Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 14:34
Static task
static1
Behavioral task
behavioral1
Sample
eb89bdbf63e9702353b7cad5a5673b1d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb89bdbf63e9702353b7cad5a5673b1d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb89bdbf63e9702353b7cad5a5673b1d_JaffaCakes118.exe
-
Size
116KB
-
MD5
eb89bdbf63e9702353b7cad5a5673b1d
-
SHA1
88335f30a5d7dc1d16d1ae46eee400af590ed921
-
SHA256
d87a71b6f987e229e73b61d2eee9dbea1b6480ac438a7d0bc2342856504c0429
-
SHA512
3be74b62c772f83bffdfd57f6109a69ea4095cee7384ba65f77acf12527836fc6ce03714bc4b286ace03228cca99a23dc20f8d4d10f4e82dd2e95b603ca718e8
-
SSDEEP
3072:98RTVXDNJqxSA5HDc3I3nNoOsRXurRUQzj+5f/U:SZRcx5VMpOKXur2Qf+5f
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2240 Kpuvua.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job eb89bdbf63e9702353b7cad5a5673b1d_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job eb89bdbf63e9702353b7cad5a5673b1d_JaffaCakes118.exe File created C:\Windows\Kpuvua.exe eb89bdbf63e9702353b7cad5a5673b1d_JaffaCakes118.exe File opened for modification C:\Windows\Kpuvua.exe eb89bdbf63e9702353b7cad5a5673b1d_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Kpuvua.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Kpuvua.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kpuvua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb89bdbf63e9702353b7cad5a5673b1d_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main Kpuvua.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International Kpuvua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe 2240 Kpuvua.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2240 2984 eb89bdbf63e9702353b7cad5a5673b1d_JaffaCakes118.exe 30 PID 2984 wrote to memory of 2240 2984 eb89bdbf63e9702353b7cad5a5673b1d_JaffaCakes118.exe 30 PID 2984 wrote to memory of 2240 2984 eb89bdbf63e9702353b7cad5a5673b1d_JaffaCakes118.exe 30 PID 2984 wrote to memory of 2240 2984 eb89bdbf63e9702353b7cad5a5673b1d_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb89bdbf63e9702353b7cad5a5673b1d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb89bdbf63e9702353b7cad5a5673b1d_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\Kpuvua.exeC:\Windows\Kpuvua.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD56d5ababb65e9ff214b73e891b4afe6e8
SHA121ed4c7af50d987589a9029fc0422151be3a0fc2
SHA256913da1f8df6f8fd47593840d533ba0458cc9873996bf310460abb495b34c232a
SHA5123c00511777c24d5efc875f73192fdd9e3cabdd271bc10f89baecf460326b93051314acb748db9c2c3e3c98641dd3deb73d925bf11af0fa477bed4876ba8f404a
-
Filesize
116KB
MD5eb89bdbf63e9702353b7cad5a5673b1d
SHA188335f30a5d7dc1d16d1ae46eee400af590ed921
SHA256d87a71b6f987e229e73b61d2eee9dbea1b6480ac438a7d0bc2342856504c0429
SHA5123be74b62c772f83bffdfd57f6109a69ea4095cee7384ba65f77acf12527836fc6ce03714bc4b286ace03228cca99a23dc20f8d4d10f4e82dd2e95b603ca718e8
-
Filesize
372B
MD51b942984482b1c700a5df544a549c5d4
SHA1a9a71c1d2e81751d9a9d4e46738a92ad04e56c3f
SHA256e9814366969235e2fb943aae2fe39c95583cad8bb2a2131d8660487982089028
SHA512423ebd3362d76f52aed39b7a1b51c1f954c98294e1b8c3095feb53389c9797fc78378d485501d61c9a29f48b4e3b3612c1feb5c3b205c6edbb75822ccfd5f23f