Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 10:41
Behavioral task
behavioral1
Sample
fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe
-
Size
118KB
-
MD5
fc1f83cc71b05b246c6866138e9e19ec
-
SHA1
6c43d2ce3201d52359a6f584c17761c32e807430
-
SHA256
6a12a3379a5dd7ecd513993e7fb3d2c4d8ff64f4e879c9dc84e86866b7362238
-
SHA512
a6b9bfd42d635a7481688592c336c6d30f8e7913b84c09799e09e819ef54a6ecca57c4be12041a1ed0a4a53ad4db703980a289ca15ebe4eb2309272fe322ef96
-
SSDEEP
3072:+4dMdZPdsKUEJ4Zlta/KiG8laQZwN4hDW/pout:+iuZPsA4ZH+KikQa4hDWhoS
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 1864 vhost.exe 2120 vhost.exe 2908 vhost.exe 2532 vhost.exe 2564 vhost.exe 1648 vhost.exe 1612 vhost.exe 2028 vhost.exe 3024 vhost.exe 1944 vhost.exe -
Loads dropped DLL 20 IoCs
pid Process 2404 fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe 2404 fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe 1864 vhost.exe 1864 vhost.exe 2120 vhost.exe 2120 vhost.exe 2908 vhost.exe 2908 vhost.exe 2532 vhost.exe 2532 vhost.exe 2564 vhost.exe 2564 vhost.exe 1648 vhost.exe 1648 vhost.exe 1612 vhost.exe 1612 vhost.exe 2028 vhost.exe 2028 vhost.exe 3024 vhost.exe 3024 vhost.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\vhost.exe vhost.exe File created C:\Windows\SysWOW64\vhost.exe vhost.exe File opened for modification C:\Windows\SysWOW64\vhost.exe vhost.exe File created C:\Windows\SysWOW64\vhost.exe vhost.exe File opened for modification C:\Windows\SysWOW64\vhost.exe vhost.exe File opened for modification C:\Windows\SysWOW64\vhost.exe vhost.exe File opened for modification C:\Windows\SysWOW64\vhost.exe vhost.exe File created C:\Windows\SysWOW64\vhost.exe vhost.exe File opened for modification C:\Windows\SysWOW64\vhost.exe vhost.exe File created C:\Windows\SysWOW64\vhost.exe vhost.exe File opened for modification C:\Windows\SysWOW64\vhost.exe vhost.exe File opened for modification C:\Windows\SysWOW64\vhost.exe vhost.exe File created C:\Windows\SysWOW64\vhost.exe vhost.exe File created C:\Windows\SysWOW64\vhost.exe fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vhost.exe vhost.exe File created C:\Windows\SysWOW64\vhost.exe vhost.exe File created C:\Windows\SysWOW64\vhost.exe vhost.exe File opened for modification C:\Windows\SysWOW64\vhost.exe fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe File created C:\Windows\SysWOW64\vhost.exe vhost.exe File created C:\Windows\SysWOW64\vhost.exe vhost.exe File opened for modification C:\Windows\SysWOW64\vhost.exe vhost.exe File created C:\Windows\SysWOW64\vhost.exe vhost.exe -
resource yara_rule behavioral1/memory/2404-0-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/files/0x00090000000120d6-4.dat upx behavioral1/memory/1864-12-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/2404-15-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/1864-16-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/1864-19-0x00000000024F0000-0x000000000259A000-memory.dmp upx behavioral1/memory/2120-23-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/2908-28-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/2532-32-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/2532-34-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/2564-40-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/1648-45-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/1612-50-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/2028-55-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/3024-59-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/3024-61-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/1944-66-0x0000000000400000-0x00000000004AA000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhost.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1864 2404 fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe 28 PID 2404 wrote to memory of 1864 2404 fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe 28 PID 2404 wrote to memory of 1864 2404 fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe 28 PID 2404 wrote to memory of 1864 2404 fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe 28 PID 1864 wrote to memory of 2120 1864 vhost.exe 31 PID 1864 wrote to memory of 2120 1864 vhost.exe 31 PID 1864 wrote to memory of 2120 1864 vhost.exe 31 PID 1864 wrote to memory of 2120 1864 vhost.exe 31 PID 2120 wrote to memory of 2908 2120 vhost.exe 32 PID 2120 wrote to memory of 2908 2120 vhost.exe 32 PID 2120 wrote to memory of 2908 2120 vhost.exe 32 PID 2120 wrote to memory of 2908 2120 vhost.exe 32 PID 2908 wrote to memory of 2532 2908 vhost.exe 33 PID 2908 wrote to memory of 2532 2908 vhost.exe 33 PID 2908 wrote to memory of 2532 2908 vhost.exe 33 PID 2908 wrote to memory of 2532 2908 vhost.exe 33 PID 2532 wrote to memory of 2564 2532 vhost.exe 34 PID 2532 wrote to memory of 2564 2532 vhost.exe 34 PID 2532 wrote to memory of 2564 2532 vhost.exe 34 PID 2532 wrote to memory of 2564 2532 vhost.exe 34 PID 2564 wrote to memory of 1648 2564 vhost.exe 35 PID 2564 wrote to memory of 1648 2564 vhost.exe 35 PID 2564 wrote to memory of 1648 2564 vhost.exe 35 PID 2564 wrote to memory of 1648 2564 vhost.exe 35 PID 1648 wrote to memory of 1612 1648 vhost.exe 36 PID 1648 wrote to memory of 1612 1648 vhost.exe 36 PID 1648 wrote to memory of 1612 1648 vhost.exe 36 PID 1648 wrote to memory of 1612 1648 vhost.exe 36 PID 1612 wrote to memory of 2028 1612 vhost.exe 37 PID 1612 wrote to memory of 2028 1612 vhost.exe 37 PID 1612 wrote to memory of 2028 1612 vhost.exe 37 PID 1612 wrote to memory of 2028 1612 vhost.exe 37 PID 2028 wrote to memory of 3024 2028 vhost.exe 38 PID 2028 wrote to memory of 3024 2028 vhost.exe 38 PID 2028 wrote to memory of 3024 2028 vhost.exe 38 PID 2028 wrote to memory of 3024 2028 vhost.exe 38 PID 3024 wrote to memory of 1944 3024 vhost.exe 39 PID 3024 wrote to memory of 1944 3024 vhost.exe 39 PID 3024 wrote to memory of 1944 3024 vhost.exe 39 PID 3024 wrote to memory of 1944 3024 vhost.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\vhost.exeC:\Windows\system32\vhost.exe 476 "C:\Users\Admin\AppData\Local\Temp\fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\vhost.exeC:\Windows\system32\vhost.exe 528 "C:\Windows\SysWOW64\vhost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\vhost.exeC:\Windows\system32\vhost.exe 532 "C:\Windows\SysWOW64\vhost.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\vhost.exeC:\Windows\system32\vhost.exe 536 "C:\Windows\SysWOW64\vhost.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\vhost.exeC:\Windows\system32\vhost.exe 540 "C:\Windows\SysWOW64\vhost.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\vhost.exeC:\Windows\system32\vhost.exe 552 "C:\Windows\SysWOW64\vhost.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\vhost.exeC:\Windows\system32\vhost.exe 544 "C:\Windows\SysWOW64\vhost.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\vhost.exeC:\Windows\system32\vhost.exe 548 "C:\Windows\SysWOW64\vhost.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\vhost.exeC:\Windows\system32\vhost.exe 560 "C:\Windows\SysWOW64\vhost.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\vhost.exeC:\Windows\system32\vhost.exe 568 "C:\Windows\SysWOW64\vhost.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1944
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118KB
MD5fc1f83cc71b05b246c6866138e9e19ec
SHA16c43d2ce3201d52359a6f584c17761c32e807430
SHA2566a12a3379a5dd7ecd513993e7fb3d2c4d8ff64f4e879c9dc84e86866b7362238
SHA512a6b9bfd42d635a7481688592c336c6d30f8e7913b84c09799e09e819ef54a6ecca57c4be12041a1ed0a4a53ad4db703980a289ca15ebe4eb2309272fe322ef96