Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 14:32
Static task
static1
Behavioral task
behavioral1
Sample
3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe
-
Size
38KB
-
MD5
3a87f5d69988c13fa1994d61be888c69
-
SHA1
c49a05211b7e506a4ac37078b0e72a4c9560e628
-
SHA256
e015e7513c231d7cb71d37c0cd979ee752236e418f1420d504f99a894bf86837
-
SHA512
a6fb109327611206c9258493bc01457e5da3fad9f0df56f175474fae836255a105c5816f9284479c29ed2482ee6a11ab5d5b1b7d456a8591b6a138f2500c4359
-
SSDEEP
768:objqEFd8yMaZaqj+DQxHedPYy16QVWAGYqr55uuWN:Q/xauaE+2wxWJYMPuuk
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3024 BCSSync.exe 2776 BCSSync.exe -
Loads dropped DLL 3 IoCs
pid Process 2708 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe 2708 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe 3024 BCSSync.exe -
Unexpected DNS network traffic destination 10 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2096 set thread context of 2708 2096 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe 30 PID 3024 set thread context of 2776 3024 BCSSync.exe 32 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Fonts\3sqK6.com 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2708 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe 2776 BCSSync.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2708 2096 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2708 2096 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2708 2096 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2708 2096 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2708 2096 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2708 2096 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2708 2096 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2708 2096 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2708 2096 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe 30 PID 2708 wrote to memory of 3024 2708 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe 31 PID 2708 wrote to memory of 3024 2708 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe 31 PID 2708 wrote to memory of 3024 2708 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe 31 PID 2708 wrote to memory of 3024 2708 3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe 31 PID 3024 wrote to memory of 2776 3024 BCSSync.exe 32 PID 3024 wrote to memory of 2776 3024 BCSSync.exe 32 PID 3024 wrote to memory of 2776 3024 BCSSync.exe 32 PID 3024 wrote to memory of 2776 3024 BCSSync.exe 32 PID 3024 wrote to memory of 2776 3024 BCSSync.exe 32 PID 3024 wrote to memory of 2776 3024 BCSSync.exe 32 PID 3024 wrote to memory of 2776 3024 BCSSync.exe 32 PID 3024 wrote to memory of 2776 3024 BCSSync.exe 32 PID 3024 wrote to memory of 2776 3024 BCSSync.exe 32 PID 2776 wrote to memory of 2012 2776 BCSSync.exe 33 PID 2776 wrote to memory of 2012 2776 BCSSync.exe 33 PID 2776 wrote to memory of 2012 2776 BCSSync.exe 33 PID 2776 wrote to memory of 2012 2776 BCSSync.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\3a87f5d69988c13fa1994d61be888c69_JaffaCakes118.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2012
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD54ce8ff8a192047196ebe619e8e1c50b6
SHA117ff5d57992044dd9934989652cade7f7809af54
SHA2562afbaabefad649a65dfbcfb1d73a4b0ec9f630e4fcfde5c491be565cde9c8fc1
SHA512fb6a9fa8ae53372298e9dc657e9c463bb092a0d8ace9ade305d563072c5907d6dd38289b3e39e63b960eb1eaf71482ce56eed760e7e656b86792d13cc3f51482