Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 18:18
Static task
static1
Behavioral task
behavioral1
Sample
02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe
-
Size
404KB
-
MD5
02ac073cc153d34db95daff9fef2ccf1
-
SHA1
0eb9e4cff3fa342901394cafe04ddc87a0d6acfa
-
SHA256
e870a918097a2cec36fd0b833a6312c737e3d9d8967b90234fbdcd9e856dd8ae
-
SHA512
b1a95335723b50328ea2af13db6a1ae58c71381bde60be48f04591872b91e45ea1000cf53f11b9f73bb482eb5a8990ed4e8cba1df1aef3f426cb1b80f00d88ed
-
SSDEEP
12288:T8x5JWY/Q7dQDQlHwrUIj42e3SrRWeE8c/u:sYhAljNe3SrvjcW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2276 Typically.exe -
Loads dropped DLL 2 IoCs
pid Process 2484 02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe 2484 02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created \??\c:\program files\ReAlplay\entirely\Typically.exe 02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Typically.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2484 02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe 2484 02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe 2484 02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe 2484 02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe 2276 Typically.exe 2276 Typically.exe 2276 Typically.exe 2276 Typically.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2276 2484 02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe 30 PID 2484 wrote to memory of 2276 2484 02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe 30 PID 2484 wrote to memory of 2276 2484 02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe 30 PID 2484 wrote to memory of 2276 2484 02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\02ac073cc153d34db95daff9fef2ccf1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
\??\c:\program files\ReAlplay\entirely\Typically.exe"c:\program files\ReAlplay\entirely\Typically.exe" "33201"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
404KB
MD5d231c753a6507b7a445a7ac22b80bcf9
SHA102ac8ca3141937b9dbb72bb898357d76ea703291
SHA256881e7656e78a9df7501a221aaa186d752ddcf728234a1dc320dcb5f6962a9d3c
SHA5129a64e865831f2ba421303db38deb2b23332fd2d73cb7c955318fde820447b2b2d5475441df84ae5da33e5ac523c497d7842d3c253d3f945c92e0a31f4cc5e339