Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
fd093c1edd9a2092e89493a0661bac0c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd093c1edd9a2092e89493a0661bac0c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fd093c1edd9a2092e89493a0661bac0c_JaffaCakes118.exe
-
Size
346KB
-
MD5
fd093c1edd9a2092e89493a0661bac0c
-
SHA1
49ab55ccd8ead7c293335ab80acd65bf0ccfdfec
-
SHA256
2c483e46aa4e15932d06bbbd39fc67e6548c864ba248e59b6d3bd2a8801e4b0a
-
SHA512
994961ae7095c1946d38fc48eeae78f91857f4ff8ff037b24be640ba2291bccde9cd6658c95776c20d0d9551512bf198b96114bddbda4a99dc33d234da6a3feb
-
SSDEEP
6144:vSncRlDRYyhtBJVszzjdgi6T7yFLro08gFVrvmnVW5GJZ2tNYLj8MfsPJe/Grdn4:K45fT3VUVFLB/FVSVzYKj86sPwMd4
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2180 PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.EXE 2832 PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.exe -
Loads dropped DLL 3 IoCs
pid Process 1968 fd093c1edd9a2092e89493a0661bac0c_JaffaCakes118.exe 1968 fd093c1edd9a2092e89493a0661bac0c_JaffaCakes118.exe 2180 PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.EXE -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2180 set thread context of 2832 2180 PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.EXE 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd093c1edd9a2092e89493a0661bac0c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.EXE -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2832 PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.exe 2832 PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2428 DllHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2180 PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2180 1968 fd093c1edd9a2092e89493a0661bac0c_JaffaCakes118.exe 31 PID 1968 wrote to memory of 2180 1968 fd093c1edd9a2092e89493a0661bac0c_JaffaCakes118.exe 31 PID 1968 wrote to memory of 2180 1968 fd093c1edd9a2092e89493a0661bac0c_JaffaCakes118.exe 31 PID 1968 wrote to memory of 2180 1968 fd093c1edd9a2092e89493a0661bac0c_JaffaCakes118.exe 31 PID 2180 wrote to memory of 2832 2180 PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.EXE 32 PID 2180 wrote to memory of 2832 2180 PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.EXE 32 PID 2180 wrote to memory of 2832 2180 PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.EXE 32 PID 2180 wrote to memory of 2832 2180 PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.EXE 32 PID 2180 wrote to memory of 2832 2180 PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.EXE 32 PID 2180 wrote to memory of 2832 2180 PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.EXE 32 PID 2180 wrote to memory of 2832 2180 PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.EXE 32 PID 2180 wrote to memory of 2832 2180 PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.EXE 32 PID 2832 wrote to memory of 1108 2832 PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.exe 20 PID 2832 wrote to memory of 1108 2832 PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.exe 20 PID 2832 wrote to memory of 1108 2832 PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.exe 20 PID 2832 wrote to memory of 1108 2832 PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\fd093c1edd9a2092e89493a0661bac0c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd093c1edd9a2092e89493a0661bac0c_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.EXE"C:\Users\Admin\AppData\Local\Temp\PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.exeC:\Users\Admin\AppData\Local\Temp\PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2832
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD56a39d6a49ac95d2f47135c9c8aa7392f
SHA183e4180ff008f05b3d2ed68614f3c081037fef82
SHA256e06281c8f0d87afcd5b5877daf5bf31935021f80df0a0f7ff5bf7d1ed9a0ba41
SHA5122429014652e4f4e39b347e647761a82a0efd4670ad940d07825fc9cec3ec401ed0589807ffc5164ded978e4d77b91d4c7caab63de1aaf9aeca89dd83c22fd73e
-
C:\Users\Admin\AppData\Local\Temp\PHOTO_BIG_TITS_2011HOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOT.EXE
Filesize287KB
MD5cd9bd7b10fcfad50aee3e8e4eb5d7c49
SHA10de771d59a0bbbe56378ff608e24f4e784e662d1
SHA25645f4b700f29796b5be51f086f1df2feb41a336a7b0f33c174c103d238e503c1e
SHA51299928cfa637b386ea31b8b3bcddbc3e665dfd75466514f3b6496aa363d7eecfbbabe660c8689ad655b906ff298a02ac8b1eec63ddf990cb50ea28625ed4f752c