Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 03:03
Static task
static1
Behavioral task
behavioral1
Sample
29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe
-
Size
672KB
-
MD5
29aa9c4be6616e48f041f9f81dedb75e
-
SHA1
4aa2643ae02f690c9b6220f422927d0956a4914c
-
SHA256
0176bb4179cbc06415449611666ee9035bcc564a554d449f5404363a05bfdfbb
-
SHA512
e911d3652e8e4dc55ecd625e8f589833d5a2f51b91f90374ce96dd4caf9ff76f6c2b3cdaab7896d9fa213f9d4d440505c1d292c5c1f2e163423026e822e2148a
-
SSDEEP
12288:8kQ4PIcBqHybSce3dhPq5nd+qsT1Z7LrA2rItSaItS/:85QIzHyuhiDyrProSaoS/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1728 ¼¦¸ç¸ßÊÖ¼üλ±ä»»(ÐÂÊÖÎóÓÃ).exe 2536 ÐÂ!¸ßÊÖ¼üλ±ä»».exe -
Loads dropped DLL 8 IoCs
pid Process 2552 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 2552 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 2536 ÐÂ!¸ßÊÖ¼üλ±ä»».exe 1728 ¼¦¸ç¸ßÊÖ¼üλ±ä»»(ÐÂÊÖÎóÓÃ).exe 1728 ¼¦¸ç¸ßÊÖ¼üλ±ä»»(ÐÂÊÖÎóÓÃ).exe 1728 ¼¦¸ç¸ßÊÖ¼üλ±ä»»(ÐÂÊÖÎóÓÃ).exe 2536 ÐÂ!¸ßÊÖ¼üλ±ä»».exe 2536 ÐÂ!¸ßÊÖ¼üλ±ä»».exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: ¼¦¸ç¸ßÊÖ¼üλ±ä»»(ÐÂÊÖÎóÓÃ).exe -
resource yara_rule behavioral1/files/0x000c00000001225f-3.dat upx behavioral1/memory/1728-9-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/files/0x0008000000015fe0-6.dat upx behavioral1/memory/2536-18-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2552-17-0x00000000033E0000-0x0000000003404000-memory.dmp upx behavioral1/memory/2536-27-0x0000000000240000-0x0000000000264000-memory.dmp upx behavioral1/memory/1728-29-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2536-30-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/1728-31-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2536-32-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/1728-33-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2536-34-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2536-35-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2536-36-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2536-37-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2536-38-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2536-39-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2536-40-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2536-41-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2536-42-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2536-43-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2536-44-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2536-45-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2536-46-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ¼¦¸ç¸ßÊÖ¼üλ±ä»»(ÐÂÊÖÎóÓÃ).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÐÂ!¸ßÊÖ¼üλ±ä»».exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2536 ÐÂ!¸ßÊÖ¼üλ±ä»».exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2552 wrote to memory of 1728 2552 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 30 PID 2552 wrote to memory of 1728 2552 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 30 PID 2552 wrote to memory of 1728 2552 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 30 PID 2552 wrote to memory of 1728 2552 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 30 PID 2552 wrote to memory of 1728 2552 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 30 PID 2552 wrote to memory of 1728 2552 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 30 PID 2552 wrote to memory of 1728 2552 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2536 2552 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2536 2552 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2536 2552 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2536 2552 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2536 2552 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2536 2552 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2536 2552 29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29aa9c4be6616e48f041f9f81dedb75e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\¼¦¸ç¸ßÊÖ¼üλ±ä»»(ÐÂÊÖÎóÓÃ).exe"C:\Users\Admin\AppData\Local\Temp\¼¦¸ç¸ßÊÖ¼üλ±ä»»(ÐÂÊÖÎóÓÃ).exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\ÐÂ!¸ßÊÖ¼üλ±ä»».exe"C:\Users\Admin\AppData\Local\Temp\ÐÂ!¸ßÊÖ¼üλ±ä»».exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5069fa268827d3ee36d680a606c5a7da3
SHA1d63c6761615d64ac6c0d5f7368716ae22cbf8024
SHA2563d3bd4691ae6596d7e5eb46857417cf70a74a07a3cc10583eccadeb4cd3595fd
SHA5124dea24f3d2d4692fab4714991a70fb37f5bcab80578ceeff107b9a1b4646c22465be099144576980acde529840f13dec6c09f1d2c65c36c7ada6fd6ec67a060d
-
Filesize
53KB
MD57577313a4d641886e0ad54ebbcdcabcb
SHA18dfc408292357397130b6f5950a49ebac6ffb568
SHA2566cc49a1ab3c9553d81d0056e875776389e5c052fa9fbe202be1ad3e0980c7d0e
SHA512386ae7f42f13d953c9103d2eac8aee381efac341b3f4241f35429f5d68651adfb6803e01512c067dfbb288957caa1cf6b3346e85f8b7b37ed09bfaed30df0cb8