Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/09/2024, 05:53
Behavioral task
behavioral1
Sample
f167679c2782480fba76c01525b9dbb0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f167679c2782480fba76c01525b9dbb0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f167679c2782480fba76c01525b9dbb0_JaffaCakes118.exe
-
Size
148KB
-
MD5
f167679c2782480fba76c01525b9dbb0
-
SHA1
f106f058f862ac50d5248b5d0fc8273832f9b2d2
-
SHA256
cc3f66fdc56241dee60ec8e58ee2ca7c09f828e320a68ddf9426d8a3d8f77986
-
SHA512
fddd9ee3773169e56f21c56dacaf3310b5e8d2e364f312e1a9b242fe3c208c6e312143b59b3094afbced621c03d8016610dc3471c311c70e7630368737378c47
-
SSDEEP
3072:JYAq+Bt0h0phE8M4qTvpmwEBn3Obl4kUGE84NXafk:JYtipO4qTvwwm0KD/ek
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
resource yara_rule behavioral1/files/0x000a00000001227e-3.dat aspack_v212_v242 -
Executes dropped EXE 10 IoCs
pid Process 2664 tsqla.exe 2528 tsqla.exe 880 tsqla.exe 2076 tsqla.exe 1852 tsqla.exe 2880 tsqla.exe 1192 tsqla.exe 2708 tsqla.exe 2424 tsqla.exe 2200 tsqla.exe -
Loads dropped DLL 20 IoCs
pid Process 2764 f167679c2782480fba76c01525b9dbb0_JaffaCakes118.exe 2764 f167679c2782480fba76c01525b9dbb0_JaffaCakes118.exe 2664 tsqla.exe 2664 tsqla.exe 2528 tsqla.exe 2528 tsqla.exe 880 tsqla.exe 880 tsqla.exe 2076 tsqla.exe 2076 tsqla.exe 1852 tsqla.exe 1852 tsqla.exe 2880 tsqla.exe 2880 tsqla.exe 1192 tsqla.exe 1192 tsqla.exe 2708 tsqla.exe 2708 tsqla.exe 2424 tsqla.exe 2424 tsqla.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\tsqla.exe tsqla.exe File created C:\Windows\SysWOW64\tsqla.exe tsqla.exe File opened for modification C:\Windows\SysWOW64\tsqla.exe tsqla.exe File opened for modification C:\Windows\SysWOW64\tsqla.exe tsqla.exe File opened for modification C:\Windows\SysWOW64\tsqla.exe tsqla.exe File created C:\Windows\SysWOW64\tsqla.exe f167679c2782480fba76c01525b9dbb0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\tsqla.exe f167679c2782480fba76c01525b9dbb0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\tsqla.exe tsqla.exe File created C:\Windows\SysWOW64\tsqla.exe tsqla.exe File created C:\Windows\SysWOW64\tsqla.exe tsqla.exe File opened for modification C:\Windows\SysWOW64\tsqla.exe tsqla.exe File created C:\Windows\SysWOW64\tsqla.exe tsqla.exe File opened for modification C:\Windows\SysWOW64\tsqla.exe tsqla.exe File created C:\Windows\SysWOW64\tsqla.exe tsqla.exe File created C:\Windows\SysWOW64\tsqla.exe tsqla.exe File opened for modification C:\Windows\SysWOW64\tsqla.exe tsqla.exe File opened for modification C:\Windows\SysWOW64\tsqla.exe tsqla.exe File created C:\Windows\SysWOW64\tsqla.exe tsqla.exe File opened for modification C:\Windows\SysWOW64\tsqla.exe tsqla.exe File created C:\Windows\SysWOW64\tsqla.exe tsqla.exe File opened for modification C:\Windows\SysWOW64\tsqla.exe tsqla.exe File created C:\Windows\SysWOW64\tsqla.exe tsqla.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsqla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsqla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsqla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsqla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsqla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f167679c2782480fba76c01525b9dbb0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsqla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsqla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsqla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsqla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsqla.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2664 2764 f167679c2782480fba76c01525b9dbb0_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2664 2764 f167679c2782480fba76c01525b9dbb0_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2664 2764 f167679c2782480fba76c01525b9dbb0_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2664 2764 f167679c2782480fba76c01525b9dbb0_JaffaCakes118.exe 30 PID 2664 wrote to memory of 2528 2664 tsqla.exe 31 PID 2664 wrote to memory of 2528 2664 tsqla.exe 31 PID 2664 wrote to memory of 2528 2664 tsqla.exe 31 PID 2664 wrote to memory of 2528 2664 tsqla.exe 31 PID 2528 wrote to memory of 880 2528 tsqla.exe 33 PID 2528 wrote to memory of 880 2528 tsqla.exe 33 PID 2528 wrote to memory of 880 2528 tsqla.exe 33 PID 2528 wrote to memory of 880 2528 tsqla.exe 33 PID 880 wrote to memory of 2076 880 tsqla.exe 34 PID 880 wrote to memory of 2076 880 tsqla.exe 34 PID 880 wrote to memory of 2076 880 tsqla.exe 34 PID 880 wrote to memory of 2076 880 tsqla.exe 34 PID 2076 wrote to memory of 1852 2076 tsqla.exe 35 PID 2076 wrote to memory of 1852 2076 tsqla.exe 35 PID 2076 wrote to memory of 1852 2076 tsqla.exe 35 PID 2076 wrote to memory of 1852 2076 tsqla.exe 35 PID 1852 wrote to memory of 2880 1852 tsqla.exe 36 PID 1852 wrote to memory of 2880 1852 tsqla.exe 36 PID 1852 wrote to memory of 2880 1852 tsqla.exe 36 PID 1852 wrote to memory of 2880 1852 tsqla.exe 36 PID 2880 wrote to memory of 1192 2880 tsqla.exe 37 PID 2880 wrote to memory of 1192 2880 tsqla.exe 37 PID 2880 wrote to memory of 1192 2880 tsqla.exe 37 PID 2880 wrote to memory of 1192 2880 tsqla.exe 37 PID 1192 wrote to memory of 2708 1192 tsqla.exe 38 PID 1192 wrote to memory of 2708 1192 tsqla.exe 38 PID 1192 wrote to memory of 2708 1192 tsqla.exe 38 PID 1192 wrote to memory of 2708 1192 tsqla.exe 38 PID 2708 wrote to memory of 2424 2708 tsqla.exe 39 PID 2708 wrote to memory of 2424 2708 tsqla.exe 39 PID 2708 wrote to memory of 2424 2708 tsqla.exe 39 PID 2708 wrote to memory of 2424 2708 tsqla.exe 39 PID 2424 wrote to memory of 2200 2424 tsqla.exe 40 PID 2424 wrote to memory of 2200 2424 tsqla.exe 40 PID 2424 wrote to memory of 2200 2424 tsqla.exe 40 PID 2424 wrote to memory of 2200 2424 tsqla.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\f167679c2782480fba76c01525b9dbb0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f167679c2782480fba76c01525b9dbb0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\tsqla.exeC:\Windows\system32\tsqla.exe 476 "C:\Users\Admin\AppData\Local\Temp\f167679c2782480fba76c01525b9dbb0_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\tsqla.exeC:\Windows\system32\tsqla.exe 528 "C:\Windows\SysWOW64\tsqla.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\tsqla.exeC:\Windows\system32\tsqla.exe 532 "C:\Windows\SysWOW64\tsqla.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\tsqla.exeC:\Windows\system32\tsqla.exe 536 "C:\Windows\SysWOW64\tsqla.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\tsqla.exeC:\Windows\system32\tsqla.exe 540 "C:\Windows\SysWOW64\tsqla.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\tsqla.exeC:\Windows\system32\tsqla.exe 544 "C:\Windows\SysWOW64\tsqla.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\tsqla.exeC:\Windows\system32\tsqla.exe 548 "C:\Windows\SysWOW64\tsqla.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\tsqla.exeC:\Windows\system32\tsqla.exe 552 "C:\Windows\SysWOW64\tsqla.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\tsqla.exeC:\Windows\system32\tsqla.exe 556 "C:\Windows\SysWOW64\tsqla.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\tsqla.exeC:\Windows\system32\tsqla.exe 564 "C:\Windows\SysWOW64\tsqla.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2200
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5f167679c2782480fba76c01525b9dbb0
SHA1f106f058f862ac50d5248b5d0fc8273832f9b2d2
SHA256cc3f66fdc56241dee60ec8e58ee2ca7c09f828e320a68ddf9426d8a3d8f77986
SHA512fddd9ee3773169e56f21c56dacaf3310b5e8d2e364f312e1a9b242fe3c208c6e312143b59b3094afbced621c03d8016610dc3471c311c70e7630368737378c47