Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 15:34
Static task
static1
Behavioral task
behavioral1
Sample
fc9adc5dd78f3fc2c765f6e15f4673fb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc9adc5dd78f3fc2c765f6e15f4673fb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fc9adc5dd78f3fc2c765f6e15f4673fb_JaffaCakes118.exe
-
Size
9.6MB
-
MD5
fc9adc5dd78f3fc2c765f6e15f4673fb
-
SHA1
fe7ae914050728579bc73d1ea58b69a8d8350266
-
SHA256
a892ad6cc1f1647cd12ba3ac351eb26749293b6e17ae9d3424a5f0ce0055192b
-
SHA512
959790091c1955ef925c417e4a94099618568d1b9ad51d932ff370b56b6f000bb3e4d7d288e89d95f0701cdbdd0b4bf2d779329e57954cc51bf3398fdc93872b
-
SSDEEP
6144:4O90tdil86Yo4JCkUniPPWp0LoccQJyukM+oKapP0E:4HQ86OPUiGpM+0tkCKaPX
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\svflooje.exe fc9adc5dd78f3fc2c765f6e15f4673fb_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1680 svflooje.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\keys.ini fc9adc5dd78f3fc2c765f6e15f4673fb_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2404 1680 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc9adc5dd78f3fc2c765f6e15f4673fb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svflooje.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2404 1680 svflooje.exe 31 PID 1680 wrote to memory of 2404 1680 svflooje.exe 31 PID 1680 wrote to memory of 2404 1680 svflooje.exe 31 PID 1680 wrote to memory of 2404 1680 svflooje.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc9adc5dd78f3fc2c765f6e15f4673fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc9adc5dd78f3fc2c765f6e15f4673fb_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1848
-
C:\Windows\SysWOW64\drivers\svflooje.exeC:\Windows\SysWOW64\drivers\svflooje.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 2042⤵
- Program crash
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.6MB
MD5fc9adc5dd78f3fc2c765f6e15f4673fb
SHA1fe7ae914050728579bc73d1ea58b69a8d8350266
SHA256a892ad6cc1f1647cd12ba3ac351eb26749293b6e17ae9d3424a5f0ce0055192b
SHA512959790091c1955ef925c417e4a94099618568d1b9ad51d932ff370b56b6f000bb3e4d7d288e89d95f0701cdbdd0b4bf2d779329e57954cc51bf3398fdc93872b