Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 13:57
Static task
static1
Behavioral task
behavioral1
Sample
0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe
-
Size
321KB
-
MD5
0b0186920413b879c4e32c29190ad774
-
SHA1
f61aa39cfa4deb05984f8db0679cfb43d1b098d5
-
SHA256
e42bbc2bbc0fcf5412fe2004aa9d42dbc8fbca4abece8ba1dfd8e9ccb798af51
-
SHA512
e73cd6d62d7f7ba846057de4a9ee862920b7ac1efb9dc1f3665c0fafcceb2df23fa1c2d9464fd6c07b8f7369c7339d90155eb9afa1830acb36861dbee9c541a2
-
SSDEEP
6144:AT+FQowd7CswMHScIOq1G/PVRnC2CkErfoFWN:zFhw/ycBqwVRC2gcFU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1072 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1940 bunee.exe -
Loads dropped DLL 2 IoCs
pid Process 1984 0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe 1984 0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D95BC468-3C80-AD4F-F4E3-EFE6C1B1CCFB} = "C:\\Users\\Admin\\AppData\\Roaming\\Asqul\\bunee.exe" bunee.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1984 set thread context of 1072 1984 0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bunee.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Privacy 0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe 1940 bunee.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1984 0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe 1940 bunee.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1940 1984 0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe 31 PID 1984 wrote to memory of 1940 1984 0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe 31 PID 1984 wrote to memory of 1940 1984 0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe 31 PID 1984 wrote to memory of 1940 1984 0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe 31 PID 1940 wrote to memory of 1116 1940 bunee.exe 19 PID 1940 wrote to memory of 1116 1940 bunee.exe 19 PID 1940 wrote to memory of 1116 1940 bunee.exe 19 PID 1940 wrote to memory of 1116 1940 bunee.exe 19 PID 1940 wrote to memory of 1116 1940 bunee.exe 19 PID 1940 wrote to memory of 1168 1940 bunee.exe 20 PID 1940 wrote to memory of 1168 1940 bunee.exe 20 PID 1940 wrote to memory of 1168 1940 bunee.exe 20 PID 1940 wrote to memory of 1168 1940 bunee.exe 20 PID 1940 wrote to memory of 1168 1940 bunee.exe 20 PID 1940 wrote to memory of 1224 1940 bunee.exe 21 PID 1940 wrote to memory of 1224 1940 bunee.exe 21 PID 1940 wrote to memory of 1224 1940 bunee.exe 21 PID 1940 wrote to memory of 1224 1940 bunee.exe 21 PID 1940 wrote to memory of 1224 1940 bunee.exe 21 PID 1940 wrote to memory of 1336 1940 bunee.exe 23 PID 1940 wrote to memory of 1336 1940 bunee.exe 23 PID 1940 wrote to memory of 1336 1940 bunee.exe 23 PID 1940 wrote to memory of 1336 1940 bunee.exe 23 PID 1940 wrote to memory of 1336 1940 bunee.exe 23 PID 1940 wrote to memory of 1984 1940 bunee.exe 30 PID 1940 wrote to memory of 1984 1940 bunee.exe 30 PID 1940 wrote to memory of 1984 1940 bunee.exe 30 PID 1940 wrote to memory of 1984 1940 bunee.exe 30 PID 1940 wrote to memory of 1984 1940 bunee.exe 30 PID 1984 wrote to memory of 1072 1984 0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe 32 PID 1984 wrote to memory of 1072 1984 0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe 32 PID 1984 wrote to memory of 1072 1984 0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe 32 PID 1984 wrote to memory of 1072 1984 0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe 32 PID 1984 wrote to memory of 1072 1984 0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe 32 PID 1984 wrote to memory of 1072 1984 0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe 32 PID 1984 wrote to memory of 1072 1984 0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe 32 PID 1984 wrote to memory of 1072 1984 0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe 32 PID 1984 wrote to memory of 1072 1984 0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe 32 PID 1940 wrote to memory of 1604 1940 bunee.exe 35 PID 1940 wrote to memory of 1604 1940 bunee.exe 35 PID 1940 wrote to memory of 1604 1940 bunee.exe 35 PID 1940 wrote to memory of 1604 1940 bunee.exe 35 PID 1940 wrote to memory of 1604 1940 bunee.exe 35
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0b0186920413b879c4e32c29190ad774_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Roaming\Asqul\bunee.exe"C:\Users\Admin\AppData\Roaming\Asqul\bunee.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1940
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp746baedc.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1072
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1336
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5890b3d9204ed872d6469077de8eca738
SHA1d8a25f200cbcfc55e82c7297bd6d719b45ef8fa2
SHA256a7b632bd37c5232de4a928251c9969fb63f4f972d66723c063c83ab8e6104b42
SHA5122795764dff3ddd3b5c5be9df98f91e5b5614a677ebf5985ff71f37afc698b5450954b911d1a8be3412773df58c9500ce72f1042836e3b1c8b3d37d76a837f08c
-
Filesize
321KB
MD5ad9af250cf93c65edafe286791de3352
SHA1b63f6b4f4c67fda0e78fc6e9f1a10b464cc54b2e
SHA25693fc6e54a3a22901616cd4080302bccaa1b02451b636c13c3e0dc46af9c79ff0
SHA512f0a975b5d60b5fc65c6883baa37605b484e4e4dd9d3779276354a021cdc083d08aee3b13344504c988cd00b9cb433110f49621564d71f567f42a1ad7b5427422