Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 07:31
Static task
static1
Behavioral task
behavioral1
Sample
002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe
-
Size
2.5MB
-
MD5
002c617a8f6ace3962a53d82cc3ad25c
-
SHA1
ff80895517418679be99a1efd6883897fec85f4b
-
SHA256
62ce8dd8e2efdecdad6ec5e83ec9db1361ee0362bf5f2609ba6f575fb9942115
-
SHA512
6af3df336b068b0221a178d5e57a3aff56f5a886bc6425f4d81b84b8faed34325ef1a8bf504bb98e4dc316737a2b73e81529975f9ca7ef7a6a2420e8227a0d12
-
SSDEEP
49152:HVyWZ81TOVstRbMsRTzRUQX8W6ZBEG6Pyt:gWKNRbMsZRvXAZEat
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2116 setup.exe 1816 victoria43_cn_setup.exe -
Loads dropped DLL 8 IoCs
pid Process 2332 002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe 2116 setup.exe 2116 setup.exe 2116 setup.exe 2116 setup.exe 1816 victoria43_cn_setup.exe 1816 victoria43_cn_setup.exe 1816 victoria43_cn_setup.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language victoria43_cn_setup.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main victoria43_cn_setup.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2116 setup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1816 victoria43_cn_setup.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1816 victoria43_cn_setup.exe 1816 victoria43_cn_setup.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2116 2332 002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2116 2332 002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2116 2332 002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2116 2332 002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2116 2332 002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2116 2332 002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2116 2332 002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe 31 PID 2116 wrote to memory of 1816 2116 setup.exe 32 PID 2116 wrote to memory of 1816 2116 setup.exe 32 PID 2116 wrote to memory of 1816 2116 setup.exe 32 PID 2116 wrote to memory of 1816 2116 setup.exe 32 PID 2116 wrote to memory of 1816 2116 setup.exe 32 PID 2116 wrote to memory of 1816 2116 setup.exe 32 PID 2116 wrote to memory of 1816 2116 setup.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\002c617a8f6ace3962a53d82cc3ad25c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\g8CD9B\setup.exeC:\Users\Admin\AppData\Local\Temp\g8CD9B\setup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\g8CD9B\victoria43_cn_setup.exeC:\Users\Admin\AppData\Local\Temp\g8CD9B\victoria43_cn_setup.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
583KB
MD55d2f51fbb661b3971a742386ded258b6
SHA1a4895d7cadbe2c5a2a71272ba3f6250f7f6b6cba
SHA2564ca700b3824472591caf5dde0119047decfa703a0b2556ac756bef3e5d4e4327
SHA512b2b6bab4f7b0a0ede7634f177200a695dc28e5cb928b008b47c3b9020b4cbeb30f81769bb90178fd6ea98f1002a1fe61c13594bd2495c418ee1444b0d1df25bb
-
Filesize
217B
MD56b0142abf5ada49604c5258608b02f3d
SHA1c2d73805d4ab56b9a51a915d8d58c629fee69425
SHA25611fd61dbfd2b1bb246f2c45f326acd94b17b9e5bef5a362e4fe0a14b68e37f2e
SHA512d2bff53a1d047f410b147c436b6cb51e5bcbcb5da4e4891967af7c6403553b859f059f1f97a6d428a064e07f63d154584506d8b3223ae7a70919d356eecb8ca9
-
Filesize
698KB
MD5dd090e11d22b22741c9cdc2c0b1bdebd
SHA1f2bb9807f14fc51f04778f76355ed622b8576b1c
SHA256b581543e2e5d013f1c196b7fef45fc21504b5463a4455d42bd1f3ca12ba15a3f
SHA5129669eaea85b93e4042e612ea14390f7a0a35dfd5a0514d293e5613f64804be66df5fa817d4706f94717cdd0ff35e796236c17fc2bc5c49cb091647993f871ae6