Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe
-
Size
411KB
-
MD5
14dcad3685454f8e5b6d6a720d25c102
-
SHA1
4cf23d414d7af197a02cd6dd30b5906ecb418933
-
SHA256
dbc9781b741c15fc3d2e619f988dc4c6e8eb19bf03b364c52cba42e867d8390f
-
SHA512
f9afe584401910594d361fa6d8c785de093c61d62e6776a97cd55dfe96de99cdd34aa98b2f1c07180eb33e543ebfc5dc58f4a01d9e5598af1a4a574cd4df8471
-
SSDEEP
6144:9GK72mmVAG1TMpolwHuN2iopMCEMozuAg1A:9phRmIUwHuN2iobEMfVq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2008 1kmqLaNbtVRoNt.exe -
Executes dropped EXE 2 IoCs
pid Process 1968 1kmqLaNbtVRoNt.exe 2008 1kmqLaNbtVRoNt.exe -
Loads dropped DLL 5 IoCs
pid Process 2504 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 2504 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 2504 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 1968 1kmqLaNbtVRoNt.exe 2008 1kmqLaNbtVRoNt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zo8gQL8H9m5KPd = "C:\\ProgramData\\dFf9YMTvRLrwM\\1kmqLaNbtVRoNt.exe" 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2480 set thread context of 2504 2480 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 30 PID 1968 set thread context of 2008 1968 1kmqLaNbtVRoNt.exe 32 PID 2008 set thread context of 2012 2008 1kmqLaNbtVRoNt.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1kmqLaNbtVRoNt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1kmqLaNbtVRoNt.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2504 2480 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2504 2480 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2504 2480 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2504 2480 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2504 2480 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2504 2480 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 30 PID 2504 wrote to memory of 1968 2504 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 31 PID 2504 wrote to memory of 1968 2504 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 31 PID 2504 wrote to memory of 1968 2504 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 31 PID 2504 wrote to memory of 1968 2504 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 31 PID 1968 wrote to memory of 2008 1968 1kmqLaNbtVRoNt.exe 32 PID 1968 wrote to memory of 2008 1968 1kmqLaNbtVRoNt.exe 32 PID 1968 wrote to memory of 2008 1968 1kmqLaNbtVRoNt.exe 32 PID 1968 wrote to memory of 2008 1968 1kmqLaNbtVRoNt.exe 32 PID 1968 wrote to memory of 2008 1968 1kmqLaNbtVRoNt.exe 32 PID 1968 wrote to memory of 2008 1968 1kmqLaNbtVRoNt.exe 32 PID 2008 wrote to memory of 2012 2008 1kmqLaNbtVRoNt.exe 33 PID 2008 wrote to memory of 2012 2008 1kmqLaNbtVRoNt.exe 33 PID 2008 wrote to memory of 2012 2008 1kmqLaNbtVRoNt.exe 33 PID 2008 wrote to memory of 2012 2008 1kmqLaNbtVRoNt.exe 33 PID 2008 wrote to memory of 2012 2008 1kmqLaNbtVRoNt.exe 33 PID 2008 wrote to memory of 2012 2008 1kmqLaNbtVRoNt.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\ProgramData\dFf9YMTvRLrwM\1kmqLaNbtVRoNt.exe"C:\ProgramData\dFf9YMTvRLrwM\1kmqLaNbtVRoNt.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\ProgramData\dFf9YMTvRLrwM\1kmqLaNbtVRoNt.exe"C:\ProgramData\dFf9YMTvRLrwM\1kmqLaNbtVRoNt.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Common Files\microsoft shared\ink\mip.exe"C:\Program Files (x86)\Common Files\microsoft shared\ink\mip.exe" /i:20085⤵PID:2012
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD514dcad3685454f8e5b6d6a720d25c102
SHA14cf23d414d7af197a02cd6dd30b5906ecb418933
SHA256dbc9781b741c15fc3d2e619f988dc4c6e8eb19bf03b364c52cba42e867d8390f
SHA512f9afe584401910594d361fa6d8c785de093c61d62e6776a97cd55dfe96de99cdd34aa98b2f1c07180eb33e543ebfc5dc58f4a01d9e5598af1a4a574cd4df8471