Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
4124f08ada2997785165fe5dd79cbfd5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4124f08ada2997785165fe5dd79cbfd5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4124f08ada2997785165fe5dd79cbfd5_JaffaCakes118.exe
-
Size
832KB
-
MD5
4124f08ada2997785165fe5dd79cbfd5
-
SHA1
46365c4b4c39f5c61bd836110a9611191202710f
-
SHA256
ffaff723e0328f731900183d4deb969c80e8a16c8a0415f6868a3c443461b147
-
SHA512
6d9906d4e711d8d8ac628f742f52f46d864a65f84376f22d3cecdb5cae82f38fa06f0f48f77657db04142acc5e1ec263de7aaf7d0fc381b5034adcccf46fb7b3
-
SSDEEP
12288:7/eTy90H6keXex5ViA64mm1z5i1a0ZVJFk/oDAfLtso7lE+eI7wPT:Sy+6rXeHTP11saWFkwDAfLDlEww7
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0007000000016c84-61.dat acprotect -
Executes dropped EXE 3 IoCs
pid Process 2976 1.exe 2520 explorer.exe 2996 setup.exe -
Loads dropped DLL 10 IoCs
pid Process 2032 4124f08ada2997785165fe5dd79cbfd5_JaffaCakes118.exe 2032 4124f08ada2997785165fe5dd79cbfd5_JaffaCakes118.exe 2976 1.exe 2976 1.exe 2032 4124f08ada2997785165fe5dd79cbfd5_JaffaCakes118.exe 2996 setup.exe 2996 setup.exe 2996 setup.exe 2996 setup.exe 2996 setup.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4124f08ada2997785165fe5dd79cbfd5_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2976 set thread context of 2520 2976 1.exe 31 -
resource yara_rule behavioral1/files/0x0008000000016855-47.dat upx behavioral1/memory/2032-49-0x00000000003B0000-0x00000000004E3000-memory.dmp upx behavioral1/memory/2996-52-0x0000000000400000-0x0000000000533000-memory.dmp upx behavioral1/memory/2996-64-0x00000000741B0000-0x0000000074262000-memory.dmp upx behavioral1/files/0x0007000000016c84-61.dat upx behavioral1/memory/2996-68-0x0000000000400000-0x0000000000533000-memory.dmp upx behavioral1/memory/2996-75-0x00000000741B0000-0x0000000074262000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4124f08ada2997785165fe5dd79cbfd5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2520 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2976 2032 4124f08ada2997785165fe5dd79cbfd5_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2976 2032 4124f08ada2997785165fe5dd79cbfd5_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2976 2032 4124f08ada2997785165fe5dd79cbfd5_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2976 2032 4124f08ada2997785165fe5dd79cbfd5_JaffaCakes118.exe 30 PID 2976 wrote to memory of 2520 2976 1.exe 31 PID 2976 wrote to memory of 2520 2976 1.exe 31 PID 2976 wrote to memory of 2520 2976 1.exe 31 PID 2976 wrote to memory of 2520 2976 1.exe 31 PID 2976 wrote to memory of 2520 2976 1.exe 31 PID 2976 wrote to memory of 2520 2976 1.exe 31 PID 2976 wrote to memory of 2520 2976 1.exe 31 PID 2976 wrote to memory of 2520 2976 1.exe 31 PID 2976 wrote to memory of 2520 2976 1.exe 31 PID 2976 wrote to memory of 2520 2976 1.exe 31 PID 2032 wrote to memory of 2996 2032 4124f08ada2997785165fe5dd79cbfd5_JaffaCakes118.exe 32 PID 2032 wrote to memory of 2996 2032 4124f08ada2997785165fe5dd79cbfd5_JaffaCakes118.exe 32 PID 2032 wrote to memory of 2996 2032 4124f08ada2997785165fe5dd79cbfd5_JaffaCakes118.exe 32 PID 2032 wrote to memory of 2996 2032 4124f08ada2997785165fe5dd79cbfd5_JaffaCakes118.exe 32 PID 2032 wrote to memory of 2996 2032 4124f08ada2997785165fe5dd79cbfd5_JaffaCakes118.exe 32 PID 2032 wrote to memory of 2996 2032 4124f08ada2997785165fe5dd79cbfd5_JaffaCakes118.exe 32 PID 2032 wrote to memory of 2996 2032 4124f08ada2997785165fe5dd79cbfd5_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4124f08ada2997785165fe5dd79cbfd5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4124f08ada2997785165fe5dd79cbfd5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\ProgramData\explorer.exeC:\ProgramData\explorer.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2520
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD536c689700adbb227867e409938607270
SHA16123e236f73faa37600a60107a5b167980b83a61
SHA256a2158014ecd471868954d0e97397f9df43e310c48d56fa0b5a6ef908dc654adf
SHA512c75728ed30135032a6755e33b9034b98c871554c33a4b8ba1586e0b3282dbc65e3b61571d407365b24289dae2de56b514ef0db744f85e6648dc6432a33b85fef
-
Filesize
125KB
MD5c784f0df30f54b2ad6b9b76523eb8469
SHA1f6f76566eb74aa2bb3625b51e4b02f2cc2b09f0c
SHA2566f43a63a339af715cd6c8207de5032594941c66014bc753163ba5e67bce51892
SHA512329d52c4c093d9bc30a51f4be79558ae23af34bcb58438b308c4e7e8db5d409e5dfc1baa8c6f1bd62ebb0bdfe38635d9e0300029b05c9701f1e461123fee7d5d
-
Filesize
48KB
MD5eef4df0d99bb7d081a5bab6f83771000
SHA1be144194db6ba573bddd9adde8a573fb53521e6f
SHA25674f37adb97e1c3230e0a9bea5bebcea7bc5a828b2b1e9d6824b86ee20d85b86d
SHA5126b305408a8b5b2fc85bcafbad4405ebe34f7e4b019d8e52a1e565cb72cbfa6c122113f49e32905dd595fa5c2a86108e3a5f38003c89dd5543d08f6693c418595
-
Filesize
344KB
MD57bcbd46e170308b8d3be9a1aa122b3b5
SHA129c85db9000f37cbd383dcd61b3ead179a47eae6
SHA256ba63b127b8c31ccf7d1de12c913b1fc76812c421a35b0abfa12f2a5056670897
SHA51229fe1d963870af59b818592dcb62a5395ade7a11270b9108a6e9baf06a0bb8a9a17bde4fa38e3cd97a1a3771dd981cb63203eb766006ed8666a3216a0afebf19
-
Filesize
537KB
MD5bca0f511295692ef4b0733c134329d6f
SHA12be7c3c25f0a11f920c125775dcf5aea5174a2b8
SHA256b66139efad8e3bf6b21e19f4fe6a426c0cb0de1416c5b03284dd2fc2019bd2e6
SHA5121a03c05254db0821bff09ef05d800ebb7d7d5c5f09dff7bec3b5be8d9db7e883b2bb99d69e1d5438d86536a9b606c46d6183fdf09a7c130137ce494386d08cba