Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 12:46
Behavioral task
behavioral1
Sample
3fee7f05762e521ecf41e1e02a5e4f26_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
3fee7f05762e521ecf41e1e02a5e4f26_JaffaCakes118.exe
-
Size
179KB
-
MD5
3fee7f05762e521ecf41e1e02a5e4f26
-
SHA1
3a4f5449ffe442b6ced6a32fa04859c19632dd06
-
SHA256
722fd905dc7cdb5c905bae00657f510834efb64e9baa0d0d3edd2e0442e9dd91
-
SHA512
df8110e74761a3825d1a0d7d52e99cc4db01ef11b6457d702003172760ac54546ad3bbf7c2f0e048d2ac84b56e102844c3d983bfadf6e1a16d32d6fbf76c4697
-
SSDEEP
3072:Vo/lri4GAA9LnsBrsDMAp87V4g6Duv6Thx9iw7xe1AqBRqNGuVfJExP:e8d8of8tv60seaqBRqNGsJEh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2248 winvnc.exe -
Loads dropped DLL 5 IoCs
pid Process 2372 3fee7f05762e521ecf41e1e02a5e4f26_JaffaCakes118.exe 2372 3fee7f05762e521ecf41e1e02a5e4f26_JaffaCakes118.exe 2248 winvnc.exe 2248 winvnc.exe 2248 winvnc.exe -
resource yara_rule behavioral1/memory/2372-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2372-33-0x0000000000400000-0x000000000041E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3fee7f05762e521ecf41e1e02a5e4f26_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winvnc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2248 2372 3fee7f05762e521ecf41e1e02a5e4f26_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2248 2372 3fee7f05762e521ecf41e1e02a5e4f26_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2248 2372 3fee7f05762e521ecf41e1e02a5e4f26_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2248 2372 3fee7f05762e521ecf41e1e02a5e4f26_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2248 2372 3fee7f05762e521ecf41e1e02a5e4f26_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2248 2372 3fee7f05762e521ecf41e1e02a5e4f26_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2248 2372 3fee7f05762e521ecf41e1e02a5e4f26_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fee7f05762e521ecf41e1e02a5e4f26_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3fee7f05762e521ecf41e1e02a5e4f26_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\7zSE743.tmp\winvnc.exe.\winvnc.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56ce6e5fcf1a56b80f4ffa6f685d4329d
SHA191780868c241e83754003855407805c0cda20254
SHA2566fcc92e281d25569d300297ef79a5796bc5e0c226aa35624dd6a9f38b8413402
SHA5127af21c8840f56c5ded22161504dd3d6c282ad83a0fb1f711fccfc7d87676de3036120e60e2c0e57fb998a0dcfe512950d3f16e0bdcb493d37a681f31b8cb399f
-
Filesize
2KB
MD576401ab893c3e8caa9ef0e441c8e3917
SHA1e76765dc80438db1a451f6d38f62636a6873a865
SHA256a3f2ca87f07600ea490b16700404c740266be0e55f1d9ac6c963c61c9d0113cf
SHA512194dec689f831f412bf17e96f7e647d44018275e0ed70b94395761b92807c3cd6b9d69f10c6d747e32953183c362d0c27f01cd8f90fa8b1021047f3c5ecf2494
-
Filesize
103KB
MD58af47af535611164352e880641d577ed
SHA1944e8a7a9fe359e096f6342b691d712d6e4fb91e
SHA256bdf0b4040e7fd4f08df05bb4ad7248cdc794fc4fa1cb8b306b6c838f3bf3d99f
SHA512b77981b3da4745590dc5b9bcc4e2e03165cd9501564984f7895612c01dffc0fb59c0d4cf7e1e291a597b5497cd4a504e885562b57c4b91a83d9c1064af4cbd44
-
Filesize
236KB
MD577de6bb7c680776fa67a5646072b7fed
SHA17f3c35d85c96ff903844feaf1aed010a34119c40
SHA25650831333c6ba49fc871ca20f4a4778119e24fb975912023fd4c8bfd72b45c191
SHA512c7e84578ac2ad87c4595496e695f66245910a446aaa54cc2540feed18a0cc6933d88570aa0280749e5ae8374f6643d20e98ca57f6ad437cc3dc6acf916a4bd5a