Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 21:18
Behavioral task
behavioral1
Sample
14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
14f3b2a059c2efc4f7a9a63c95a5212a
-
SHA1
4c8d7c682b92f2170dd62ed16822151d3821f984
-
SHA256
0575d7e923398e2b2c7ee567b9217771f177ebf2cf97a3a8a3f088ed59e88484
-
SHA512
4f2b15b2d81a0eb97ae599c70387b20cbc092880ecaddf45bf0344f748718cecaae4c60284aa0ee92917cc106942002d95f3f585ef778777ec19488ea23ffccd
-
SSDEEP
24576:6XwnLf2QW/FoWp3HOEGH0CHSfnELCFIkG5OTEAHqqW:6XZxoWVuf0CHSfnE+Fr8zq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2176 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2176 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1712 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1712-2-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x00090000000120d6-12.dat upx behavioral1/memory/2176-15-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1712 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1712 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe 2176 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2176 1712 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe 28 PID 1712 wrote to memory of 2176 1712 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe 28 PID 1712 wrote to memory of 2176 1712 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe 28 PID 1712 wrote to memory of 2176 1712 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD56bd295c539b9041a7439f70b444170f3
SHA123bf4f8ad6c5955c3b524230386a8b3351777ece
SHA256c5f8acd04f2515e0067f61f8786dcf8fc15d0fbc55f55a82f7e0ebf706d3bd9a
SHA51256651bcf3db576613eb5e6e0fa70723c1952440f295f86aacd950ddda8b9a8711578390c3e2f161939702097a3640347f7fedf75d974e25b56af1b7367b7f598