Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 03:28
Static task
static1
Behavioral task
behavioral1
Sample
f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe
-
Size
98KB
-
MD5
f9a00dc4a9637fa216630f4d5e2c8b37
-
SHA1
58c2ea15ecab7eb1674fb3a29f0b72b222da826b
-
SHA256
120c24760fff974d67ae75bfbc2dba7cf583170cdf2a8c31adf9691cc77a0ef5
-
SHA512
15edf799761216a564d4872811a02dc3c269a2dc7a66f5fe399624e1524df16323c66434527a2f39be4784c85143dc57632f94e87afe640862eaef3186edb33a
-
SSDEEP
1536:9AuxfK6DOHpn2+3wc+TBsYu1fOc7kOi1mkCzzT/sX083Mkd3cklj:9AeAJ2+3YvyfOAsmkC3T/K5MEP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3064 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2484 yxits.exe -
Loads dropped DLL 2 IoCs
pid Process 2488 f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe 2488 f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\{4C8E1277-1FDE-9232-CA58-A489058D1F43} = "C:\\Users\\Admin\\AppData\\Roaming\\Dekyl\\yxits.exe" yxits.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2488 set thread context of 3064 2488 f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yxits.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Privacy f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe 2484 yxits.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2488 f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe Token: SeSecurityPrivilege 2488 f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe Token: SeSecurityPrivilege 2488 f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2484 2488 f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2484 2488 f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2484 2488 f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2484 2488 f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe 31 PID 2484 wrote to memory of 1204 2484 yxits.exe 19 PID 2484 wrote to memory of 1204 2484 yxits.exe 19 PID 2484 wrote to memory of 1204 2484 yxits.exe 19 PID 2484 wrote to memory of 1204 2484 yxits.exe 19 PID 2484 wrote to memory of 1204 2484 yxits.exe 19 PID 2484 wrote to memory of 1308 2484 yxits.exe 20 PID 2484 wrote to memory of 1308 2484 yxits.exe 20 PID 2484 wrote to memory of 1308 2484 yxits.exe 20 PID 2484 wrote to memory of 1308 2484 yxits.exe 20 PID 2484 wrote to memory of 1308 2484 yxits.exe 20 PID 2484 wrote to memory of 1368 2484 yxits.exe 21 PID 2484 wrote to memory of 1368 2484 yxits.exe 21 PID 2484 wrote to memory of 1368 2484 yxits.exe 21 PID 2484 wrote to memory of 1368 2484 yxits.exe 21 PID 2484 wrote to memory of 1368 2484 yxits.exe 21 PID 2484 wrote to memory of 1448 2484 yxits.exe 25 PID 2484 wrote to memory of 1448 2484 yxits.exe 25 PID 2484 wrote to memory of 1448 2484 yxits.exe 25 PID 2484 wrote to memory of 1448 2484 yxits.exe 25 PID 2484 wrote to memory of 1448 2484 yxits.exe 25 PID 2484 wrote to memory of 2488 2484 yxits.exe 29 PID 2484 wrote to memory of 2488 2484 yxits.exe 29 PID 2484 wrote to memory of 2488 2484 yxits.exe 29 PID 2484 wrote to memory of 2488 2484 yxits.exe 29 PID 2484 wrote to memory of 2488 2484 yxits.exe 29 PID 2488 wrote to memory of 3064 2488 f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe 32 PID 2488 wrote to memory of 3064 2488 f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe 32 PID 2488 wrote to memory of 3064 2488 f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe 32 PID 2488 wrote to memory of 3064 2488 f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe 32 PID 2488 wrote to memory of 3064 2488 f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe 32 PID 2488 wrote to memory of 3064 2488 f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe 32 PID 2488 wrote to memory of 3064 2488 f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe 32 PID 2488 wrote to memory of 3064 2488 f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe 32 PID 2488 wrote to memory of 3064 2488 f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe 32 PID 2484 wrote to memory of 1132 2484 yxits.exe 34 PID 2484 wrote to memory of 1132 2484 yxits.exe 34 PID 2484 wrote to memory of 1132 2484 yxits.exe 34 PID 2484 wrote to memory of 1132 2484 yxits.exe 34 PID 2484 wrote to memory of 1132 2484 yxits.exe 34 PID 2484 wrote to memory of 2136 2484 yxits.exe 35 PID 2484 wrote to memory of 2136 2484 yxits.exe 35 PID 2484 wrote to memory of 2136 2484 yxits.exe 35 PID 2484 wrote to memory of 2136 2484 yxits.exe 35 PID 2484 wrote to memory of 2136 2484 yxits.exe 35
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1204
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1308
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f9a00dc4a9637fa216630f4d5e2c8b37_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Roaming\Dekyl\yxits.exe"C:\Users\Admin\AppData\Roaming\Dekyl\yxits.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2484
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpd2492cd7.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3064
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1448
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1132
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5e205711651cf59a59f3524f3be0966ed
SHA11dc8b3d67b6ca9aab9aca6d280cd75c8038e4f71
SHA2563f3a44c2840eb9d666761357e49f1cf00c298815cc9828291a8f936e518a27d8
SHA512155cbb027d70f8822c53a1b2c1f6983044216313c27b475eda33e13956e0e90c78749df32d3824c208323c93660e5a3ddf9d98fa02c8ecc8331448c84a0066fc
-
Filesize
98KB
MD5fa6759bddaaaf4702be396e38960407f
SHA1ea9d3f7f805e2e6c36abe0d061b93ad6e383d927
SHA256857e23f1818a6719b356b6359bcff7f9dec4bb857f39803d7779fdbb1266a853
SHA512ba5010c2a0f691615baf6ddf3dee8a42de8b224787be67f246633198057e818eff10a40db2a0b2ae2aa2f6e13592bebd33e67c34438b58226d03153d84515254
-
Filesize
380B
MD546c019003fe424fab8f51a0b29e9f4ec
SHA1b73b3b1785c9b58dc487a4cb886479f352c0c18d
SHA2569a2d80b48f4b4d9088297635e8528c2367a294e9933d268f54e0f36d6ce6d54f
SHA51286a99b6695a97d89064436690e83c1806c6bafd0934a47280a9105901aeb1d9e7e9c8781ae482c2f3b79921deb7ca83deb3df44064f501da19171f7d98596416