Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 07:52
Static task
static1
Behavioral task
behavioral1
Sample
127869faf0aeb94a4225f994811ea115_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
127869faf0aeb94a4225f994811ea115_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
127869faf0aeb94a4225f994811ea115_JaffaCakes118.exe
-
Size
777KB
-
MD5
127869faf0aeb94a4225f994811ea115
-
SHA1
ab19d35def1dee6019f9daadbd2a1f8f948f315f
-
SHA256
ae2e35b8ed4885ba3547af211974a3aff2b61255f2a941b8091d73be821d09e7
-
SHA512
9e775837dc03c98778d9afd4a6b7018c67a3299ff616b827134b51bdfa98766574445dc6922d5b27347298dcbe4ba1fbad7b4204617af2606c4060d2e2d47a4f
-
SSDEEP
12288:UCMgipoY0EYnqM/RuIWBe5P0VtniENNOlBWQ41bIF3Z4mxxpDqVTVOCfbQ:xZFFE8qM5uJZNCW1ZIQmXAVTzfbQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1780 3.exe -
Loads dropped DLL 6 IoCs
pid Process 2276 127869faf0aeb94a4225f994811ea115_JaffaCakes118.exe 2276 127869faf0aeb94a4225f994811ea115_JaffaCakes118.exe 1780 3.exe 1768 WerFault.exe 1768 WerFault.exe 1768 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 127869faf0aeb94a4225f994811ea115_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1768 1780 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 127869faf0aeb94a4225f994811ea115_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1780 2276 127869faf0aeb94a4225f994811ea115_JaffaCakes118.exe 28 PID 2276 wrote to memory of 1780 2276 127869faf0aeb94a4225f994811ea115_JaffaCakes118.exe 28 PID 2276 wrote to memory of 1780 2276 127869faf0aeb94a4225f994811ea115_JaffaCakes118.exe 28 PID 2276 wrote to memory of 1780 2276 127869faf0aeb94a4225f994811ea115_JaffaCakes118.exe 28 PID 2276 wrote to memory of 1780 2276 127869faf0aeb94a4225f994811ea115_JaffaCakes118.exe 28 PID 2276 wrote to memory of 1780 2276 127869faf0aeb94a4225f994811ea115_JaffaCakes118.exe 28 PID 2276 wrote to memory of 1780 2276 127869faf0aeb94a4225f994811ea115_JaffaCakes118.exe 28 PID 1780 wrote to memory of 1768 1780 3.exe 29 PID 1780 wrote to memory of 1768 1780 3.exe 29 PID 1780 wrote to memory of 1768 1780 3.exe 29 PID 1780 wrote to memory of 1768 1780 3.exe 29 PID 1780 wrote to memory of 1768 1780 3.exe 29 PID 1780 wrote to memory of 1768 1780 3.exe 29 PID 1780 wrote to memory of 1768 1780 3.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\127869faf0aeb94a4225f994811ea115_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\127869faf0aeb94a4225f994811ea115_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 2643⤵
- Loads dropped DLL
- Program crash
PID:1768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
422KB
MD505c9527aa44c25f998018d049475f8bc
SHA1ad9ee4abcebe6450d9fc31c326269d82be4a3741
SHA256162e86440bddb2405968bb5bf11f02cee794d6819bdaefc88ea611654405d230
SHA5120aeedf43d2b6eae37a56bdf6a8a2cf58930d87111e54d8020fe69d287b388a02bbd7a3bcba8063da0ede8ff953e087ff3e918f4257272757a353c1bd3b8ba721