Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 21:22
Static task
static1
Behavioral task
behavioral1
Sample
ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe
-
Size
333KB
-
MD5
ff5a6d75428b42b94881b656d65aa6a4
-
SHA1
199b66001dbb8c7778811bb2d65e3efbb8b55f92
-
SHA256
59b21806ebe9545bf79f1d066a923bfde0e47b606125b855f1d5a0618d13c634
-
SHA512
fe44ad0d2a9b928b9761a5f3d6e06733b241145355dea2a98fa8758342fd698e2252de0b2b0c92e293922fce0a5039117caa8812db7993ff8d094c3a877627a0
-
SSDEEP
6144:oIWf3OhjikGhVZI7iJJ3y3KC1BGctYLBRNQPW3:oIWf+hji1VZIOJJ3khBGJL+PU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1672 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2772 ahigsi.exe 2796 ahigsi.exe -
Loads dropped DLL 2 IoCs
pid Process 3040 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 3040 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D828F808-3C80-AD4F-7E84-E44A5F96C757} = "C:\\Users\\Admin\\AppData\\Roaming\\Ygucz\\ahigsi.exe" ahigsi.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1560 set thread context of 3040 1560 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 31 PID 2772 set thread context of 2796 2772 ahigsi.exe 33 PID 3040 set thread context of 1672 3040 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ahigsi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Privacy ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\40232427-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe 2796 ahigsi.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 984 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 984 WinMail.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1560 wrote to memory of 3040 1560 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 31 PID 1560 wrote to memory of 3040 1560 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 31 PID 1560 wrote to memory of 3040 1560 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 31 PID 1560 wrote to memory of 3040 1560 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 31 PID 1560 wrote to memory of 3040 1560 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 31 PID 1560 wrote to memory of 3040 1560 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 31 PID 1560 wrote to memory of 3040 1560 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 31 PID 1560 wrote to memory of 3040 1560 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 31 PID 1560 wrote to memory of 3040 1560 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 31 PID 3040 wrote to memory of 2772 3040 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 32 PID 3040 wrote to memory of 2772 3040 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 32 PID 3040 wrote to memory of 2772 3040 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 32 PID 3040 wrote to memory of 2772 3040 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 32 PID 2772 wrote to memory of 2796 2772 ahigsi.exe 33 PID 2772 wrote to memory of 2796 2772 ahigsi.exe 33 PID 2772 wrote to memory of 2796 2772 ahigsi.exe 33 PID 2772 wrote to memory of 2796 2772 ahigsi.exe 33 PID 2772 wrote to memory of 2796 2772 ahigsi.exe 33 PID 2772 wrote to memory of 2796 2772 ahigsi.exe 33 PID 2772 wrote to memory of 2796 2772 ahigsi.exe 33 PID 2772 wrote to memory of 2796 2772 ahigsi.exe 33 PID 2772 wrote to memory of 2796 2772 ahigsi.exe 33 PID 2796 wrote to memory of 1112 2796 ahigsi.exe 19 PID 2796 wrote to memory of 1112 2796 ahigsi.exe 19 PID 2796 wrote to memory of 1112 2796 ahigsi.exe 19 PID 2796 wrote to memory of 1112 2796 ahigsi.exe 19 PID 2796 wrote to memory of 1112 2796 ahigsi.exe 19 PID 2796 wrote to memory of 1164 2796 ahigsi.exe 20 PID 2796 wrote to memory of 1164 2796 ahigsi.exe 20 PID 2796 wrote to memory of 1164 2796 ahigsi.exe 20 PID 2796 wrote to memory of 1164 2796 ahigsi.exe 20 PID 2796 wrote to memory of 1164 2796 ahigsi.exe 20 PID 2796 wrote to memory of 1232 2796 ahigsi.exe 21 PID 2796 wrote to memory of 1232 2796 ahigsi.exe 21 PID 2796 wrote to memory of 1232 2796 ahigsi.exe 21 PID 2796 wrote to memory of 1232 2796 ahigsi.exe 21 PID 2796 wrote to memory of 1232 2796 ahigsi.exe 21 PID 2796 wrote to memory of 316 2796 ahigsi.exe 23 PID 2796 wrote to memory of 316 2796 ahigsi.exe 23 PID 2796 wrote to memory of 316 2796 ahigsi.exe 23 PID 2796 wrote to memory of 316 2796 ahigsi.exe 23 PID 2796 wrote to memory of 316 2796 ahigsi.exe 23 PID 2796 wrote to memory of 3040 2796 ahigsi.exe 31 PID 2796 wrote to memory of 3040 2796 ahigsi.exe 31 PID 2796 wrote to memory of 3040 2796 ahigsi.exe 31 PID 2796 wrote to memory of 3040 2796 ahigsi.exe 31 PID 2796 wrote to memory of 3040 2796 ahigsi.exe 31 PID 2796 wrote to memory of 2772 2796 ahigsi.exe 32 PID 2796 wrote to memory of 2772 2796 ahigsi.exe 32 PID 2796 wrote to memory of 2772 2796 ahigsi.exe 32 PID 2796 wrote to memory of 2772 2796 ahigsi.exe 32 PID 2796 wrote to memory of 2772 2796 ahigsi.exe 32 PID 3040 wrote to memory of 1672 3040 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 34 PID 3040 wrote to memory of 1672 3040 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 34 PID 3040 wrote to memory of 1672 3040 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 34 PID 3040 wrote to memory of 1672 3040 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 34 PID 3040 wrote to memory of 1672 3040 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 34 PID 3040 wrote to memory of 1672 3040 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 34 PID 3040 wrote to memory of 1672 3040 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 34 PID 3040 wrote to memory of 1672 3040 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 34 PID 3040 wrote to memory of 1672 3040 ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe 34 PID 2796 wrote to memory of 988 2796 ahigsi.exe 35 PID 2796 wrote to memory of 988 2796 ahigsi.exe 35 PID 2796 wrote to memory of 988 2796 ahigsi.exe 35
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff5a6d75428b42b94881b656d65aa6a4_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Roaming\Ygucz\ahigsi.exe"C:\Users\Admin\AppData\Roaming\Ygucz\ahigsi.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Roaming\Ygucz\ahigsi.exe"C:\Users\Admin\AppData\Roaming\Ygucz\ahigsi.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2796
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8a3c8caa.bat"4⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1672
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:316
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "805056438-931571054323406462-1406548189-18234271452140664899-358010234-1949696575"1⤵PID:988
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD527f30873ea8e9f211e93ab8943509c58
SHA19c7748e651b5794f52efe27f68e8ad16062ca81d
SHA256eff04e94fc10a8b85c622bc5a4077804ff6b9c13e6ef134c9bb2413312abe228
SHA5129f018ab9b38f76a0767eeb80fb7ae421398958322efbec6ec17df2e8f47c297a4f7734d5eac5c546a644500a1c316404371e40b83f19e33603f909c3dc3aba3a
-
Filesize
271B
MD59506022554d7c15bac89e4a08ca057b4
SHA15caee2e060c8ca05475d6deb05010b78e02092bc
SHA2567e959fe6fbcbb65ddfc4640a89a8b29d72cdec97d3d9d0fb8b228463e826fcb0
SHA512e95537c29ba211041acd8f1c8600934d3d4386120cad70fb5532d75ec6c26e32453e4c983448fa977cc0c2b820c828633cca91d25cda262eec48d3f29b6d10b9
-
Filesize
333KB
MD5d70c9931aa5f2d687d8166af8ff81bb2
SHA1bd4f8dbe00a84d01b1c060014b914f7fa71f7ff8
SHA2561d45934f9863f80287d556d7acd07405c58803e56989f9a91e2895e7f00abe19
SHA512b8e50fbb48afe36a56bd3f939517d1248e675285d86e4558f272cdadb8451e1647ad88b305ffc04a501e828222ae5f3b706c5502c80429acd83ca83ff60071fb