Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe
-
Size
333KB
-
MD5
11ceef2c381a5aa0b6dabb50158f8cc7
-
SHA1
5ceb028c5c525a8bca8fb2ad41a594265933bdb7
-
SHA256
bd7ae6460bee4a39a8eb3d5e01135359bb5eebde33d288edf3b47aff7f737a23
-
SHA512
ea4c7c04b5020401910c3562955822874047b9ff5bf5a148ba8a4c8288021e1cf22fe6d452b3f5eca0191db8d938925c8f1b2570745a28c71bb2569ab92536d1
-
SSDEEP
6144:IXYxnf+cBTvBcMnvgIRoJU6yXQx3FzaO5BLjJoxGq6IE5y+:IXYxf+0cMnvgIRoJx99VFYGq6z
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1448 server.exe 936 WerFault.exe -
Loads dropped DLL 2 IoCs
pid Process 2376 11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe 1448 server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WerFault.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 936 WerFault.exe 936 WerFault.exe 936 WerFault.exe 936 WerFault.exe 936 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: 33 2376 11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2376 11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe Token: 33 2376 11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2376 11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe Token: 33 2376 11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2376 11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe Token: 33 2376 11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2376 11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe Token: 33 1448 server.exe Token: SeIncBasePriorityPrivilege 1448 server.exe Token: 33 936 WerFault.exe Token: SeIncBasePriorityPrivilege 936 WerFault.exe Token: 33 936 WerFault.exe Token: SeIncBasePriorityPrivilege 936 WerFault.exe Token: SeDebugPrivilege 936 WerFault.exe Token: 33 936 WerFault.exe Token: SeIncBasePriorityPrivilege 936 WerFault.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2376 wrote to memory of 1448 2376 11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe 29 PID 2376 wrote to memory of 1448 2376 11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe 29 PID 2376 wrote to memory of 1448 2376 11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe 29 PID 2376 wrote to memory of 1448 2376 11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe 29 PID 1448 wrote to memory of 936 1448 server.exe 30 PID 1448 wrote to memory of 936 1448 server.exe 30 PID 1448 wrote to memory of 936 1448 server.exe 30 PID 1448 wrote to memory of 936 1448 server.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2010.08.22T13.27\Virtual\STUBEXE\@APPDATALOCAL@\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2010.08.22T13.27\Native\STUBEXE\@SYSTEM@\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 2003⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:936
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2010.08.22T13.27\Native\STUBEXE\@SYSTEM@\WerFault.exe
Filesize17KB
MD536e3fa60e628d7cbd22bc1dc8ccd6a11
SHA17ae9f7da10ee11131aa0f48c8be00ad0a59bce11
SHA256af12be88da7a4dff7849f9af96130976e137d2c854e699bedccb778dc0842e83
SHA5120ab35aedae2c77e64f89be4280296cdbda268f91e78d8cdfd07f417f133d4f8fc003f2f40eea3f4b3bf7c78d56bc14c31d0c45616201e25070d53d04f86c4346
-
\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2010.08.22T13.27\Virtual\STUBEXE\@APPDATALOCAL@\Temp\server.exe
Filesize17KB
MD5043c51b5683e79d80cbdbfa00e9f77a4
SHA1ed18233e54ac7073613f8c334f2c1c3e18290461
SHA2564d60172a4ff72d67b9d1ced63901e6dd056984e802e9b169ab06fbeebc328c15
SHA512d98fa9211a191448249e179f2f19907f79cd4ef810cd0a0fcd689ec4f0fb716bd147aeecd9bd8bbf5ab121c754ba02312e8ffd7edda56956df12a31e41642c22