Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 15:21
Static task
static1
Behavioral task
behavioral1
Sample
3abcd75bf7909d21771635e0cae1201c_JaffaCakes118.jad
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3abcd75bf7909d21771635e0cae1201c_JaffaCakes118.jad
Resource
win10v2004-20241007-en
General
-
Target
3abcd75bf7909d21771635e0cae1201c_JaffaCakes118.jad
-
Size
69KB
-
MD5
3abcd75bf7909d21771635e0cae1201c
-
SHA1
fc3d0d43b75577f40078bfcece36de26eeff1c07
-
SHA256
f12beac7a77cc21fee48430d298b54d645731927680f8b55c6fca589d509c7c3
-
SHA512
334506d1aae1684523fcfe2c6e5f095121ebbefe706eea2f630ed4fde7cb5f13e4dacc27e5e430f0553160fac0a14e14189bf29da5855fc7fca08d24f9fe38cd
-
SSDEEP
1536:pUo/CAWfIpc4tz4gGtW2insgvrGoZLGtW2insgvrGoZ5:pUopWfzqz4gZsArGWZsArGO
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2868 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2868 AcroRd32.exe 2868 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2452 2528 cmd.exe 31 PID 2528 wrote to memory of 2452 2528 cmd.exe 31 PID 2528 wrote to memory of 2452 2528 cmd.exe 31 PID 2452 wrote to memory of 2868 2452 rundll32.exe 32 PID 2452 wrote to memory of 2868 2452 rundll32.exe 32 PID 2452 wrote to memory of 2868 2452 rundll32.exe 32 PID 2452 wrote to memory of 2868 2452 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\3abcd75bf7909d21771635e0cae1201c_JaffaCakes118.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\3abcd75bf7909d21771635e0cae1201c_JaffaCakes118.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3abcd75bf7909d21771635e0cae1201c_JaffaCakes118.jad"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD513dd49180501883e885007da836aa9db
SHA1da1aa68c955224f9846bd07bc44dcf4da8863d37
SHA256b01ec051be981a9fb2d4cc2e44a589600655a860e818ed45040b61260c196943
SHA5124823a35e3e75d594d550e3b62fbdb641f2b4637b56879380c7a40ab51368e46f671451e1a5885896450a2c4d38fa138cd5615c2f8659773a884430915ebb4c29