Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe
-
Size
311KB
-
MD5
ff3f8d8d534839490b926ba04857a27a
-
SHA1
d9382317b6dbc1d71554dc807a6de8e8b909546d
-
SHA256
bb319959ba3c77be2a484c3ddc1204f23d3f26e4959a09ed5e63a0bb9cdc7882
-
SHA512
84dda57515832e16ffba35d8d7e1e2311d69528cc35161f41717fa963c8decb7ef3b0cae6ca8e24309a93c69fafff92fe0f68f75593a98c5b3f9622dc2ec1a87
-
SSDEEP
6144:nS/3wVyBel40pP1MHLdL1hALe+2NirdrQdZnwUKD0F:nm3myO4w1MdoLT2NKcVws
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 264 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2116 huyc.exe -
Loads dropped DLL 1 IoCs
pid Process 2396 ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D5718048-3C80-AD4F-91EC-8CC98FD5AFD4} = "C:\\Users\\Admin\\AppData\\Roaming\\Enidc\\huyc.exe" huyc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2396 set thread context of 264 2396 ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huyc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Privacy ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe 2116 huyc.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2116 2396 ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe 30 PID 2396 wrote to memory of 2116 2396 ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe 30 PID 2396 wrote to memory of 2116 2396 ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe 30 PID 2396 wrote to memory of 2116 2396 ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe 30 PID 2116 wrote to memory of 1104 2116 huyc.exe 19 PID 2116 wrote to memory of 1104 2116 huyc.exe 19 PID 2116 wrote to memory of 1104 2116 huyc.exe 19 PID 2116 wrote to memory of 1104 2116 huyc.exe 19 PID 2116 wrote to memory of 1104 2116 huyc.exe 19 PID 2116 wrote to memory of 1160 2116 huyc.exe 20 PID 2116 wrote to memory of 1160 2116 huyc.exe 20 PID 2116 wrote to memory of 1160 2116 huyc.exe 20 PID 2116 wrote to memory of 1160 2116 huyc.exe 20 PID 2116 wrote to memory of 1160 2116 huyc.exe 20 PID 2116 wrote to memory of 1192 2116 huyc.exe 21 PID 2116 wrote to memory of 1192 2116 huyc.exe 21 PID 2116 wrote to memory of 1192 2116 huyc.exe 21 PID 2116 wrote to memory of 1192 2116 huyc.exe 21 PID 2116 wrote to memory of 1192 2116 huyc.exe 21 PID 2116 wrote to memory of 1736 2116 huyc.exe 25 PID 2116 wrote to memory of 1736 2116 huyc.exe 25 PID 2116 wrote to memory of 1736 2116 huyc.exe 25 PID 2116 wrote to memory of 1736 2116 huyc.exe 25 PID 2116 wrote to memory of 1736 2116 huyc.exe 25 PID 2116 wrote to memory of 2396 2116 huyc.exe 29 PID 2116 wrote to memory of 2396 2116 huyc.exe 29 PID 2116 wrote to memory of 2396 2116 huyc.exe 29 PID 2116 wrote to memory of 2396 2116 huyc.exe 29 PID 2116 wrote to memory of 2396 2116 huyc.exe 29 PID 2396 wrote to memory of 264 2396 ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe 31 PID 2396 wrote to memory of 264 2396 ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe 31 PID 2396 wrote to memory of 264 2396 ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe 31 PID 2396 wrote to memory of 264 2396 ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe 31 PID 2396 wrote to memory of 264 2396 ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe 31 PID 2396 wrote to memory of 264 2396 ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe 31 PID 2396 wrote to memory of 264 2396 ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe 31 PID 2396 wrote to memory of 264 2396 ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe 31 PID 2396 wrote to memory of 264 2396 ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff3f8d8d534839490b926ba04857a27a_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Roaming\Enidc\huyc.exe"C:\Users\Admin\AppData\Roaming\Enidc\huyc.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2116
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpe180b465.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:264
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5ac40c65eff74b46fdb6c159104bf0188
SHA1163e8f85530725b0f169b8d6d9e1962ef51c0893
SHA2569e39999bd58f33d6c7afa4e82d7784f5bf52ecb03d406219e8e54397193eda87
SHA5129d1095c287ab295ec1d885adf0712ed55487ab140ebd06c90ff3c5682783903feb2bda18de55aefc5ad383889d966132e590599128faaaada48ca96670bbef87
-
Filesize
311KB
MD50930689f7c475ca8071b746dcf1f6047
SHA1b6c13a5f72c863fca1d1c2d8ec8dc0405ba8691f
SHA256df98eb5a5993e02e517bab3b922de945bcf802c965f757abe406033c5e00534e
SHA5123b714faca7a1b7c828ea9cf38ea9e309652ce343c778b415535a06a48afb5e6e4303d6185fe583a67a4b8886e1740bb93d0da6c5eb2c3c5d0f64bc45fb9ca490