Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 15:19 UTC
Static task
static1
Behavioral task
behavioral1
Sample
06535f9a6ef08636280a08498e6f311d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06535f9a6ef08636280a08498e6f311d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
06535f9a6ef08636280a08498e6f311d_JaffaCakes118.exe
-
Size
246KB
-
MD5
06535f9a6ef08636280a08498e6f311d
-
SHA1
1f68d001a65e9310e65e060f1eda0ca434b82b08
-
SHA256
225286c75dd37cacfe9e9d95242103d87f436a3e1f685fb7de97721d4aee84d1
-
SHA512
304a9596301aa6903936db291c0091fe09aea9476be2e1ca5d4cc6b4458a65a3261518f6634d70f7097bf8bf2ccf132aea3372b9c4c11e83bc365668400faf17
-
SSDEEP
6144:fyW81ap2jBmhZzXjd+TJ4u148m+pCNrREW40b:R8AEEzzXpX44YIlREW40
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2776 5554.exe -
Loads dropped DLL 6 IoCs
pid Process 1152 06535f9a6ef08636280a08498e6f311d_JaffaCakes118.exe 1152 06535f9a6ef08636280a08498e6f311d_JaffaCakes118.exe 2812 WerFault.exe 2812 WerFault.exe 2812 WerFault.exe 2812 WerFault.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\adidas-roundhouse-fall-2010-2.jpg 06535f9a6ef08636280a08498e6f311d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\5554.exe 06535f9a6ef08636280a08498e6f311d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\adidas-roundhouse-fall-2010-2.jpg DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2812 2776 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5554.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06535f9a6ef08636280a08498e6f311d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 DllHost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1152 06535f9a6ef08636280a08498e6f311d_JaffaCakes118.exe 2764 DllHost.exe 2764 DllHost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2776 1152 06535f9a6ef08636280a08498e6f311d_JaffaCakes118.exe 33 PID 1152 wrote to memory of 2776 1152 06535f9a6ef08636280a08498e6f311d_JaffaCakes118.exe 33 PID 1152 wrote to memory of 2776 1152 06535f9a6ef08636280a08498e6f311d_JaffaCakes118.exe 33 PID 1152 wrote to memory of 2776 1152 06535f9a6ef08636280a08498e6f311d_JaffaCakes118.exe 33 PID 2776 wrote to memory of 2812 2776 5554.exe 34 PID 2776 wrote to memory of 2812 2776 5554.exe 34 PID 2776 wrote to memory of 2812 2776 5554.exe 34 PID 2776 wrote to memory of 2812 2776 5554.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\06535f9a6ef08636280a08498e6f311d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\06535f9a6ef08636280a08498e6f311d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\5554.exe"C:\Windows\System32\5554.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 883⤵
- Loads dropped DLL
- Program crash
PID:2812
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5db65aaf38e90003d325d52204f1530f9
SHA110f398eb61dd027c00158527a245cd31836327a0
SHA2566fe4d5c57c111b2f19e2c25505e653bd88d801f74a463df107ceb6a5f1a21030
SHA512091a9c63ebec7ff2c9d417e9cb8a3145d6e6520f084431334d3d66fac026fbab218308e9cc163b4533cbea54c4b2b12caf2c9116c1b6d6e7650f03a5ca7d1234
-
Filesize
365KB
MD52054d93bf26b9e31766622fa6b57abed
SHA13430ddfd8321c6c5a089c75668e78037cb699251
SHA25679342ae2f8a93da7ed66eec8c7bc7f59d923b817358843d8e98b007213c5b4b1
SHA512795285e2cf8fb7f42c8159dc972a9ab98aa05eb8ecf2a432d00586a872c75ca3d757191087bb80ecf5565d9a432548f33370373f9f7cf8ad84de9cf528febe14