Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
274699b5e9c5a072c2b29a02f13fe293_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
274699b5e9c5a072c2b29a02f13fe293_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
274699b5e9c5a072c2b29a02f13fe293_JaffaCakes118.exe
-
Size
210KB
-
MD5
274699b5e9c5a072c2b29a02f13fe293
-
SHA1
796a84672d4c72a4843355589538475c5ee01286
-
SHA256
e5068e92818242de815a4627eaee8475a730ba93219b50e07d88aa0ddf56171a
-
SHA512
0a62b39ed353b5c0c6555a11bfff33065849ef9edbcb666a521f5e542d41ec8b37a9c066d64168efd419e1983455ad9edf74df921af6c3312cfdc75f43e68548
-
SSDEEP
6144:YhrSF7WWSioxgzkfguZU4blKJgdHch2K+yRfZV:WrkWWLoxgz3uSomgR47+eX
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 2256 274699b5e9c5a072c2b29a02f13fe293_JaffaCakes118.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Metropolis = "rundll32.exe C:\\Windows\\system32\\sshnas21.dll,GetHandle" 274699b5e9c5a072c2b29a02f13fe293_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll 274699b5e9c5a072c2b29a02f13fe293_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 274699b5e9c5a072c2b29a02f13fe293_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2256 274699b5e9c5a072c2b29a02f13fe293_JaffaCakes118.exe 2256 274699b5e9c5a072c2b29a02f13fe293_JaffaCakes118.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2256 274699b5e9c5a072c2b29a02f13fe293_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2764 2256 274699b5e9c5a072c2b29a02f13fe293_JaffaCakes118.exe 29 PID 2256 wrote to memory of 2764 2256 274699b5e9c5a072c2b29a02f13fe293_JaffaCakes118.exe 29 PID 2256 wrote to memory of 2764 2256 274699b5e9c5a072c2b29a02f13fe293_JaffaCakes118.exe 29 PID 2256 wrote to memory of 2764 2256 274699b5e9c5a072c2b29a02f13fe293_JaffaCakes118.exe 29 PID 2256 wrote to memory of 2764 2256 274699b5e9c5a072c2b29a02f13fe293_JaffaCakes118.exe 29 PID 2256 wrote to memory of 2764 2256 274699b5e9c5a072c2b29a02f13fe293_JaffaCakes118.exe 29 PID 2256 wrote to memory of 2764 2256 274699b5e9c5a072c2b29a02f13fe293_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\274699b5e9c5a072c2b29a02f13fe293_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\274699b5e9c5a072c2b29a02f13fe293_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\sshnas21.dll,GetHandle2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
171KB
MD50f302d0e5f53a9c58cdaa62e80f901ad
SHA13e8710dce254a768b8d267cb91bf89eb8a21ce4a
SHA2563d2d9d357e31671fc8028250c5d37c9b13b25538cf8b9b67b64dc586a64a1666
SHA512de26e4c7c945e9b4160f7b3aa35de902fe03c219495e60c478f2126e5d8ab08789dba1b2f3fa3e956dd4a988ceea2c4dbf2713d682fe7b6808a46c7cfa60c08a