Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 04:56
Static task
static1
Behavioral task
behavioral1
Sample
163e8df577ef8722e408912466367f50_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
163e8df577ef8722e408912466367f50_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
163e8df577ef8722e408912466367f50_JaffaCakes118.exe
-
Size
514KB
-
MD5
163e8df577ef8722e408912466367f50
-
SHA1
9df6fd0508a900bbf6213b4b0529ad7b2a84bfe7
-
SHA256
2fd7ba0ea36b5087c441662ba65f8c0fce99e8881df66223bddf147ed6fe2440
-
SHA512
e024a5a1431d0c3a44c1d89910ad793dd4c2c6b048c300028bd7b997153dcf54246ad7bdac78806b0015631380d4c153486f58b7d76f7eb1370995cff6651fda
-
SSDEEP
6144:st9sTEcg7/EpK3ee4wgv3KN+xIISYswjAel0bQz9iRSZkB3Ju/H:s6Dg7cnwgv3xxdhYoZklJuP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2788 mr65QaGEhBVuGj.exe -
Executes dropped EXE 2 IoCs
pid Process 2680 mr65QaGEhBVuGj.exe 2788 mr65QaGEhBVuGj.exe -
Loads dropped DLL 5 IoCs
pid Process 1860 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 1860 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 1860 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 2680 mr65QaGEhBVuGj.exe 2788 mr65QaGEhBVuGj.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\6SLn8aYQevyMu18F = "C:\\ProgramData\\Bw053qOB12GKwvJG\\mr65QaGEhBVuGj.exe" 163e8df577ef8722e408912466367f50_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1420 set thread context of 1860 1420 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 30 PID 2680 set thread context of 2788 2680 mr65QaGEhBVuGj.exe 32 PID 2788 set thread context of 2560 2788 mr65QaGEhBVuGj.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mr65QaGEhBVuGj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 163e8df577ef8722e408912466367f50_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 163e8df577ef8722e408912466367f50_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mr65QaGEhBVuGj.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1420 wrote to memory of 1860 1420 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 30 PID 1420 wrote to memory of 1860 1420 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 30 PID 1420 wrote to memory of 1860 1420 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 30 PID 1420 wrote to memory of 1860 1420 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 30 PID 1420 wrote to memory of 1860 1420 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 30 PID 1420 wrote to memory of 1860 1420 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 30 PID 1860 wrote to memory of 2680 1860 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 31 PID 1860 wrote to memory of 2680 1860 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 31 PID 1860 wrote to memory of 2680 1860 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 31 PID 1860 wrote to memory of 2680 1860 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 31 PID 2680 wrote to memory of 2788 2680 mr65QaGEhBVuGj.exe 32 PID 2680 wrote to memory of 2788 2680 mr65QaGEhBVuGj.exe 32 PID 2680 wrote to memory of 2788 2680 mr65QaGEhBVuGj.exe 32 PID 2680 wrote to memory of 2788 2680 mr65QaGEhBVuGj.exe 32 PID 2680 wrote to memory of 2788 2680 mr65QaGEhBVuGj.exe 32 PID 2680 wrote to memory of 2788 2680 mr65QaGEhBVuGj.exe 32 PID 2788 wrote to memory of 2560 2788 mr65QaGEhBVuGj.exe 33 PID 2788 wrote to memory of 2560 2788 mr65QaGEhBVuGj.exe 33 PID 2788 wrote to memory of 2560 2788 mr65QaGEhBVuGj.exe 33 PID 2788 wrote to memory of 2560 2788 mr65QaGEhBVuGj.exe 33 PID 2788 wrote to memory of 2560 2788 mr65QaGEhBVuGj.exe 33 PID 2788 wrote to memory of 2560 2788 mr65QaGEhBVuGj.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\163e8df577ef8722e408912466367f50_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\163e8df577ef8722e408912466367f50_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\163e8df577ef8722e408912466367f50_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\163e8df577ef8722e408912466367f50_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\ProgramData\Bw053qOB12GKwvJG\mr65QaGEhBVuGj.exe"C:\ProgramData\Bw053qOB12GKwvJG\mr65QaGEhBVuGj.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\ProgramData\Bw053qOB12GKwvJG\mr65QaGEhBVuGj.exe"C:\ProgramData\Bw053qOB12GKwvJG\mr65QaGEhBVuGj.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files (x86)\Windows Mail\wab.exe"C:\Program Files (x86)\Windows Mail\wab.exe" /i:27885⤵PID:2560
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
514KB
MD5163e8df577ef8722e408912466367f50
SHA19df6fd0508a900bbf6213b4b0529ad7b2a84bfe7
SHA2562fd7ba0ea36b5087c441662ba65f8c0fce99e8881df66223bddf147ed6fe2440
SHA512e024a5a1431d0c3a44c1d89910ad793dd4c2c6b048c300028bd7b997153dcf54246ad7bdac78806b0015631380d4c153486f58b7d76f7eb1370995cff6651fda