to memory of 792 2676 CMD.exe 37 PID 2676 wrote to memory of 792 2676 CMD.exe 37 PID 2676 wrote to memory of 792 2676 CMD.exe 37 PID 2676 wrote to memory of 1072 2676 CMD.exe 38 PID 2676 wrote to memory of 1072 2676 CMD.exe 38 PID 2676 wrote to memory of 1072 2676 CMD.exe 38 PID 2676 wrote to memory of 1072 2676 CMD.exe 38 PID 2676 wrote to memory of 1072 2676 CMD.exe 38 PID 2676 wrote to memory of 1072 2676 CMD.exe 38 PID 2676 wrote to memory of 1072 2676 CMD.exe 38 PID 2676 wrote to memory of 1600 2676 CMD.exe 39 PID 2676 wrote to memory of 1600 2676 CMD.exe 39 PID 2676 wrote to memory of 1600 2676 CMD.exe 39 PID 2676 wrote to memory of 1600 2676 CMD.exe 39 PID 2676 wrote to memory of 1600 2676 CMD.exe 39 PID 2676 wrote to memory of 1600 2676 CMD.exe 39 PID 2676 wrote to memory of 1600 2676 CMD.exe 39 PID 2676 wrote to memory of 1416 2676 CMD.exe 40 PID 2676 wrote to memory of 1416 2676 CMD.exe 40 PID 2676 wrote to memory of 1416 2676 CMD.exe 40 PID 2676 wrote to memory of 1416 2676 CMD.exe 40 PID 2676 wrote to memory of 1416 2676 CMD.exe 40 PID 2676 wrote to memory of 1416 2676 CMD.exe 40 PID 2676 wrote to memory of 1416 2676 CMD.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\setup69.exeC:\Users\Admin\AppData\Local\Temp\setup69.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\CMD.exeCMD /C SYSTEMINFO && SYSTEMINFO && SYSTEMINFO && SYSTEMINFO && SYSTEMINFO && DEL "C:\Users\Admin\AppData\Local\Temp\setup69.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\systeminfo.exeSYSTEMINFO4⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:3060
-
-
C:\Windows\SysWOW64\systeminfo.exeSYSTEMINFO4⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:792
-
-
C:\Windows\SysWOW64\systeminfo.exeSYSTEMINFO4⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:1072
-
-
C:\Windows\SysWOW64\systeminfo.exeSYSTEMINFO4⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:1600
-
-
C:\Windows\SysWOW64\systeminfo.exeSYSTEMINFO4⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:1416
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\install36.exeC:\Users\Admin\AppData\Local\Temp\install36.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD5413d0b81dd8b82c3dde4e5ba487c2ba1
SHA1e295bbcbd497ba08b8e33658a1d8dc48a146252f
SHA25617f2b50de7960d913e8b573d5ecc4ade8a7dfe44cbac09384dc2a721725e3ba3
SHA5122eaba5c7213fad7bbb50753c971d150abb313ff66fb10d78d38cf21555c9bdb65e3afa20f41847120e4ee7919716ca70b511d2e67574e7acf6ffe75f5039e0e7
-
Filesize
730KB
MD5f424e134bc3ffd7bdd5bf9aa8ec1b83f
SHA1800fadf2f2669dfeecbc9c8c1b72c4c52831883f
SHA25621aff37c2a7b05de8daf26e3ec3cecaf6215665800831dea0fbceb2a570774fc
SHA51256cd6da933febaa89019ff3118b7f77ccd3ea1921ea80f002aa8a37c424e33e568add062722e0db1c75607b3a4ce1b21a5927b07ec02f86e8db6d93b0ec77a9b