Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 16:04
Static task
static1
Behavioral task
behavioral1
Sample
fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe
-
Size
156KB
-
MD5
fca8193fd303f6ec04ba4124dec76006
-
SHA1
dde446cf9b7f42b06da6b6bb39bc3f8fd77de740
-
SHA256
9b08da5bb2d023a1dc162598ac12d5d155be88df5e9b694e29158ea218cb1e3f
-
SHA512
d3c25567061ee7a9efd4188b100f25c906f077c89f7f52a464526daa69604071187d48ef80e4765551577f67f16374b03f44e48ac61c66de2c89ea1ef89d1082
-
SSDEEP
3072:K2oOESvJHNpyAYzq5Zu441nAGkgv0TQDYJmKbgemPMMy4Ff7:ziSrpySwn6E0TQDYdbYPMMy4t
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2836 InfDefaultInstall.exe 3032 InfDefaultInstall.exe -
Loads dropped DLL 8 IoCs
pid Process 2800 fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe 2836 InfDefaultInstall.exe 2836 InfDefaultInstall.exe 2836 InfDefaultInstall.exe 2836 InfDefaultInstall.exe 3032 InfDefaultInstall.exe 3032 InfDefaultInstall.exe 3032 InfDefaultInstall.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InfDefaultInstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InfDefaultInstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2800 2780 fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe 31 PID 2780 wrote to memory of 2800 2780 fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe 31 PID 2780 wrote to memory of 2800 2780 fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe 31 PID 2780 wrote to memory of 2800 2780 fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe 31 PID 2800 wrote to memory of 2836 2800 fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe 32 PID 2800 wrote to memory of 2836 2800 fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe 32 PID 2800 wrote to memory of 2836 2800 fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe 32 PID 2800 wrote to memory of 2836 2800 fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe 32 PID 2800 wrote to memory of 2836 2800 fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe 32 PID 2800 wrote to memory of 2836 2800 fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe 32 PID 2800 wrote to memory of 2836 2800 fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe 32 PID 2836 wrote to memory of 3032 2836 InfDefaultInstall.exe 33 PID 2836 wrote to memory of 3032 2836 InfDefaultInstall.exe 33 PID 2836 wrote to memory of 3032 2836 InfDefaultInstall.exe 33 PID 2836 wrote to memory of 3032 2836 InfDefaultInstall.exe 33 PID 2836 wrote to memory of 3032 2836 InfDefaultInstall.exe 33 PID 2836 wrote to memory of 3032 2836 InfDefaultInstall.exe 33 PID 2836 wrote to memory of 3032 2836 InfDefaultInstall.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe" 27882⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\InfDefaultInstall.exe"C:\Users\Admin\AppData\Local\Temp\InfDefaultInstall.exe" {2157C0B0-1578-4750-A076-DC905D7F4790} 2832 "C:\Users\Admin\AppData\Local\Temp\fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\InfDefaultInstall.exe"C:\Users\Admin\AppData\Local\Temp\InfDefaultInstall.exe" {2157C0B0-1578-4750-A076-DC905D7F4790} 2832 3040 "C:\Users\Admin\AppData\Local\Temp\fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3032
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD536f51c19e33f62c57e774eab8bb6d1a2
SHA1b50893d1050c8cb7f6d889aceff3f704d8644a9b
SHA256c037176b593091afb8c0882809e77b5e8a33938cca8cba407deaff3afb2f2f95
SHA512278bf0305606cebbc81f2de55309f599075fc6ef80ab6f8a9007e80a6e6a762abb02b19e0dba2db684a997071d0fb4157de593ad59ec6ea8a70a92252a0eae5f