Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 21:05
Behavioral task
behavioral1
Sample
034309d15794ad626a52a3ef6906ec8d_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
034309d15794ad626a52a3ef6906ec8d_JaffaCakes118.exe
-
Size
208KB
-
MD5
034309d15794ad626a52a3ef6906ec8d
-
SHA1
424bd06c1238933d211417c4b7c8eab8fac63b56
-
SHA256
b4b59223da181345025a08c5e8d4b953206b0a8cc71b9c287510fb9df7531496
-
SHA512
e55163c25665597f2d2e650a0771a43835d90849e14c780466615439f841a45c4c82f35cee131f8802f9e5651d629e41cfd458bf1790c859c93fde49e4547d94
-
SSDEEP
3072:Y9rsFWRzKx5mP2v8PjLa3uOoXDniXVA5F9TpYsSYnUV1EITIHZ2GgUOjdFCyL+lu:fkzKmP2USFXgF9qCUbbTIgGYJaH2Og
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WinUpdate.lnk 034309d15794ad626a52a3ef6906ec8d_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2684 msftdm.exe 2524 msftdm32.exe -
Loads dropped DLL 10 IoCs
pid Process 268 034309d15794ad626a52a3ef6906ec8d_JaffaCakes118.exe 268 034309d15794ad626a52a3ef6906ec8d_JaffaCakes118.exe 2684 msftdm.exe 268 034309d15794ad626a52a3ef6906ec8d_JaffaCakes118.exe 2524 msftdm32.exe 2684 msftdm.exe 2524 msftdm32.exe 2524 msftdm32.exe 2684 msftdm.exe 2684 msftdm.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/268-0-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/268-92-0x0000000000400000-0x0000000000492000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.app.log 034309d15794ad626a52a3ef6906ec8d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msftdm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 034309d15794ad626a52a3ef6906ec8d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 268 wrote to memory of 2684 268 034309d15794ad626a52a3ef6906ec8d_JaffaCakes118.exe 31 PID 268 wrote to memory of 2684 268 034309d15794ad626a52a3ef6906ec8d_JaffaCakes118.exe 31 PID 268 wrote to memory of 2684 268 034309d15794ad626a52a3ef6906ec8d_JaffaCakes118.exe 31 PID 268 wrote to memory of 2684 268 034309d15794ad626a52a3ef6906ec8d_JaffaCakes118.exe 31 PID 268 wrote to memory of 2524 268 034309d15794ad626a52a3ef6906ec8d_JaffaCakes118.exe 32 PID 268 wrote to memory of 2524 268 034309d15794ad626a52a3ef6906ec8d_JaffaCakes118.exe 32 PID 268 wrote to memory of 2524 268 034309d15794ad626a52a3ef6906ec8d_JaffaCakes118.exe 32 PID 268 wrote to memory of 2524 268 034309d15794ad626a52a3ef6906ec8d_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\034309d15794ad626a52a3ef6906ec8d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\034309d15794ad626a52a3ef6906ec8d_JaffaCakes118.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Users\Admin\AppData\Roaming\MACROM~1\WINUPL~1\msftdm.exe"C:\Users\Admin\AppData\Roaming\MACROM~1\WINUPL~1\msftdm.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2684
-
-
C:\Users\Admin\AppData\Roaming\MACROM~1\WINUPL~1\msftdm32.exe"C:\Users\Admin\AppData\Roaming\MACROM~1\WINUPL~1\msftdm32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
670B
MD55c71adad2f870c6f84f24182104f755d
SHA1fe8e165ab86c1d2238812c22203a553b83f1456f
SHA2567e17d62458a1bd2e83f9e7c6a39e2ce5d3cc92e26a2627bf92dca74d34ea71c7
SHA512a3311420b3e3ee0671490edb32b55a945f81f5b0bd15fe0f81e26ad0ea74f03e78cc11d26118b757f299eba06b4d25083704016be99406a3f0ea3953d39e89de
-
Filesize
53KB
MD5dd2a1dc1131d324d0e83eda1a8ec7cbf
SHA169044f7cf8a57035e66b5277167a75b49c996376
SHA2562e66054076eb530f4e34644b488e62464d24bcd78eedaf040612fb24889dc600
SHA512a5e326fbe6a8ab41e1bd2512c50f7657d07fb68488496ad29de5043cef9c760227af87eeabc164b8874351be10332b8f2daafd6960a70ef441cb7f56a6038743
-
Filesize
2KB
MD593c19df7781e8c2dae5cb8dfab60860b
SHA1f7642b2f2dcf1db31b1b0082f5af2cc760ebdd3d
SHA256f2fc73c0c669a14a961ecb9152cab5342c1cb8a06c8aa1314701c3b77105c38a
SHA5127c7b7953b0b1268601f1066e3a42095e0040c29949a46234a6a5ca1f7913c02df10c0df40ab27a89ebf386afeb211fa695f6d634705abe0d405b6231d5f52a0d
-
Filesize
45KB
MD5a62f7ab6d1e4e52e4fdd0cba8001aa9f
SHA18d59643dc102f4bd4ff21086dcc3b2fb2fc52eb3
SHA256a337498163636bd867f6323a045b987b17346fbf4dc901fa7b9ab225a8c8272c
SHA51233782dc93024a5c5c34aee1fdc1b8d7ac4695c6d335e14e42ec3618a959f1ffb951f1b1e16102c826f199fb9c4f9ed0ca3806be55b471f4ac58ad310af3b8d2a
-
Filesize
29KB
MD5a88b2a785d05fdde97e91b2943d0eded
SHA1cb604bdff4e964be46bee95da626cba2546095c6
SHA2563d2d2caf1cc8c05179868a75421890c361b3189bd03dc82742635f9cad08899b
SHA51251cbc52215a30bd527d9f2fb74a3feab2ad857920e1c2b52633e871b314a1fadb18ba1721651bd1e96480439cf1ed0f0243f90d197face0d7c8454cb36bab855
-
Filesize
24B
MD5e21f42c8e892bcb102b45fd92ae946f2
SHA1018c9f80a4f603c12e0f7014fa8c77116434ba09
SHA2561df3a4c0aea1b2cdc377ed1359f27efcfecc4a80c3d1a8a785568fb5552f91a9
SHA512130d4bf292d25b44d68affc26318b033bcd532942f25f0fa78620b934095d6c2ae8ff4c2b2632233eaf25f85deca9f0349cba405b12e0c898254c00329403de1
-
Filesize
15KB
MD546440fb9a29664e78f204594c8b3e9d2
SHA10b29aa54e35c92cf846b00c9739cbb4a263704cf
SHA256b48ac516e1641f8d02981cfe7037d54d1feb26519ab9281b4eda4d67278826cd
SHA512f9f68fcea1b5742056d28a988d18775044394c8e22feef1ec940c8e40c8cb42ab13b1c36e339d84d414e5615825d15bea5aae2a7288804c3e03208bc717b8e13
-
Filesize
18KB
MD5d81681bf5c88bd5944fe74afd0271b02
SHA196dbc371c9001fdeb891a1910409f335e1349454
SHA25694213e032fd1b52565d800b2caaa872d8d26de4f97518c2b197be595a69711b2
SHA512e4fe8462eeeb41149ed8cb1ec2558178fad539727553e44123e01767d9587782312ba7955c1f0a1813fc95f06aced8c687a12e504e3d3fbbbd80d0d1885d4f18
-
Filesize
729B
MD5cb653f8d96ae2378f7bd4b80ccdb0e06
SHA1427429973c2227f6546c19151640c1a1e0a5c296
SHA25670da9fc5442e8cdc5f0270b821b0ac9f9b007bd0610f67332516f609fb210b1d
SHA512dc3c68b23882475e86ec5ec5875e6e33d6b0d6bc718f3329044433d6b6e296e25191db9cb00ed30c452dd2186057c4a8326765803081bacc6c24776a0a3c59ba
-
Filesize
105KB
MD5c687f1cdd86b27663e31f7961c34c0f3
SHA198191c7766d39c7e582c124f7e71333c2d76b82e
SHA25686fcc047494dea0dba5b99d521b7208705d41fab9c67ad388a8019ef3d2f8743
SHA5125f4fc24f3c2417d10c367bcbba6be9528b8bbaf8288bc48c988e68f619296471ec5a65af4aa503206960f636e268951a53395cce41d320965d9f12d1c8d9bba7
-
Filesize
88KB
MD5c92746edebac8dc73d9de7a5f529899f
SHA1759b1adf07cf934662c1990b4a630d264dd736b1
SHA256346b5762fdcd93edf6c9ea229a05c55334decbe79959fb06c75c1da35426a2b6
SHA5120a61a2bdf6583f2ae26af336c591af1633a2aecafb0c65e10ce1ae5271891936a89686d79c9401b7eb6d526e0a22c165d53d578f5c9cb05d2f144f90b2a22718
-
Filesize
37KB
MD550a7c9f8a486c6cfbeeb95e8c9bcad09
SHA19b1da7b49bc99b1236f98b9f8bafbfdd5a877f74
SHA2565d4acdc587dc66da241468342b095abcfd3fa9cf89358672eab9f1638c43c976
SHA512c960cebf143c34e4feab4d8e2791d1a3e4952383f14e6d76312af0e544e139428099ce5a589720e2cf408732fec224201d9ccd8f79bb9e410048b735c5cc328b
-
Filesize
58KB
MD5c9f471e3bcc053823b1c1eb1777ae940
SHA1398a127907b8868e2f3b0c2e0af3c35afa0d5ad0
SHA256eb5457d2bd6ace160a7dfd2d188ba80ca8ff48f868020e7f20ad440ce1c574b7
SHA5125b2057314fe5431257985965bed3f1be4867f7e5b674d01d32f9996e5ba21cd66034de47a1fdf8b7135c9dd5993b10e7dd71c8c9386174e3cf98d3cc0b799235
-
Filesize
30KB
MD5da505cf0cc35430277e0c7f37cf6319e
SHA1501dbf4385149f54db6bfe40fedbe0b7907d3703
SHA256d6f4d400090398c310cca5770a35c9f85dbf2f16a326262bad532792294a9f02
SHA512d5bab231bc17e27322d871a8a6c808787ce8f34bcf3ede2f71e9750fefa371ee9bbd5f8f48ed20b63a5281824ca00004a4cb71ec7e71362427796dab10ea802c