Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 05:54
Static task
static1
Behavioral task
behavioral1
Sample
eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe
-
Size
964KB
-
MD5
eab54fa7315ca388b13d9bbb8e37ce14
-
SHA1
6d741eaf7cd0ea9d53052225d4f6bc5aa5ee21b3
-
SHA256
95a27c1190affa00f069cb8966f9c5487ac4009848021596b57478658cbfe28f
-
SHA512
33a600fc4edb926de1726af9d02ac11130ee896ee4373c831b65103e337789e3c3ab36f02760d3365c9f42bdf826f0a3b49ac4216ad2de55c4f1cd1873bbbdf7
-
SSDEEP
6144:eS+M0ROoZ04CUpNZ7xbKoV2cN+P31ja/VozMUqKfA:eS+MgLCUpn7xbNZN+P31ja/NvK
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 2400 registry.exe 2912 registry.exe 2784 registry.exe 2244 registry.exe 1052 registry.exe 1260 registry.exe 2004 registry.exe 2116 registry.exe 2592 registry.exe 1124 registry.exe -
Loads dropped DLL 20 IoCs
pid Process 1920 eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe 1920 eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe 2400 registry.exe 2400 registry.exe 2912 registry.exe 2912 registry.exe 2784 registry.exe 2784 registry.exe 2244 registry.exe 2244 registry.exe 1052 registry.exe 1052 registry.exe 1260 registry.exe 1260 registry.exe 2004 registry.exe 2004 registry.exe 2116 registry.exe 2116 registry.exe 2592 registry.exe 2592 registry.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\registry.exe eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe File created C:\Windows\SysWOW64\registry.exe registry.exe File created C:\Windows\SysWOW64\registry.exe eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\registry.exe registry.exe File opened for modification C:\Windows\SysWOW64\registry.exe registry.exe File opened for modification C:\Windows\SysWOW64\registry.exe registry.exe File created C:\Windows\SysWOW64\registry.exe registry.exe File created C:\Windows\SysWOW64\registry.exe registry.exe File created C:\Windows\SysWOW64\registry.exe registry.exe File created C:\Windows\SysWOW64\registry.exe registry.exe File created C:\Windows\SysWOW64\registry.exe registry.exe File opened for modification C:\Windows\SysWOW64\registry.exe registry.exe File opened for modification C:\Windows\SysWOW64\registry.exe registry.exe File created C:\Windows\SysWOW64\registry.exe registry.exe File opened for modification C:\Windows\SysWOW64\registry.exe registry.exe File created C:\Windows\SysWOW64\registry.exe registry.exe File opened for modification C:\Windows\SysWOW64\registry.exe registry.exe File opened for modification C:\Windows\SysWOW64\registry.exe registry.exe File created C:\Windows\SysWOW64\registry.exe registry.exe File opened for modification C:\Windows\SysWOW64\registry.exe registry.exe File opened for modification C:\Windows\SysWOW64\registry.exe registry.exe File created C:\Windows\SysWOW64\registry.exe registry.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language registry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language registry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language registry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language registry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language registry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language registry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language registry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language registry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language registry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language registry.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2400 1920 eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe 30 PID 1920 wrote to memory of 2400 1920 eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe 30 PID 1920 wrote to memory of 2400 1920 eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe 30 PID 1920 wrote to memory of 2400 1920 eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2912 2400 registry.exe 31 PID 2400 wrote to memory of 2912 2400 registry.exe 31 PID 2400 wrote to memory of 2912 2400 registry.exe 31 PID 2400 wrote to memory of 2912 2400 registry.exe 31 PID 2912 wrote to memory of 2784 2912 registry.exe 33 PID 2912 wrote to memory of 2784 2912 registry.exe 33 PID 2912 wrote to memory of 2784 2912 registry.exe 33 PID 2912 wrote to memory of 2784 2912 registry.exe 33 PID 2784 wrote to memory of 2244 2784 registry.exe 34 PID 2784 wrote to memory of 2244 2784 registry.exe 34 PID 2784 wrote to memory of 2244 2784 registry.exe 34 PID 2784 wrote to memory of 2244 2784 registry.exe 34 PID 2244 wrote to memory of 1052 2244 registry.exe 35 PID 2244 wrote to memory of 1052 2244 registry.exe 35 PID 2244 wrote to memory of 1052 2244 registry.exe 35 PID 2244 wrote to memory of 1052 2244 registry.exe 35 PID 1052 wrote to memory of 1260 1052 registry.exe 36 PID 1052 wrote to memory of 1260 1052 registry.exe 36 PID 1052 wrote to memory of 1260 1052 registry.exe 36 PID 1052 wrote to memory of 1260 1052 registry.exe 36 PID 1260 wrote to memory of 2004 1260 registry.exe 37 PID 1260 wrote to memory of 2004 1260 registry.exe 37 PID 1260 wrote to memory of 2004 1260 registry.exe 37 PID 1260 wrote to memory of 2004 1260 registry.exe 37 PID 2004 wrote to memory of 2116 2004 registry.exe 38 PID 2004 wrote to memory of 2116 2004 registry.exe 38 PID 2004 wrote to memory of 2116 2004 registry.exe 38 PID 2004 wrote to memory of 2116 2004 registry.exe 38 PID 2116 wrote to memory of 2592 2116 registry.exe 39 PID 2116 wrote to memory of 2592 2116 registry.exe 39 PID 2116 wrote to memory of 2592 2116 registry.exe 39 PID 2116 wrote to memory of 2592 2116 registry.exe 39 PID 2592 wrote to memory of 1124 2592 registry.exe 40 PID 2592 wrote to memory of 1124 2592 registry.exe 40 PID 2592 wrote to memory of 1124 2592 registry.exe 40 PID 2592 wrote to memory of 1124 2592 registry.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\registry.exeC:\Windows\system32\registry.exe 476 "C:\Users\Admin\AppData\Local\Temp\eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\registry.exeC:\Windows\system32\registry.exe 528 "C:\Windows\SysWOW64\registry.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\registry.exeC:\Windows\system32\registry.exe 532 "C:\Windows\SysWOW64\registry.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\registry.exeC:\Windows\system32\registry.exe 536 "C:\Windows\SysWOW64\registry.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\registry.exeC:\Windows\system32\registry.exe 548 "C:\Windows\SysWOW64\registry.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\registry.exeC:\Windows\system32\registry.exe 540 "C:\Windows\SysWOW64\registry.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\registry.exeC:\Windows\system32\registry.exe 560 "C:\Windows\SysWOW64\registry.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\registry.exeC:\Windows\system32\registry.exe 544 "C:\Windows\SysWOW64\registry.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\registry.exeC:\Windows\system32\registry.exe 564 "C:\Windows\SysWOW64\registry.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\registry.exeC:\Windows\system32\registry.exe 552 "C:\Windows\SysWOW64\registry.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1124
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
964KB
MD5eab54fa7315ca388b13d9bbb8e37ce14
SHA16d741eaf7cd0ea9d53052225d4f6bc5aa5ee21b3
SHA25695a27c1190affa00f069cb8966f9c5487ac4009848021596b57478658cbfe28f
SHA51233a600fc4edb926de1726af9d02ac11130ee896ee4373c831b65103e337789e3c3ab36f02760d3365c9f42bdf826f0a3b49ac4216ad2de55c4f1cd1873bbbdf7