Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/10/2024, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe
-
Size
97KB
-
MD5
374233e7322071a22486cdbaffbcb6d4
-
SHA1
a09dad6765cfbe0021ba3a1f040431be6f02d214
-
SHA256
e6f28175ba508818aac93c59b56a932623b289d3ef4de600d048829b0a7fa04a
-
SHA512
e41d134e6a6c8ab7775ca7d9c219952cf5ab0d29aebc6278009d08474a01a67795079f1528085455625be881a46b6def7fa16e1937188243b10158424f4f6a25
-
SSDEEP
3072:6Sq579Zdq8ohVr4KVSgyL2bkf7Nf5MBzLVpagMR3H40BHHw+ZH/CzVvqhLxYF:3fT7HYMBzLVpagMR3H40BHHw+ZH/8Vvv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2816 cmd.exe -
Executes dropped EXE 4 IoCs
pid Process 2808 winamp.exe 292 algs.exe 2092 csrs.exe 1228 lssas.exe -
Loads dropped DLL 8 IoCs
pid Process 2276 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe 2276 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe 2808 winamp.exe 2808 winamp.exe 292 algs.exe 292 algs.exe 2092 csrs.exe 2092 csrs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows DLL Loader = "C:\\Windows\\system32\\lssas.exe" lssas.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\qwukzak.bat csrs.exe File created C:\Windows\SysWOW64\lssas.exe lssas.exe File created C:\Windows\SysWOW64\winamp.exe 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\winamp.exe 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe File created C:\Windows\SysWOW64\owtjvm.bat winamp.exe File created C:\Windows\SysWOW64\csrs.exe algs.exe File created C:\Windows\SysWOW64\wdmmjqy.bat algs.exe File opened for modification C:\Windows\SysWOW64\lssas.exe csrs.exe File created C:\Windows\SysWOW64\algs.exe winamp.exe File opened for modification C:\Windows\SysWOW64\algs.exe winamp.exe File opened for modification C:\Windows\SysWOW64\csrs.exe algs.exe File created C:\Windows\SysWOW64\lssas.exe csrs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winamp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lssas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language algs.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2816 2276 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe 30 PID 2276 wrote to memory of 2816 2276 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe 30 PID 2276 wrote to memory of 2816 2276 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe 30 PID 2276 wrote to memory of 2816 2276 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe 30 PID 2276 wrote to memory of 2808 2276 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe 32 PID 2276 wrote to memory of 2808 2276 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe 32 PID 2276 wrote to memory of 2808 2276 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe 32 PID 2276 wrote to memory of 2808 2276 374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe 32 PID 2808 wrote to memory of 2604 2808 winamp.exe 33 PID 2808 wrote to memory of 2604 2808 winamp.exe 33 PID 2808 wrote to memory of 2604 2808 winamp.exe 33 PID 2808 wrote to memory of 2604 2808 winamp.exe 33 PID 2808 wrote to memory of 292 2808 winamp.exe 35 PID 2808 wrote to memory of 292 2808 winamp.exe 35 PID 2808 wrote to memory of 292 2808 winamp.exe 35 PID 2808 wrote to memory of 292 2808 winamp.exe 35 PID 292 wrote to memory of 2244 292 algs.exe 36 PID 292 wrote to memory of 2244 292 algs.exe 36 PID 292 wrote to memory of 2244 292 algs.exe 36 PID 292 wrote to memory of 2244 292 algs.exe 36 PID 292 wrote to memory of 2092 292 algs.exe 38 PID 292 wrote to memory of 2092 292 algs.exe 38 PID 292 wrote to memory of 2092 292 algs.exe 38 PID 292 wrote to memory of 2092 292 algs.exe 38 PID 2092 wrote to memory of 1704 2092 csrs.exe 39 PID 2092 wrote to memory of 1704 2092 csrs.exe 39 PID 2092 wrote to memory of 1704 2092 csrs.exe 39 PID 2092 wrote to memory of 1704 2092 csrs.exe 39 PID 2092 wrote to memory of 1228 2092 csrs.exe 41 PID 2092 wrote to memory of 1228 2092 csrs.exe 41 PID 2092 wrote to memory of 1228 2092 csrs.exe 41 PID 2092 wrote to memory of 1228 2092 csrs.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\374233e7322071a22486cdbaffbcb6d4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\dlcplmo.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Windows\SysWOW64\winamp.exeC:\Windows\system32\winamp.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\SysWOW64\owtjvm.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2604
-
-
C:\Windows\SysWOW64\algs.exeC:\Windows\system32\algs.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\SysWOW64\wdmmjqy.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:2244
-
-
C:\Windows\SysWOW64\csrs.exeC:\Windows\system32\csrs.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\SysWOW64\qwukzak.bat" "5⤵
- System Location Discovery: System Language Discovery
PID:1704
-
-
C:\Windows\SysWOW64\lssas.exeC:\Windows\system32\lssas.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1228
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243B
MD5021796d58c92d2ccdf1393f948ac0449
SHA1f776ae49f3a8906b61ee40f2a2be41cb439f0c9b
SHA2562be98c4cca07ef1845e11cfaf6fdac498ea95c655de86e590ddaa2ee679df9d0
SHA512c4f222b6e15b74930d271f357bd1c2841d12bd8f52ef231bb4cd55ffe1f45de6b2155ff943b7fb82b32eb991aefa23ee208772a05aa5293f27605a76e06596d6
-
Filesize
122B
MD576875d8604accdcc8a0d0490ace2ea93
SHA169354364cdb904e7c7a10c577df484d5f49713d6
SHA2564aaed41dfbb158913412542873cd8af1a32648731e89fdf9420b49221216bc2c
SHA512d59ee287b2fb9dfdb50538cd15d0e6ad105b288f7d1a4d5a7bc6ccd7ef1b6bfe1a8cdf3b7f0881d5db4ec46bbde72cba66ee6b626dd4faa7ffe24f8b61eaee7b
-
Filesize
117B
MD50471e45044ee9be07085491851a19830
SHA1464c09b3ead13143817229b2e98e4eff74471d07
SHA2563e9bd03f9c76ae5c5c357c004d0f86f0314c4b238718871782fc904f4ad2aeba
SHA51207947713f82c1d8e2404153e0b8349aa5763cb6f226b03f7f001353760b5b0e1ecd1d03175f898d1c078a000546d7f6dcdda9f04065e0e40f77b224cf40b0cb3
-
Filesize
117B
MD5f5f39d1e1b4d716a3b7b900387ed7d3e
SHA1aa0a480694ca6f21b5774d7d83621ad7727c1f5c
SHA25655a1958a1cabbbe260df485c464d4ef2c8e8f079b69d20d44e138302fc7619ad
SHA512d36f698f431531c4bd312bb9ff8cb6f739fca9281e61cd884a85449ef64c45bba6a2f268b9b646d5b971df8b0bde23eff4786c7392453d1e817fbe1a5686c30a
-
Filesize
97KB
MD5374233e7322071a22486cdbaffbcb6d4
SHA1a09dad6765cfbe0021ba3a1f040431be6f02d214
SHA256e6f28175ba508818aac93c59b56a932623b289d3ef4de600d048829b0a7fa04a
SHA512e41d134e6a6c8ab7775ca7d9c219952cf5ab0d29aebc6278009d08474a01a67795079f1528085455625be881a46b6def7fa16e1937188243b10158424f4f6a25