Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 07:31
Static task
static1
Behavioral task
behavioral1
Sample
ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
ef535403008e153353a6f169f9ed4013
-
SHA1
ae073a4139b6031778b6850535878170a7441743
-
SHA256
9112ff45e06e893cb4eca5e45e69dc6383e9908fc1025cbc616aaeabc2f00f39
-
SHA512
4fada6e6ed0f370f6d0da9a73fa7fe6a69d893d42496d990da76c9646a8a424c071302c896d58cf69ba4d611dec1c11addccbc9b953d2ff45f2125200e33c491
-
SSDEEP
49152:g5UyCgRTTSQGr4cvNB3PvgaCLrc3VhDyo:kCEavNrXR
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2292 setup.exe 2196 server.exe 3040 plc32.exe -
Loads dropped DLL 7 IoCs
pid Process 2528 ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe 2528 ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe 2528 ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe 2292 setup.exe 2292 setup.exe 2292 setup.exe 2292 setup.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\setup.exe ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe File created C:\Windows\SysWOW64\server.exe ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plc32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3040 plc32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2292 setup.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2292 2528 ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2292 2528 ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2292 2528 ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2292 2528 ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2292 2528 ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2292 2528 ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2292 2528 ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2196 2528 ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe 31 PID 2528 wrote to memory of 2196 2528 ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe 31 PID 2528 wrote to memory of 2196 2528 ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe 31 PID 2528 wrote to memory of 2196 2528 ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe 31 PID 2196 wrote to memory of 3040 2196 server.exe 32 PID 2196 wrote to memory of 3040 2196 server.exe 32 PID 2196 wrote to memory of 3040 2196 server.exe 32 PID 2196 wrote to memory of 3040 2196 server.exe 32 PID 3040 wrote to memory of 1180 3040 plc32.exe 21 PID 3040 wrote to memory of 1180 3040 plc32.exe 21 PID 3040 wrote to memory of 1180 3040 plc32.exe 21 PID 3040 wrote to memory of 1180 3040 plc32.exe 21 PID 3040 wrote to memory of 1180 3040 plc32.exe 21 PID 3040 wrote to memory of 1180 3040 plc32.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef535403008e153353a6f169f9ed4013_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\setup.exe"C:\Windows\system32\setup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2292
-
-
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\plc32.exe"C:\Users\Admin\AppData\Local\Temp\plc32.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3040
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD51463a5f9de903c9b0cdbc28920414b7f
SHA14a64da9fcdc2ef0588ec6c5d2a1e43e670b08648
SHA256dca76d020730f2dff4852dd661880819753a074c50497536b9a4b6ffe8ea00c2
SHA512ab65c14fab907d2536e9d4cc35fa88149d07304cc08dbc261fce055d953fa7d4fb8f62690a80bb9edfcc34f6ba7f540035c999a746ddce5f93ba0680159d7a21
-
Filesize
63KB
MD55b6d8bab1a985efc291db70337a71203
SHA1dd7b6d9980c6337b1f6279fefeda5658950ccb17
SHA2564b23d1d95f83b98421889bf5d8831c33dad09853000168c4308d2b03b0c6ed07
SHA512d2521d1a1179431d9b6e8095a7463952d7204b70325827a94c09196f8389a7fd3f0571c976e2be6fe12b6b1bf98ffadee1cc5b80fa7d4103c87e192da020f682
-
Filesize
103KB
MD5bcbc393197d2e314ffe083b9a5e4d76a
SHA1583c38a839682518790a6b4b4ed5f95c20f43512
SHA256f2e9d7ad823b5029a981d79453d39ae22002382167b07976cb031c301f4854f6
SHA512812dff5a77656b9e69c606ca4ef992c73f84b409210a37bd78fb1bcabb832634f1afd167b62d73f6018d6797aec2ca08de2fc32fe0eb186c06f5a1a88e28d22c
-
Filesize
88KB
MD533976355fddbceb0fbe54887ee4d1596
SHA1914c49a8a58605186d7dabeb3a67b88578c84c14
SHA25651baaf313b57462eaa38aaf69aea6e8dbbc20f3714343817266e7f35bc2235fb
SHA512be34e4042074da841cfbdbe3a379489b7a968f69a2bb372ce5925e0328d259af2fc0d29d02a787b8d4cfe70158bfc018bf7f6da35c26e670aea847efe3cb8389
-
Filesize
1.7MB
MD536dd5af0838d320007d34285fe4eab34
SHA13eb757301ff2dd29a4641078b6e1a04fe44eeeec
SHA2566ca37baac1137b5b9e63974d3065335e6aece5984c0547c9ef229ee9936087ca
SHA51221aa04af6be2a338bef83308765aec41cc125fea55a19bbb9a8e86d056e4b58196cf45644270c2f7b85348ac835f0e269c5ff485c9f7758f0f70ea0afc529e43