Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 17:12
Static task
static1
Behavioral task
behavioral1
Sample
4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe
-
Size
191KB
-
MD5
4114fb6bc2ba49dd5af753063e888f35
-
SHA1
884fccf4f3c9e0fb966619ed2b2da5a463fb9284
-
SHA256
739e8e424e8a3bf082fdca40207caaf67cc3b1d76b41744902b8142497a3c56b
-
SHA512
9e04e9d579624181eda5c055f448ec68286bc22ef8ffcc715b1f3f9a3622b83adee6da478a924723f5c5fa8aafc89b55eba3de6f4e634f2761cbcb81c9040622
-
SSDEEP
3072:22j0wLl/EC8sW89i+6X367jtTgFhN7IrwsBcxeXBYcxfW9ask+hfebTtqEos8U4j:22j0cl8C8sWj+6X36vtTEN7QL51GasVj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2308 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2800 comaa.exe -
Loads dropped DLL 2 IoCs
pid Process 1016 4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe 1016 4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\{452B335F-1C7F-F843-A4FA-4B4F1ABE52BA} = "C:\\Users\\Admin\\AppData\\Roaming\\Ylafi\\comaa.exe" comaa.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1016 set thread context of 2308 1016 4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Privacy 4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe 2800 comaa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 1016 4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1016 wrote to memory of 2800 1016 4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe 30 PID 1016 wrote to memory of 2800 1016 4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe 30 PID 1016 wrote to memory of 2800 1016 4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe 30 PID 1016 wrote to memory of 2800 1016 4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe 30 PID 2800 wrote to memory of 1044 2800 comaa.exe 17 PID 2800 wrote to memory of 1044 2800 comaa.exe 17 PID 2800 wrote to memory of 1044 2800 comaa.exe 17 PID 2800 wrote to memory of 1044 2800 comaa.exe 17 PID 2800 wrote to memory of 1044 2800 comaa.exe 17 PID 2800 wrote to memory of 1068 2800 comaa.exe 18 PID 2800 wrote to memory of 1068 2800 comaa.exe 18 PID 2800 wrote to memory of 1068 2800 comaa.exe 18 PID 2800 wrote to memory of 1068 2800 comaa.exe 18 PID 2800 wrote to memory of 1068 2800 comaa.exe 18 PID 2800 wrote to memory of 1128 2800 comaa.exe 20 PID 2800 wrote to memory of 1128 2800 comaa.exe 20 PID 2800 wrote to memory of 1128 2800 comaa.exe 20 PID 2800 wrote to memory of 1128 2800 comaa.exe 20 PID 2800 wrote to memory of 1128 2800 comaa.exe 20 PID 2800 wrote to memory of 2004 2800 comaa.exe 23 PID 2800 wrote to memory of 2004 2800 comaa.exe 23 PID 2800 wrote to memory of 2004 2800 comaa.exe 23 PID 2800 wrote to memory of 2004 2800 comaa.exe 23 PID 2800 wrote to memory of 2004 2800 comaa.exe 23 PID 2800 wrote to memory of 1016 2800 comaa.exe 29 PID 2800 wrote to memory of 1016 2800 comaa.exe 29 PID 2800 wrote to memory of 1016 2800 comaa.exe 29 PID 2800 wrote to memory of 1016 2800 comaa.exe 29 PID 2800 wrote to memory of 1016 2800 comaa.exe 29 PID 1016 wrote to memory of 2308 1016 4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe 31 PID 1016 wrote to memory of 2308 1016 4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe 31 PID 1016 wrote to memory of 2308 1016 4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe 31 PID 1016 wrote to memory of 2308 1016 4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe 31 PID 1016 wrote to memory of 2308 1016 4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe 31 PID 1016 wrote to memory of 2308 1016 4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe 31 PID 1016 wrote to memory of 2308 1016 4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe 31 PID 1016 wrote to memory of 2308 1016 4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe 31 PID 1016 wrote to memory of 2308 1016 4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1044
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1068
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4114fb6bc2ba49dd5af753063e888f35_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Roaming\Ylafi\comaa.exe"C:\Users\Admin\AppData\Roaming\Ylafi\comaa.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2800
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc63b9126.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2308
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD575968b567152da4d6dd3c48332a3beb3
SHA14b9eb77b2cfec76aa1db85e5659a37aecef59058
SHA256e0ba322c142f0d98f6bfd8d823cafd1618da4e416195205e332509907b34c0f7
SHA5121b223ff5db49a3e4db03d4863024e8e9ee81347362e75e817b419a34b9c6578eff08d4df72c7e6ee01affb0a8749139af118ce7bebadc35cf3d47ac260078f94
-
Filesize
191KB
MD571e15c2ed06fdf39f37aac3aa9b320fb
SHA1ca4e6053b9d37b3a7920bf6ebb844c5cb232bb54
SHA2563d71865c7321c4b94f481bea201233320c951e726c6f4950dfbca1c732cbcc63
SHA5121c72064951053fc752d21910461f898c6db6144b8032e20bb60dd82ba7484e473d5f1b8900fe3c835eb3c59b10bc8a936ac983144219d9b7dfc67462a172d573