Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe
-
Size
432KB
-
MD5
149e04816131f9668f98b07687cf29cb
-
SHA1
5d8a407a2f1d6a2b39a8fa46b8fe4bb5d32d8af6
-
SHA256
c4f5fc94f2f95b483fea06e7ee5feb16adb31ef64aabef48193811bc890b3c06
-
SHA512
dde897f5178043461918b3a680201327abdc033812d5495dea6a793538e62eaf8d6fb180dbc8183dc82555c88f3088cd197d90419367feedc0fc39a631c1fab4
-
SSDEEP
6144:yaUMLDM82DgUGEl80CDXq1g87shl1+lNI3CHRngHhGRl52NT1r3:yYDM82DgmxI3yR6GZGh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 596 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2668 geurge.exe 1688 geurge.exe -
Loads dropped DLL 3 IoCs
pid Process 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 2668 geurge.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ewrgetuj = "C:\\Users\\Admin\\AppData\\Local\\Temp\\geurge.exe" 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\n: geurge.exe File opened (read-only) \??\o: geurge.exe File opened (read-only) \??\q: geurge.exe File opened (read-only) \??\w: geurge.exe File opened (read-only) \??\x: geurge.exe File opened (read-only) \??\a: geurge.exe File opened (read-only) \??\j: geurge.exe File opened (read-only) \??\g: geurge.exe File opened (read-only) \??\p: geurge.exe File opened (read-only) \??\z: geurge.exe File opened (read-only) \??\b: geurge.exe File opened (read-only) \??\e: geurge.exe File opened (read-only) \??\s: geurge.exe File opened (read-only) \??\i: geurge.exe File opened (read-only) \??\l: geurge.exe File opened (read-only) \??\m: geurge.exe File opened (read-only) \??\r: geurge.exe File opened (read-only) \??\t: geurge.exe File opened (read-only) \??\u: geurge.exe File opened (read-only) \??\v: geurge.exe File opened (read-only) \??\y: geurge.exe File opened (read-only) \??\h: geurge.exe File opened (read-only) \??\k: geurge.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum geurge.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 geurge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2148 set thread context of 1992 2148 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 30 PID 2668 set thread context of 1688 2668 geurge.exe 36 -
resource yara_rule behavioral1/memory/1992-2-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1992-5-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1992-6-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1992-4-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1992-7-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1992-12-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1992-46-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1688-48-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1688-58-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1268 sc.exe 2980 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language geurge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language geurge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main geurge.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2148 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 2668 geurge.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2148 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 2668 geurge.exe 1688 geurge.exe 1688 geurge.exe 1688 geurge.exe 1688 geurge.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1992 2148 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 30 PID 2148 wrote to memory of 1992 2148 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 30 PID 2148 wrote to memory of 1992 2148 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 30 PID 2148 wrote to memory of 1992 2148 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 30 PID 2148 wrote to memory of 1992 2148 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 30 PID 2148 wrote to memory of 1992 2148 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 30 PID 2148 wrote to memory of 1992 2148 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 30 PID 2148 wrote to memory of 1992 2148 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 30 PID 2148 wrote to memory of 1992 2148 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2668 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 35 PID 1992 wrote to memory of 2668 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 35 PID 1992 wrote to memory of 2668 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 35 PID 1992 wrote to memory of 2668 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 35 PID 2668 wrote to memory of 1688 2668 geurge.exe 36 PID 2668 wrote to memory of 1688 2668 geurge.exe 36 PID 2668 wrote to memory of 1688 2668 geurge.exe 36 PID 2668 wrote to memory of 1688 2668 geurge.exe 36 PID 2668 wrote to memory of 1688 2668 geurge.exe 36 PID 2668 wrote to memory of 1688 2668 geurge.exe 36 PID 2668 wrote to memory of 1688 2668 geurge.exe 36 PID 2668 wrote to memory of 1688 2668 geurge.exe 36 PID 2668 wrote to memory of 1688 2668 geurge.exe 36 PID 1992 wrote to memory of 1484 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 37 PID 1992 wrote to memory of 1484 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 37 PID 1992 wrote to memory of 1484 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 37 PID 1992 wrote to memory of 1484 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 37 PID 1992 wrote to memory of 2980 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 39 PID 1992 wrote to memory of 2980 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 39 PID 1992 wrote to memory of 2980 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 39 PID 1992 wrote to memory of 2980 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 39 PID 1992 wrote to memory of 2684 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 40 PID 1992 wrote to memory of 2684 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 40 PID 1992 wrote to memory of 2684 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 40 PID 1992 wrote to memory of 2684 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 40 PID 1992 wrote to memory of 1268 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 42 PID 1992 wrote to memory of 1268 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 42 PID 1992 wrote to memory of 1268 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 42 PID 1992 wrote to memory of 1268 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 42 PID 1992 wrote to memory of 596 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 45 PID 1992 wrote to memory of 596 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 45 PID 1992 wrote to memory of 596 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 45 PID 1992 wrote to memory of 596 1992 149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe 45 PID 1484 wrote to memory of 1880 1484 net.exe 46 PID 1484 wrote to memory of 1880 1484 net.exe 46 PID 1484 wrote to memory of 1880 1484 net.exe 46 PID 1484 wrote to memory of 1880 1484 net.exe 46 PID 2684 wrote to memory of 1904 2684 net.exe 48 PID 2684 wrote to memory of 1904 2684 net.exe 48 PID 2684 wrote to memory of 1904 2684 net.exe 48 PID 2684 wrote to memory of 1904 2684 net.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\149e04816131f9668f98b07687cf29cb_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\geurge.exeC:\Users\Admin\AppData\Local\Temp\geurge.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\geurge.exe"C:\Users\Admin\AppData\Local\Temp\geurge.exe"4⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1688
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
PID:1880
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2980
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)4⤵
- System Location Discovery: System Language Discovery
PID:1904
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1268
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\tujserrew.bat""3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:596
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD564f6f2f9422163844104034765d46884
SHA1fcfd2baec96d892db505c6f170d8a388e33752aa
SHA25667a23887f77108d3c1af428253c42da36311236cf30c9d49ac478f3c5e278ce5
SHA512db6b8f6933a5fcf5f1354c8e7d388417d645f9f6a5b297536343c5ecbf9570397d6d7d949dbe9c74a08c62d71a206fde542cf3cfdac5ae0b6a5375f9e67cc71b
-
Filesize
432KB
MD5149e04816131f9668f98b07687cf29cb
SHA15d8a407a2f1d6a2b39a8fa46b8fe4bb5d32d8af6
SHA256c4f5fc94f2f95b483fea06e7ee5feb16adb31ef64aabef48193811bc890b3c06
SHA512dde897f5178043461918b3a680201327abdc033812d5495dea6a793538e62eaf8d6fb180dbc8183dc82555c88f3088cd197d90419367feedc0fc39a631c1fab4