Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 10:13
Behavioral task
behavioral1
Sample
2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe
-
Size
62KB
-
MD5
2f483a8a46ecda53c0b6ee21865aa368
-
SHA1
8d97ddc6050f98ffdcf4a7806354935eb5034b47
-
SHA256
e135dd0c8e04cfed36a4390b61900120b14e45f9eb4b4a5e7238189d298538b5
-
SHA512
a612c5a493da9ed95114ad0de1b00a81e1de3424c29c3e12df9b6f574d13a4327540d1155cf3af090c3abba5f2be4c39df4db51d4b9898c55320359e7bd748cd
-
SSDEEP
1536:vgz2AGSLu4gcby+19QcS/uzbxN2oToN/dLaHQfxyNfG4WZg:oKWLuhoy+bQz2zbioIFawfxIL6
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 472 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 1384 explorer.exe -
Loads dropped DLL 2 IoCs
pid Process 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2484-0-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2484-1-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2484-10-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/files/0x0009000000016e73-14.dat upx behavioral1/memory/2484-22-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/1384-24-0x0000000000400000-0x000000000042B000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CSC\explorer.exe 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe File opened for modification C:\Windows\CSC\explorer.exe 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2484 wrote to memory of 472 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 31 PID 2484 wrote to memory of 472 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 31 PID 2484 wrote to memory of 472 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 31 PID 2484 wrote to memory of 472 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 31 PID 2484 wrote to memory of 1384 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 33 PID 2484 wrote to memory of 1384 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 33 PID 2484 wrote to memory of 1384 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 33 PID 2484 wrote to memory of 1384 2484 2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f483a8a46ecda53c0b6ee21865aa368_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" firewall set allowedprogram program = "C:\Windows\CSC\explorer.exe" name = "Explorer" mode = ENABLE scope = ALL profile = ALL2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:472
-
-
C:\Windows\CSC\explorer.exe"C:\Windows\CSC\explorer.exe" C:\noexistfile.txt2⤵
- Executes dropped EXE
PID:1384
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD52f483a8a46ecda53c0b6ee21865aa368
SHA18d97ddc6050f98ffdcf4a7806354935eb5034b47
SHA256e135dd0c8e04cfed36a4390b61900120b14e45f9eb4b4a5e7238189d298538b5
SHA512a612c5a493da9ed95114ad0de1b00a81e1de3424c29c3e12df9b6f574d13a4327540d1155cf3af090c3abba5f2be4c39df4db51d4b9898c55320359e7bd748cd