Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
102757bd56dedaf5c41bcb0908e39f5f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
102757bd56dedaf5c41bcb0908e39f5f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
102757bd56dedaf5c41bcb0908e39f5f_JaffaCakes118.exe
-
Size
374KB
-
MD5
102757bd56dedaf5c41bcb0908e39f5f
-
SHA1
9e1d1227ac66941c4d52a067483a2725a0a00947
-
SHA256
2bab3a939ef64e3ceff3ab2a801e14b0687a0432bd76ccdc1fb592ad4bb37f13
-
SHA512
a89310c8f707f8f5a09ba4f479ffc88c085485e23a92d289ebd8501e12ed0db0eb30dd7f20d183dbc1ad4cbbac539c8c8dbc81537115bd9e1b4342fd818dae99
-
SSDEEP
6144:ISDpAg7c2UufeFcXjySDcvtWiMxVeXX/6z5HQx73CTgQz36FWqDcMEZVVmRPZ3hd:fmMnfkGyxvt9/ligQ76F3wDSPdhg1XAV
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2776 ID_Nxp8471_Conversion.exe 2768 02.exe -
Loads dropped DLL 7 IoCs
pid Process 2240 102757bd56dedaf5c41bcb0908e39f5f_JaffaCakes118.exe 2240 102757bd56dedaf5c41bcb0908e39f5f_JaffaCakes118.exe 2240 102757bd56dedaf5c41bcb0908e39f5f_JaffaCakes118.exe 2240 102757bd56dedaf5c41bcb0908e39f5f_JaffaCakes118.exe 2776 ID_Nxp8471_Conversion.exe 2776 ID_Nxp8471_Conversion.exe 2776 ID_Nxp8471_Conversion.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 102757bd56dedaf5c41bcb0908e39f5f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ID_Nxp8471_Conversion.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2776 2240 102757bd56dedaf5c41bcb0908e39f5f_JaffaCakes118.exe 31 PID 2240 wrote to memory of 2776 2240 102757bd56dedaf5c41bcb0908e39f5f_JaffaCakes118.exe 31 PID 2240 wrote to memory of 2776 2240 102757bd56dedaf5c41bcb0908e39f5f_JaffaCakes118.exe 31 PID 2240 wrote to memory of 2776 2240 102757bd56dedaf5c41bcb0908e39f5f_JaffaCakes118.exe 31 PID 2240 wrote to memory of 2776 2240 102757bd56dedaf5c41bcb0908e39f5f_JaffaCakes118.exe 31 PID 2240 wrote to memory of 2776 2240 102757bd56dedaf5c41bcb0908e39f5f_JaffaCakes118.exe 31 PID 2240 wrote to memory of 2776 2240 102757bd56dedaf5c41bcb0908e39f5f_JaffaCakes118.exe 31 PID 2240 wrote to memory of 2768 2240 102757bd56dedaf5c41bcb0908e39f5f_JaffaCakes118.exe 32 PID 2240 wrote to memory of 2768 2240 102757bd56dedaf5c41bcb0908e39f5f_JaffaCakes118.exe 32 PID 2240 wrote to memory of 2768 2240 102757bd56dedaf5c41bcb0908e39f5f_JaffaCakes118.exe 32 PID 2240 wrote to memory of 2768 2240 102757bd56dedaf5c41bcb0908e39f5f_JaffaCakes118.exe 32 PID 2768 wrote to memory of 2728 2768 02.exe 33 PID 2768 wrote to memory of 2728 2768 02.exe 33 PID 2768 wrote to memory of 2728 2768 02.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\102757bd56dedaf5c41bcb0908e39f5f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\102757bd56dedaf5c41bcb0908e39f5f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\ID_Nxp8471_Conversion.exe"C:\Users\Admin\AppData\Local\Temp\ID_Nxp8471_Conversion.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\02.exe"C:\Users\Admin\AppData\Local\Temp\02.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 3683⤵PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5054735a9e07c0d155284236f00536023
SHA1ae5273884cc4970e61cffa7f48581accecdd9181
SHA256711f0870d6d373648e01aa6203f7fe06d04e1f2ac152570f5bc337dba5d29de0
SHA512ca2ceb60508693c0670ca6dc6579c231c5e38f24fc35d89db9a159a488fd67d962978d269788839243dcf6ef3163604f584bb4fb59a9f73c165556c1f99443c3
-
Filesize
422KB
MD5cb50f552f5b70148f4bc4ab44cb17791
SHA170cc3ad2cc3bfe5431d0fdd6fc74a56ee464ea7f
SHA2567915ee78d902938052a8703ef25baa26771e181cc64a8d05664c11d980891f1d
SHA5127bb476554b94412031e12f1e3cb96d9ff90381a4ff960190c83c514d8a85f174883d5f987a4fb20fa7e3e45ffec9410a530f5891392b4da357e41c7b9613e96e