Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/10/2024, 21:02
Static task
static1
Behavioral task
behavioral1
Sample
36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe
-
Size
178KB
-
MD5
36ca871f262c0a36429566696846f7c3
-
SHA1
9a06a82761bab7626f22f6d359de0f0bc7d8110d
-
SHA256
c552cd046602c1e054292a72ecfe9c3a201952800d9fc3b0b652ab610f059cbe
-
SHA512
147fb030beb80a9d5a3e9ecdd28722275f7d31467070dc411423363ee7a28f170aef388345d6a6af5a7a38b25414ae434b08e52be375d1551f0ad8647d4029ee
-
SSDEEP
3072:u0Gox2PD7tC6PNIk/WqGIvMEhc+5n6CdJK8GcBHNmjoH90DGzhQ:6ogPxWqGU/n6CbzGcBIMHIGl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2136 Jmofia.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\TJHTHX1O7X = "C:\\Windows\\Jmofia.exe" Jmofia.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe File created C:\Windows\Jmofia.exe 36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe File opened for modification C:\Windows\Jmofia.exe 36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jmofia.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main Jmofia.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International Jmofia.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe 2136 Jmofia.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2136 2212 36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe 31 PID 2212 wrote to memory of 2136 2212 36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe 31 PID 2212 wrote to memory of 2136 2212 36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe 31 PID 2212 wrote to memory of 2136 2212 36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe 31 PID 2212 wrote to memory of 2136 2212 36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe 31 PID 2212 wrote to memory of 2136 2212 36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe 31 PID 2212 wrote to memory of 2136 2212 36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\Jmofia.exeC:\Windows\Jmofia.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD536ca871f262c0a36429566696846f7c3
SHA19a06a82761bab7626f22f6d359de0f0bc7d8110d
SHA256c552cd046602c1e054292a72ecfe9c3a201952800d9fc3b0b652ab610f059cbe
SHA512147fb030beb80a9d5a3e9ecdd28722275f7d31467070dc411423363ee7a28f170aef388345d6a6af5a7a38b25414ae434b08e52be375d1551f0ad8647d4029ee
-
Filesize
372B
MD58f012d08055c462a1b7a9946f1277099
SHA1575df0f7da3dda1d3b9f0756e4f3964e3399ca14
SHA256dc55cf8f900e82db2d28d4d5f14944bc3c9544024a4a8d7465a082902b6b5fa2
SHA512193ccabebbf965ecc975e9e60ed81569753da1448b7e06ca18d2f524e9ba59759ed21150aaf0e1a1599f369e6e7dd486b236509274ec8665dd93d59dd973247f