Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 06:53
Static task
static1
Behavioral task
behavioral1
Sample
3e6980700305d1b7c913ae8d6fc3b979_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
3e6980700305d1b7c913ae8d6fc3b979_JaffaCakes118.exe
-
Size
625KB
-
MD5
3e6980700305d1b7c913ae8d6fc3b979
-
SHA1
82f6db2b98fa6b4bf856e4a7a7ccd4599d5dec47
-
SHA256
e396834c8072b90c9362cb14262b6cc79d9f87ddc85221ff307916fc4b9c2758
-
SHA512
27b01dd7e4054bf7f72e8bd18b20b46df2b330bbff587f929cd3e3805774cada77c65a9e6d1b904b5c81a8d4599a1eb6c49c9226fbc17f74d6ded97d7413f02f
-
SSDEEP
12288:ROsZ9i9C5hsmXIZaVG/DWI2ZHUCsJqWBbD3GFv26kV1c0:ROsZQCsjPbWRZ0CsQWBbDWBV0
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0007000000016cd3-15.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2764 TROJAN.EXE -
Loads dropped DLL 3 IoCs
pid Process 2636 3e6980700305d1b7c913ae8d6fc3b979_JaffaCakes118.exe 2636 3e6980700305d1b7c913ae8d6fc3b979_JaffaCakes118.exe 2764 TROJAN.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2764-22-0x0000000010000000-0x00000000100C2000-memory.dmp upx behavioral1/memory/2764-17-0x0000000010000000-0x00000000100C2000-memory.dmp upx behavioral1/files/0x0007000000016cd3-15.dat upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e6980700305d1b7c913ae8d6fc3b979_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TROJAN.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2740 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2740 WINWORD.EXE 2740 WINWORD.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2740 2636 3e6980700305d1b7c913ae8d6fc3b979_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2740 2636 3e6980700305d1b7c913ae8d6fc3b979_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2740 2636 3e6980700305d1b7c913ae8d6fc3b979_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2740 2636 3e6980700305d1b7c913ae8d6fc3b979_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2764 2636 3e6980700305d1b7c913ae8d6fc3b979_JaffaCakes118.exe 31 PID 2636 wrote to memory of 2764 2636 3e6980700305d1b7c913ae8d6fc3b979_JaffaCakes118.exe 31 PID 2636 wrote to memory of 2764 2636 3e6980700305d1b7c913ae8d6fc3b979_JaffaCakes118.exe 31 PID 2636 wrote to memory of 2764 2636 3e6980700305d1b7c913ae8d6fc3b979_JaffaCakes118.exe 31 PID 2740 wrote to memory of 476 2740 WINWORD.EXE 33 PID 2740 wrote to memory of 476 2740 WINWORD.EXE 33 PID 2740 wrote to memory of 476 2740 WINWORD.EXE 33 PID 2740 wrote to memory of 476 2740 WINWORD.EXE 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e6980700305d1b7c913ae8d6fc3b979_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e6980700305d1b7c913ae8d6fc3b979_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\test.docx"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:476
-
-
-
C:\Users\Admin\AppData\Local\Temp\TROJAN.EXE"C:\Users\Admin\AppData\Local\Temp\TROJAN.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5d1665779f9de2e9ac9114c8f64b19c8b
SHA131cd8e735f725e21e6a9acb6c11e585b04c7d084
SHA2563ac0cf430a0d459730b25ed92aec85c5535bd65e6a6ebe49ba1eab1396ce1bb4
SHA51210caff82d0f93519d3ae147589d6d7813ee2b3bf504486bfa614e6840dd9ba0f7578ba4324e2cb4a7a3b3fd739882b9d0673df1c6161d760338529f59dabb59b
-
Filesize
277KB
MD5b2a430d876a2c415c0c20999a589a234
SHA106f7fb5b23cbe72fd2007e12fb5bb138c45eee9a
SHA2563cca727b8aaf834476f066fc6c232bf7db98999f761904f8a25eaee15a262aea
SHA512ca1bcb6489099de9963ca79b1fc0976be73a875c276f8c4104519ed2201277aaa01c6374a4c9d3e96ab8b27cd237361d1be3587678ca34b1afcce6aeef11da16
-
Filesize
681KB
MD5e72ad1e3bdab7bf7e9be8d70d5135456
SHA136d9a3ca584f412ee472684a5e8c005e0eb6abb0
SHA25626a12b198a26b79a797697ba797443de69c230ab9ed563841fb6fccbccbdb7b3
SHA51208e06f88e01b7c9a5de7fbb1d5e0e897de0d50b08dc4e2e22a8839bd3d380745c9a87044a3296bc95f27a9506c7a175643985bbdcf0f83c8253db040721adeb5