Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 18:08
Static task
static1
Behavioral task
behavioral1
Sample
0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe
-
Size
435KB
-
MD5
0bea8d3669e855e32547b40dafba6fb2
-
SHA1
82e7e06a3005489895ec9580c7d466bb7beb35dd
-
SHA256
dbc40ebfee3142451c4f99972cc67e9d2b112419cea76cd4e547bc67928a79c4
-
SHA512
33d8851ff99937c92efe8ff248953fe22b42d101afacf223e174376ba065e7f9d4cb61f99cb34adaed1f64029f843df381bcf41f17dbfbb98737ec6f20dec393
-
SSDEEP
6144:k82p4pFHfzMepymgWPnviP6Koa0nArn20l96tCF2eKNBDRlC8HQQDhy5OwbYBilz:Cp4pNfz3ymJnJ8QCFkxCaQTOl2z
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Renames multiple (91) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1080 HelpMe.exe -
Loads dropped DLL 31 IoCs
pid Process 2200 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe 2200 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe 1080 HelpMe.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\M: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\V: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\U: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\L: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\R: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\X: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\B: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\Q: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\W: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\E: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\K: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\P: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\Y: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\Z: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\I: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\J: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\A: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\G: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\N: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\O: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\H: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\S: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\T: 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened for modification C:\AUTORUN.INF 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe File created C:\Windows\SysWOW64\HelpMe.exe 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HelpMe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 1080 2200 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe 30 PID 2200 wrote to memory of 1080 2200 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe 30 PID 2200 wrote to memory of 1080 2200 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe 30 PID 2200 wrote to memory of 1080 2200 0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0bea8d3669e855e32547b40dafba6fb2_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
436KB
MD5fd9706ceda5c02288f86517d4ea21dd0
SHA1a019d64920e61012bf7dc8804e8ac2716462c239
SHA2564f81babe0b572ef94dc73afdc987045e228067eb826beb860594ab04cfc94a70
SHA5125d2d455b830876e7b0b48b01a7ea5fe2a7644f1abb5febb5a82117c321175d91ac8c77179a798acc628cc632c9cffaf17967e01bdf8f63f80bbcee24233285c8
-
Filesize
1KB
MD512e02981d263bec1cbf18946c1dce196
SHA19b687950ec6e29438071e2c4be310c92855f96cd
SHA256f523b8e056ab2b1c6338be3e1f52c956e282c646a137780cf553bd2ca08848f4
SHA5122c6aff3d907976baa8a6b0f8886baf0f5c0f4f343dcc7ae7bcbc15d7892c093526bb2933ab7bfc727eb7db75f5397a0e18dee5da6731c3fdff56cb3e70bd956b
-
Filesize
954B
MD5ca998ac34b3f870be1bfce1a281c782d
SHA1478238ff8d0cbbbedc0ea344f8585bfd964e8d79
SHA256f6f660a4aae428c13fc650478ebb7e9bc483d084ae9289e19d7d22cb2a6a961a
SHA51246e081d4d48a6e546540d70b06e48cf65ec6ad8072a4a5822b526a729836f7f5982fc3a6979c1b537e58a5e5c7730029a169d20dbd9fbfdce68559217497dfa8
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
435KB
MD50bea8d3669e855e32547b40dafba6fb2
SHA182e7e06a3005489895ec9580c7d466bb7beb35dd
SHA256dbc40ebfee3142451c4f99972cc67e9d2b112419cea76cd4e547bc67928a79c4
SHA51233d8851ff99937c92efe8ff248953fe22b42d101afacf223e174376ba065e7f9d4cb61f99cb34adaed1f64029f843df381bcf41f17dbfbb98737ec6f20dec393
-
Filesize
435KB
MD573165a3b64fea356419ebebf93e78687
SHA1bdec62cf2d946543a7649262dfdbfb595402615e
SHA2567d46374fbc379a7e4d878b80f6f97fd1e9f46539f6d21e8c6b89dc650ad06a08
SHA512f2ed454fe06253c6804cd49929bd15ef32d4e6ae8d529b2a0fa2fc409b179c36e161c16091f0cdab951e1ba0892847ac5affe04ddf7b8839bcd77dbb58568f0d