Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 17:42
Static task
static1
Behavioral task
behavioral1
Sample
ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe
-
Size
480KB
-
MD5
ff0b538ee28b3affca6fcfa519667c4f
-
SHA1
12a9a4c1aea54c63b5da0b12d3f3a44349c8cb8e
-
SHA256
43d2e6d378e6e66b5510d5f2af2dbe8ed9afc04ff233bf29841054aeb0884033
-
SHA512
284e80bf146cc51b6d6663df145b590f33329a4aa1f13fee5079116d7d55749f8ff1bcafb341f5fea92e66f9b60183526af8bdf9024551ad0310e9d72d8f879e
-
SSDEEP
12288:pFswRYF6XYfSUcLX6kvOw5zVAPjJ1dAw7Nahd4MIUB:p5RYFQESUARqV1dAjnIQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 900 update.exe -
Loads dropped DLL 4 IoCs
pid Process 1964 ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe 900 update.exe 900 update.exe 900 update.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\b: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\n: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\p: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\t: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\i: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\j: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\y: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\z: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\e: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\g: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\o: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\s: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\x: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\r: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\u: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\v: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\h: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\k: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\l: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\m: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\q: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe File opened (read-only) \??\w: ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\KB822603.log update.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language update.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeRestorePrivilege 900 update.exe Token: SeRestorePrivilege 900 update.exe Token: SeRestorePrivilege 900 update.exe Token: SeRestorePrivilege 900 update.exe Token: SeRestorePrivilege 900 update.exe Token: SeRestorePrivilege 900 update.exe Token: SeRestorePrivilege 900 update.exe Token: SeBackupPrivilege 900 update.exe Token: SeRestorePrivilege 900 update.exe Token: SeShutdownPrivilege 900 update.exe Token: SeSecurityPrivilege 900 update.exe Token: SeTakeOwnershipPrivilege 900 update.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1964 wrote to memory of 900 1964 ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe 30 PID 1964 wrote to memory of 900 1964 ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe 30 PID 1964 wrote to memory of 900 1964 ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe 30 PID 1964 wrote to memory of 900 1964 ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe 30 PID 1964 wrote to memory of 900 1964 ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe 30 PID 1964 wrote to memory of 900 1964 ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe 30 PID 1964 wrote to memory of 900 1964 ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff0b538ee28b3affca6fcfa519667c4f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
\??\c:\90cc34642507609a9c\update\update.exec:\90cc34642507609a9c\update\update.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
401KB
MD5bb6bcd7f5502c9d9ad8a502aa1ad676a
SHA1b6c0f356272fb45b818c83b3f4790645241d3c28
SHA256e57bee1a287c4b619cdc11dae8f38f7318df6d99d50479730d6cacd9cc83e52d
SHA5124dfd115a00c235931dbb18d585d6e4a41bbcd5eb62001e16e01f12bf9af66da8fb0a10a8f2ecc0d93d46c7719e3a8d1282ef9b51c05df0c498d1959b39b6439a
-
Filesize
4KB
MD5baeba8e52c1aa51bacd70862ea549160
SHA1dcbb179dc336c5010a9ef8a6bbaf025c86c23281
SHA25679f0d4a307419d1afe3b2e96857e89b25a5f31d635fb3f36032aef283d743033
SHA512c0cbb814e35a90b91e6e30bae2b77c854e08cbc18f74570fba604bfbc029d287e516e2dc1b6363efef9089e9af0a8398d4ba125191a841da095c7c8deee7abef