Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
10s -
max time network
15s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 15:58
Static task
static1
Behavioral task
behavioral1
Sample
0227df49c790c6d26a6dc7a448236eae_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0227df49c790c6d26a6dc7a448236eae_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0227df49c790c6d26a6dc7a448236eae_JaffaCakes118.exe
-
Size
177KB
-
MD5
0227df49c790c6d26a6dc7a448236eae
-
SHA1
d5fe91767553c0296f7abd378616c81dbb0020a3
-
SHA256
d30ef4e945ce5926922bd5bccb6b842324fbf553f61f58e616a62bc865274a5f
-
SHA512
87b3c78bc799498958066f7d7f5cd2893c9203fe8fdd86b6e920d8822641d8192870973a56162414ca74d4ba609bd0bc42ec046123fbe1179a0319d7033144a1
-
SSDEEP
3072:5kHFSO8g1+peg7FzKJWsMUMOVOmvsQXC+uv9K51Ot3bS58QJUGxNsSaA2Fb2H6S3:sFb8gcplpz1sMUZVLDXC+uvo5CLmRZxN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2700 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0227df49c790c6d26a6dc7a448236eae_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2700 2148 0227df49c790c6d26a6dc7a448236eae_JaffaCakes118.exe 30 PID 2148 wrote to memory of 2700 2148 0227df49c790c6d26a6dc7a448236eae_JaffaCakes118.exe 30 PID 2148 wrote to memory of 2700 2148 0227df49c790c6d26a6dc7a448236eae_JaffaCakes118.exe 30 PID 2148 wrote to memory of 2700 2148 0227df49c790c6d26a6dc7a448236eae_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0227df49c790c6d26a6dc7a448236eae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0227df49c790c6d26a6dc7a448236eae_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Lsj..bat" > nul 2> nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD594bd0dc692bacf762942c1dcccc0439d
SHA1fb81934b007b43a18caee56440dffeb7524d7073
SHA256cf35533ea8cbaf0dbabec91b7204e741c8b58c0c913a4de14071ba6a7b729e70
SHA5127c2884bb437b226a92851cd477750db562641171f23d7e9f06bdd6496fae0e00913f77cc4e1f66526d7821498241e186b4b68bde5a6fa0f03387eca4dd334cac