Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 16:59 UTC
Behavioral task
behavioral1
Sample
ebca9fa879db0393656dcab8b157f83b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebca9fa879db0393656dcab8b157f83b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ebca9fa879db0393656dcab8b157f83b_JaffaCakes118.exe
-
Size
168KB
-
MD5
ebca9fa879db0393656dcab8b157f83b
-
SHA1
6ec35c95e835f5aabd52b4ff9c61cce2c55cb1b8
-
SHA256
323418a8f2b9a75fcafe1d3173a338c881f6c97db760cf33c8e223fcf67eaf07
-
SHA512
5be7f9fc0c79637f2f88a1c428567eab6c5f8c416a0c98a3eb07f969b5939de7aa1e28f7f99ab4d3a4f7f8f2f66fac5228d89595d235b414bc710abf96eda34b
-
SSDEEP
3072:n4LqsDP/vfP/vfP/I4oYII9IX7IrX5kMEdQvfbzizb7j7rOizodjoeyZGpmS2aWS:IrXa3QLib37rOizaGZsmS2bqg6L
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2388 ¸´¼þ1~1.EXE 2092 ¸´¼þ1~1.EXE 2412 zqhjao.exe 1716 zqhjao.exe -
Loads dropped DLL 4 IoCs
pid Process 1684 ebca9fa879db0393656dcab8b157f83b_JaffaCakes118.exe 1684 ebca9fa879db0393656dcab8b157f83b_JaffaCakes118.exe 2388 ¸´¼þ1~1.EXE 2412 zqhjao.exe -
resource yara_rule behavioral1/memory/1684-0-0x0000000001000000-0x0000000001052000-memory.dmp vmprotect behavioral1/memory/1684-26-0x0000000001000000-0x0000000001052000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ebca9fa879db0393656dcab8b157f83b_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\zqhjao.exe ¸´¼þ1~1.EXE File opened for modification C:\Windows\SysWOW64\zqhjao.exe ¸´¼þ1~1.EXE File created C:\Windows\SysWOW64\gei33 zqhjao.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zqhjao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebca9fa879db0393656dcab8b157f83b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ¸´¼þ1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ¸´¼þ1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zqhjao.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2388 1684 ebca9fa879db0393656dcab8b157f83b_JaffaCakes118.exe 30 PID 1684 wrote to memory of 2388 1684 ebca9fa879db0393656dcab8b157f83b_JaffaCakes118.exe 30 PID 1684 wrote to memory of 2388 1684 ebca9fa879db0393656dcab8b157f83b_JaffaCakes118.exe 30 PID 1684 wrote to memory of 2388 1684 ebca9fa879db0393656dcab8b157f83b_JaffaCakes118.exe 30 PID 2388 wrote to memory of 2092 2388 ¸´¼þ1~1.EXE 31 PID 2388 wrote to memory of 2092 2388 ¸´¼þ1~1.EXE 31 PID 2388 wrote to memory of 2092 2388 ¸´¼þ1~1.EXE 31 PID 2388 wrote to memory of 2092 2388 ¸´¼þ1~1.EXE 31 PID 2412 wrote to memory of 1716 2412 zqhjao.exe 33 PID 2412 wrote to memory of 1716 2412 zqhjao.exe 33 PID 2412 wrote to memory of 1716 2412 zqhjao.exe 33 PID 2412 wrote to memory of 1716 2412 zqhjao.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebca9fa879db0393656dcab8b157f83b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebca9fa879db0393656dcab8b157f83b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þ1~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þ1~1.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þ1~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þ1~1.EXE3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2092
-
-
-
C:\Windows\SysWOW64\zqhjao.exeC:\Windows\SysWOW64\zqhjao.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\zqhjao.exeC:\Windows\SysWOW64\zqhjao.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5fd39c8bba0d17322918342e3dd7ccfa9
SHA1eb378ed791cf20245b61c809a0daa8ad1f4a3c3a
SHA2567023a62ba94d806e2a9cff090223073a0284a260ac495554dc4e8700f91db4f7
SHA5124e579daab259228bc69f8f48ee970a09c9190bb02acd043ee2ec27e85a73613738d2f59748b64d540397fcea8afa236a64b75c68f3bc314d854993474e5d9ce3