Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 02:15
Static task
static1
Behavioral task
behavioral1
Sample
3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe
-
Size
506KB
-
MD5
3d3e00fcc2f14a9e8ebb56b6c2d669cf
-
SHA1
2b83485a9356ba3a4e46a86e036e7bf6e9686f0a
-
SHA256
4d77a9fbd54d22aa9f144718e138964ab4e32b0d16e85fde4026b3182a15ebd0
-
SHA512
c5e521701351c203880b8aafc609ac9cb9e8f2798f895cfff43e1d160fe9e3bfa62823ec067773c05fa9d7d1b5c37309296113a756703ec2cc88c561798345b0
-
SSDEEP
12288:01GUsCOYBu9ORDI0jhaHdlgxrZt2QihmVH3OBzAz+4b:01GZlOZI0j89Y1cQpH+a+4b
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1464 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1464 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2484 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 7 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1464 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1800 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1464 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2484 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2484 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe 1464 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2484 wrote to memory of 1464 2484 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe 30 PID 2484 wrote to memory of 1464 2484 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe 30 PID 2484 wrote to memory of 1464 2484 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe 30 PID 2484 wrote to memory of 1464 2484 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe 30 PID 1464 wrote to memory of 1800 1464 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe 31 PID 1464 wrote to memory of 1800 1464 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe 31 PID 1464 wrote to memory of 1800 1464 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe 31 PID 1464 wrote to memory of 1800 1464 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe" /TN Google_Trk_Updater /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5bf8b2061c3ddfddc825b2c8816f2aee4
SHA1dcae0c1d11814a73cce88ba70ffe628a3697e2b7
SHA256586305973919ab98c05f6bdce484b3066ce12bafa9336b4db9834385b8c378ae
SHA512a1614213b0e84b73adfe4cf7a9bfd235cc7c2564dce16331b5c8cbcbef3246650f8a339030fa141c44dd8a6ce581f69bd812c10e22ca1b33fea786bbdb749827