Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 11:49
Static task
static1
Behavioral task
behavioral1
Sample
012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe
-
Size
408KB
-
MD5
012956475b26cbdf95e0c37fb49df4b5
-
SHA1
495780916fd0cf2d293ae78931b942e99edfc5e9
-
SHA256
5a2404f77f0bc03e7b0881c1e44361ca04d3790d30663211c371ad808a49098a
-
SHA512
ba01c3f12d3b1e8accdb8acf123be80ac5db88b8718a34e7e226dc92df16b27c711e320ad08fd1d144b38b1bbdee405fd41dd21f1dd2c20d3a6e74736addedc8
-
SSDEEP
12288:hw7GJF+yDSO+2Rz8++HxBETNUCUeQozxfcI:Wy5WJ/0zZcI
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2360 SERVER.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\COLLINES.JPG DllHost.exe File created C:\Windows\SERVER.EXE 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe File created C:\Windows\COLLINES.JPG 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosDate 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2360 SERVER.EXE 2360 SERVER.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2840 DllHost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1476 wrote to memory of 2360 1476 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe 30 PID 1476 wrote to memory of 2360 1476 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe 30 PID 1476 wrote to memory of 2360 1476 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe 30 PID 1476 wrote to memory of 2360 1476 012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe 30 PID 2360 wrote to memory of 1184 2360 SERVER.EXE 21 PID 2360 wrote to memory of 1184 2360 SERVER.EXE 21 PID 2360 wrote to memory of 1184 2360 SERVER.EXE 21 PID 2360 wrote to memory of 1184 2360 SERVER.EXE 21 PID 2360 wrote to memory of 1184 2360 SERVER.EXE 21 PID 2360 wrote to memory of 1184 2360 SERVER.EXE 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe"2⤵
- Checks BIOS information in registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SERVER.EXE"C:\Windows\SERVER.EXE"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2360
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
28KB
MD58fbc616195317fe76e9830ef73649e46
SHA1a20e6898fe63a88dab5f4de21b4cf17405b90147
SHA2568eaca2d838cf928fdf33a322750c0d2a545f022a71138ad9f256d57993390fb0
SHA512227f713e7e83eb9634c8940ed9a8e4af00c31415a7c42784afecf81aeb50edf9b5165726df085481caf78cadf411f47fb866eb5144c8a9dbdb82167484a4fd06