Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
84s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe
-
Size
349KB
-
MD5
0030527e0b31b3189694e0abaf8cf02e
-
SHA1
84db601a9dc06b0bae6eaec458c47c9a9d75a201
-
SHA256
56265aeedc2769451ba48059dad5fd79d647c6fc88fa7327ae1107f4845b7f38
-
SHA512
ffdc91e76cbc8b8ac55f5d4b30f9d69e440e289a3e77de8846e1b7d3c8a3025cad0b1af8c5a407dfdb9fd3ddd140e14f33c100669d6e42ccfc697802c9b67e14
-
SSDEEP
6144:g5O8UsE/eSJp7TzuZXaDnbMQ/2fgvqMBPD7o7h6jFNcc2eIP3OW:lJsE/rbTGXybMQ/IEwkF2r3OW
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2824 setup.exe 2924 max2_133daohang4.exe -
Loads dropped DLL 11 IoCs
pid Process 2768 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 2768 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 2768 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 2924 max2_133daohang4.exe 2924 max2_133daohang4.exe 2924 max2_133daohang4.exe 2824 setup.exe 2824 setup.exe 2824 setup.exe 2924 max2_133daohang4.exe 2924 max2_133daohang4.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\newiexplore.exe setup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\newiexplore.exe setup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\sppert.ini setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language max2_133daohang4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x0006000000018725-11.dat nsis_installer_1 behavioral1/files/0x0006000000018725-11.dat nsis_installer_2 -
Modifies registry class 19 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\ShellFolder\Attributes = "0" 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\TypeLib\ = "{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}" 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\ = "Internet Explorer" 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\DefaultIcon\ = "C:\\Windows\\SysWow64\\SHELL32.DLL,220" 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\Shell\Internet Explorer\Command 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\DefaultIcon 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\Shell 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\Shell\Internet Explorer\Command\ = "C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe http://www.7322.com" 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\ShellFolder 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\TypeLib 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979} 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\InfoTip = "Internet Explorer" 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\Shell\Internet Explorer 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2824 2768 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 29 PID 2768 wrote to memory of 2824 2768 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 29 PID 2768 wrote to memory of 2824 2768 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 29 PID 2768 wrote to memory of 2824 2768 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 29 PID 2768 wrote to memory of 2824 2768 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 29 PID 2768 wrote to memory of 2824 2768 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 29 PID 2768 wrote to memory of 2824 2768 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 29 PID 2768 wrote to memory of 2924 2768 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 30 PID 2768 wrote to memory of 2924 2768 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 30 PID 2768 wrote to memory of 2924 2768 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 30 PID 2768 wrote to memory of 2924 2768 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 30 PID 2768 wrote to memory of 2924 2768 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 30 PID 2768 wrote to memory of 2924 2768 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 30 PID 2768 wrote to memory of 2924 2768 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2364 2824 setup.exe 31 PID 2824 wrote to memory of 2364 2824 setup.exe 31 PID 2824 wrote to memory of 2364 2824 setup.exe 31 PID 2824 wrote to memory of 2364 2824 setup.exe 31 PID 2824 wrote to memory of 2364 2824 setup.exe 31 PID 2824 wrote to memory of 2364 2824 setup.exe 31 PID 2824 wrote to memory of 2364 2824 setup.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DelTemp.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2364
-
-
-
C:\Users\Admin\AppData\Local\Temp\max2_133daohang4.exe"C:\Users\Admin\AppData\Local\Temp\max2_133daohang4.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69B
MD532f45cd6abc1d26f07b8ddb71871ce05
SHA10cc28dc63d50327a74f8e964cdf23ffed05a8699
SHA256a2023fadce396c9265a61f24b6dcc5e95aaaf2b9efa1eceac2fcc1332322e716
SHA512f18d1ed212bda39f671fe7d7dac6cc6f5012e17149b57c7a121e666f09d5040c75ced09679bef1e630cd69fc03d824ced178be25b275139e4f4e139a0f96ebb9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk
Filesize1KB
MD59656fd75e3316eaa0339185d770cc1f7
SHA101abead7f1e8a01f5fa5fab6629255dd5449877b
SHA256cd18b50cbacf9b1c30edd270daf816ec51783b9383603d8b8d60f550f2738bce
SHA5125b773094170965190ad8ea4444d9e7d6a9daf51a05888ddb69946e787d66f939397814855dd04716068c6abc0f032d1ade10ac1d1ae9c0c0dbd5bfb9c561b4a1
-
Filesize
65KB
MD5b904cf041cacaae74655cf009acfed2e
SHA1028ef889562a55bc98119fe2c186efb35f556bd1
SHA25672f4498744d1c856eb35028fc0fa59bf0a78b0fa833c49ead54115f08c2f3846
SHA5124ebf41f49fdcb1b70c6b88351c85dff98eb2f75787e36b8741e922363ec8134399450351c431cefed42d1757163eb6196275d2c6509a9c4826bcc4961d726d4c
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
Filesize
21KB
MD533322da8b36ea8b67448ec34c827a319
SHA145cae4b64ecc9bb5d3f1e01faaa14e067e74828d
SHA256fcc886a8ef7575e292ef6210902581273e33047da2f3f6e0092b7887a212c2f0
SHA512e97a4b427e89832c6555ac64044b5b3745164482afd3ff7c4b17005c99f245cc7c7e97653abad345810caca3f472c43f51036157f32926ea81306c939e9e1c3c
-
Filesize
531KB
MD5cc8dcfb3fd120dc74bb195e4634e86ee
SHA1cd5c6302235509b809d75a256d5b9f2a7f0ecf15
SHA256b538c0ab767fabf4d858ec3d2b3deac078f1d900bf42c0b3a0871a7d92b16dc6
SHA512b61f8a84acce83e1aa34b3b92d76cfb0b096685292c5594851678a03528c4bb3e6b9d404be0082c6b075275139725f8824932943a68b85eb1d0b38f8c30c2b65