Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 11:03
Static task
static1
Behavioral task
behavioral1
Sample
f5ddfbc690027ada4818d3e6a69aa7e3_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
f5ddfbc690027ada4818d3e6a69aa7e3_JaffaCakes118.exe
-
Size
146KB
-
MD5
f5ddfbc690027ada4818d3e6a69aa7e3
-
SHA1
ea760f631a0b20fe9daf11b33f47e2d043f57404
-
SHA256
3bf845ed70deb54e190a228e6aaf434f6bdd80d67542ebd5066b44212ce8cf2f
-
SHA512
630dadef348b160d5d7544c46867c732b710e17e8b2eb32117f52f57486be9b64b757ad198b4524d6f1aaaf610b95c046f17af61ea4ab365391393e5c6dae98b
-
SSDEEP
3072:wWm8HS0aGO6gfQtAZgB5TNgrJc3WE7I7gx:FG/QtA8IJcmwI7m
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2684 br1ddgv4bvg.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 2160 nhys1o4pgjf.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 3040 apocalyps32.exe -
resource yara_rule behavioral1/memory/2160-17-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00060000000186c6-16.dat upx behavioral1/memory/3040-35-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3040-30-0x0000000040010000-0x000000004004C000-memory.dmp upx behavioral1/memory/3040-27-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2160-25-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\apocalyps32.exe nhys1o4pgjf.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ File opened for modification C:\Windows\apocalyps32.exe nhys1o4pgjf.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ File created C:\Windows\apocalyps32.exe apocalyps32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhys1o4pgjf.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apocalyps32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2684 2636 f5ddfbc690027ada4818d3e6a69aa7e3_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2684 2636 f5ddfbc690027ada4818d3e6a69aa7e3_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2684 2636 f5ddfbc690027ada4818d3e6a69aa7e3_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2160 2684 br1ddgv4bvg.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 31 PID 2684 wrote to memory of 2160 2684 br1ddgv4bvg.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 31 PID 2684 wrote to memory of 2160 2684 br1ddgv4bvg.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 31 PID 2684 wrote to memory of 2160 2684 br1ddgv4bvg.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 31 PID 2160 wrote to memory of 3040 2160 nhys1o4pgjf.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 32 PID 2160 wrote to memory of 3040 2160 nhys1o4pgjf.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 32 PID 2160 wrote to memory of 3040 2160 nhys1o4pgjf.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 32 PID 2160 wrote to memory of 3040 2160 nhys1o4pgjf.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 32 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33 PID 3040 wrote to memory of 2532 3040 apocalyps32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5ddfbc690027ada4818d3e6a69aa7e3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5ddfbc690027ada4818d3e6a69aa7e3_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\br1ddgv4bvg.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$C:\Users\Admin\AppData\Local\Temp\br1ddgv4bvg.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\nhys1o4pgjf.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$C:\Users\Admin\AppData\Local\Temp\nhys1o4pgjf.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\apocalyps32.exe-bs4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2532
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD57aa244f62e806e0486d0b0606893dab3
SHA154c7814f1ec1a8b138dee4bdf0ccac19e36f462e
SHA256fd0f8cc3cc7b482d53d825916d47fc8a8d2d538856b105026ab735b2e26d643b
SHA512904aac24b6a8d4fa5223fe0700ca50958dc29a8a81be8783ef47674b2d1c7e0aa76cd38cb6c4dcf492cee612ee1ff026835690539353eb29b1f45a62103e6bd4
-
Filesize
106KB
MD57af4ec08a58cc1e024c0eb7c368cfbd1
SHA10691d44f5a8c9441878bc9decf65f7d22b124a40
SHA25656e54796089c9dc3d020405e4d9081b831a6aeb3360c3e1cbba4fdbee8619481
SHA51250b0956b62d3b3be124806cf4d5aea2b12375eeb2daef1857c5fb8be850ebdf776aafc6de87cbacd8b715b3e3d4a1b6e4b2a37f9602d28b729f012a1413a4d7d