Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe
-
Size
158KB
-
MD5
f6a3194ea41f21648fb744b37777e9d0
-
SHA1
2764f1db27f10996cb2770e480929ddc005b4762
-
SHA256
8c9315cf78b196805257980088c01af9b172336588722e11faefd7abefd3479b
-
SHA512
91e498f3acfa5be7770465df1ded674484969946b70c828c0a2bb3c6389eb75bde4b7a8cf8be2de52a88530104404a172f70dfb4542d88f98e98f1275f330504
-
SSDEEP
3072:jmVW8iTX/3RfldjjXq1+0cxxsWEL02fXcIp08Moe2lR3aH:aM7jJlRexYTHYZMEM
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File created C:\Windows\SysWOW64\macromd\Winzip.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\kill osama bin laden game.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Flash Golf.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\hotties sucking boobs and eating snatch in large bed.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\uncle fred spanking his young nieces little ass.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\hot anal sex for the first time ever.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\nikki nova sex scene huge dick blowjob.mpg.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\virtua girl - bailey short skirt.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\head rooster pimping hot little tender ass chickens.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\gangbang tryout with young slut and two studs.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\honie playing in her cunt with newly bought toy.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\trio having hardcore fucking fun.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\winxcfg.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\AOL, MSN, Yahoo mail password stealer.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\porn account cracker.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\MSN.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\old lady in bra and corset with dildo.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\mature show older pussy and happy to do it.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Hotmail Hacker.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\3 teen blonde babes chin deep in pussy sauce.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\action with three chicks getting it on with a guy.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\siemens unlocker.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\horny ass licking lesbians.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\sluts who are in control of their slaves.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\AIM Account Hacker.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Free Porn.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\dedicated honie giving dude a helping hand and head.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\play station emulator crack.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Nokia Unloker (most models).exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\babe with dick stuck between her ass cheeks.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\two studs fucking the hell out of a slut from behind.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\brutal preteen porn xxx.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\babes with an assortment of delicious big juggs.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD589b91ef7a5c509fc9b055828c75c87e5
SHA1d9316617038a5878ebf1ebe6f2de373fc9c15e50
SHA256f317d67cb8a752546d19181fe92c138d9b8a9d664c09e598eaffd8c9356ddc62
SHA5122eaa790b0316299ff68502657acb6781b76a6a12e9b2ab20ea2e6d72e0602791c422404c9ed2028d49334b4b52b50fa557c8856d528586c1820695625c09ac4f