Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe
-
Size
206KB
-
MD5
293f8f7cacddb3c34aed75bf23880006
-
SHA1
8a18563d7d4611b50a3e0f0b9c672e1e7a927bc6
-
SHA256
6d9c4ee598caf7761ac3ffe0af646a8f286c38a92a4d73448671e8291afc0b05
-
SHA512
6fedba46d76e903b58c9a0773d4086c2a7d6f515509865d66d98d2997e2610b690f3163826da9c260c0573b792c4fe5f27aa2dcb951d1b6a5ef5630eb18b378e
-
SSDEEP
6144:QOE0uuVK9uzOLapTiFVfJ/QiNdND1Wk4bH:u0fRoFVR/QiLvW7
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 808 293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Metropolis = "rundll32.exe C:\\Windows\\system32\\sshnas21.dll,GetHandle" 293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll 293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 808 293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe 808 293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 808 293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 808 wrote to memory of 2132 808 293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe 30 PID 808 wrote to memory of 2132 808 293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe 30 PID 808 wrote to memory of 2132 808 293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe 30 PID 808 wrote to memory of 2132 808 293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe 30 PID 808 wrote to memory of 2132 808 293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe 30 PID 808 wrote to memory of 2132 808 293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe 30 PID 808 wrote to memory of 2132 808 293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\sshnas21.dll,GetHandle2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5309fc7d3bc53bb63ac42e359260ac740
SHA12064f80f811db79a33c4e51c10221454e30c74ae
SHA256ac11339ffa8f270c4f781e0a3922bb1c80d9dee6e4b6911ca34538ed9ae03caa
SHA51277dd27d30f4e13a0bcd6fd27ae7567c136d87393e5ee632bccf05b0a0d2bbcc2fc0fd777a8508e26cc4fc579c8da0ab56b7bf179b1adc70f28f7d0eee89fa5f8
-
Filesize
172KB
MD55310ca2844c48f732cebc827ca628386
SHA117f85e667cd7adde48622bf806177059f3444ea7
SHA256440bd761aceb9f7a98be43da61b5d35d7dcb42e787e5cb178d4f9f32449d0391
SHA51252604893f0f347c3c655e51d9955da58d480128859cc98d39baf1894f28baca233875f2d151fbe2d35a0bac9c1b5b6f46ce7cb0e6c0bd35638eb98a3c7196a40