Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe
-
Size
36KB
-
MD5
ebdfbea915df9687e6e745a9dd4e816a
-
SHA1
8edfbf995b581a6ec241e8b22685592da96b11f7
-
SHA256
8b5be3415040fedbbb321b730fa0f3d1f4f3344b5e4451f967c340ec623ce1bb
-
SHA512
a915b8db6a054a26d2454ce954f5dbcab8be78fad3652ba530d290f160974a5734cedb2cac0ec137c89b023ddf1047c14cfc464c4a7987b45a2ec5f70cc6624d
-
SSDEEP
768:QATJxFQM1+Bw8JrV4UYW50z4C6AXTzM7WyjiTd:QA3cBw8JrydM7W7J
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2204 BCSSync.exe 2868 BCSSync.exe -
Loads dropped DLL 3 IoCs
pid Process 2412 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 2412 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 2204 BCSSync.exe -
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2008 set thread context of 2412 2008 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 30 PID 2204 set thread context of 2868 2204 BCSSync.exe 32 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2412 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2412 2008 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 30 PID 2008 wrote to memory of 2412 2008 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 30 PID 2008 wrote to memory of 2412 2008 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 30 PID 2008 wrote to memory of 2412 2008 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 30 PID 2008 wrote to memory of 2412 2008 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 30 PID 2008 wrote to memory of 2412 2008 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 30 PID 2008 wrote to memory of 2412 2008 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 30 PID 2008 wrote to memory of 2412 2008 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 30 PID 2008 wrote to memory of 2412 2008 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 30 PID 2412 wrote to memory of 2204 2412 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 31 PID 2412 wrote to memory of 2204 2412 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 31 PID 2412 wrote to memory of 2204 2412 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 31 PID 2412 wrote to memory of 2204 2412 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 31 PID 2204 wrote to memory of 2868 2204 BCSSync.exe 32 PID 2204 wrote to memory of 2868 2204 BCSSync.exe 32 PID 2204 wrote to memory of 2868 2204 BCSSync.exe 32 PID 2204 wrote to memory of 2868 2204 BCSSync.exe 32 PID 2204 wrote to memory of 2868 2204 BCSSync.exe 32 PID 2204 wrote to memory of 2868 2204 BCSSync.exe 32 PID 2204 wrote to memory of 2868 2204 BCSSync.exe 32 PID 2204 wrote to memory of 2868 2204 BCSSync.exe 32 PID 2204 wrote to memory of 2868 2204 BCSSync.exe 32 PID 2868 wrote to memory of 3064 2868 BCSSync.exe 33 PID 2868 wrote to memory of 3064 2868 BCSSync.exe 33 PID 2868 wrote to memory of 3064 2868 BCSSync.exe 33 PID 2868 wrote to memory of 3064 2868 BCSSync.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe5⤵
- System Location Discovery: System Language Discovery
PID:3064
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD51ce0d0446e9cc5a5da09f5c122146d21
SHA1e4343f5d0374333765bf5b019cee31bba82282d3
SHA2560b669a56aa32574799df1effd254eca6031a4e4c6bb57a7c1b68099537439225
SHA5128dce49cd883cce177707167bd681d5b491e989f1fd4f8ccb9aa135867a2eadb31fceedc3a44e7b96ddad86b4ae4f1e032e951149b50c1ba12daae45eb91438d6