Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
4307e445e5dd7a3b8480b64bf57ab45a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4307e445e5dd7a3b8480b64bf57ab45a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4307e445e5dd7a3b8480b64bf57ab45a_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
4307e445e5dd7a3b8480b64bf57ab45a
-
SHA1
3ced041cdfcfa087ed1b8850ac46b3d60ab4b4e6
-
SHA256
d7a56cca4917e21f9eac6e5b95f69be0e515b222adf38b443c4c1abbefeb4779
-
SHA512
04bc26c53dfb6529d5c651fe1e5954b97e5f8449f570442a8dd3eb1b9f2c5f269db5f9a19d4ccfdcba3810b9e92ba071ab02d2279606f28a6c88988dbdc2da4c
-
SSDEEP
24576:ezbBc+A5PEAJEiC49X6kA3z0cwsAx66BBO30f+aXccs6jDjk/z/+q:e0TCjiM5wdo6BBO3BaXZhjDjkjh
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2068 install.exe 2412 isass.exe -
Loads dropped DLL 10 IoCs
pid Process 2556 4307e445e5dd7a3b8480b64bf57ab45a_JaffaCakes118.exe 2068 install.exe 2068 install.exe 2068 install.exe 2068 install.exe 2068 install.exe 2412 isass.exe 2412 isass.exe 2412 isass.exe 2412 isass.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Users\\Admin\\AppData\\Local\\isass.exe \"" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4307e445e5dd7a3b8480b64bf57ab45a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isass.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2968 reg.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2068 install.exe 2068 install.exe 2068 install.exe 2068 install.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2412 isass.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2412 isass.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2068 2556 4307e445e5dd7a3b8480b64bf57ab45a_JaffaCakes118.exe 30 PID 2556 wrote to memory of 2068 2556 4307e445e5dd7a3b8480b64bf57ab45a_JaffaCakes118.exe 30 PID 2556 wrote to memory of 2068 2556 4307e445e5dd7a3b8480b64bf57ab45a_JaffaCakes118.exe 30 PID 2556 wrote to memory of 2068 2556 4307e445e5dd7a3b8480b64bf57ab45a_JaffaCakes118.exe 30 PID 2556 wrote to memory of 2068 2556 4307e445e5dd7a3b8480b64bf57ab45a_JaffaCakes118.exe 30 PID 2556 wrote to memory of 2068 2556 4307e445e5dd7a3b8480b64bf57ab45a_JaffaCakes118.exe 30 PID 2556 wrote to memory of 2068 2556 4307e445e5dd7a3b8480b64bf57ab45a_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2412 2068 install.exe 31 PID 2068 wrote to memory of 2412 2068 install.exe 31 PID 2068 wrote to memory of 2412 2068 install.exe 31 PID 2068 wrote to memory of 2412 2068 install.exe 31 PID 2068 wrote to memory of 2412 2068 install.exe 31 PID 2068 wrote to memory of 2412 2068 install.exe 31 PID 2068 wrote to memory of 2412 2068 install.exe 31 PID 2412 wrote to memory of 2864 2412 isass.exe 32 PID 2412 wrote to memory of 2864 2412 isass.exe 32 PID 2412 wrote to memory of 2864 2412 isass.exe 32 PID 2412 wrote to memory of 2864 2412 isass.exe 32 PID 2412 wrote to memory of 2864 2412 isass.exe 32 PID 2412 wrote to memory of 2864 2412 isass.exe 32 PID 2412 wrote to memory of 2864 2412 isass.exe 32 PID 2864 wrote to memory of 2720 2864 cmd.exe 34 PID 2864 wrote to memory of 2720 2864 cmd.exe 34 PID 2864 wrote to memory of 2720 2864 cmd.exe 34 PID 2864 wrote to memory of 2720 2864 cmd.exe 34 PID 2864 wrote to memory of 2720 2864 cmd.exe 34 PID 2864 wrote to memory of 2720 2864 cmd.exe 34 PID 2864 wrote to memory of 2720 2864 cmd.exe 34 PID 2720 wrote to memory of 2968 2720 cmd.exe 35 PID 2720 wrote to memory of 2968 2720 cmd.exe 35 PID 2720 wrote to memory of 2968 2720 cmd.exe 35 PID 2720 wrote to memory of 2968 2720 cmd.exe 35 PID 2720 wrote to memory of 2968 2720 cmd.exe 35 PID 2720 wrote to memory of 2968 2720 cmd.exe 35 PID 2720 wrote to memory of 2968 2720 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\4307e445e5dd7a3b8480b64bf57ab45a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4307e445e5dd7a3b8480b64bf57ab45a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\isass.exe"C:\Users\Admin\AppData\Local\isass.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\cmd.execmd /c setup.bat4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V lsass /D "\"C:\Users\Admin\AppData\Local\isass.exe \"" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V lsass /D "\"C:\Users\Admin\AppData\Local\isass.exe \"" /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2968
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143B
MD5330d9a81f808b287b999c76c1d932ed6
SHA195146f6f084c39395e2fae892af065e85fddb8d1
SHA2564e2ba5afae8aedfb7664f479ff30667dbabee99f63c922206df98ff56456a03f
SHA5124abd3d3c6b40ae046366604fdfabdc2c97a54cd4c4046452014fb1087353d216b2920650cc2d147fd6c1a79fd7d73d7cd46a8ada0a5c70de70b87b480034e812
-
Filesize
216KB
MD5c9e7bf0068bf9d191ff0f45ccaf65f99
SHA140d9f5ee5814ccde7a460d188fa3609ff613c14c
SHA2568adb4f985d7ff250c803d537c4ab1b8e76259aba6db41b27c327f0bb64fa63f0
SHA512802bccbbfcc7c5c882ed3273b5fdde2b2a3963775e1d705cd410d0d32dae63f9a303cf307c36fa532c7956ae2abb800bd5a4b6208fcd36bc89ce1475e35ee640
-
Filesize
944KB
MD51b139bd50d8deea7b3d3bcd21a34cb28
SHA1551faf81b7815549935ca0eb9b3aad1b1c6a527e
SHA256ddcc00896a7203a33e3c091de6eb63cbf03a24e085cf6e913ae6bada42accf20
SHA5122dcaa1e6a60fc7720a0e8746a864d529af2e398041e506dfec81dca988ae7031276b20dbe57784ffac04709a3aecbc432bb5a149a5bc5e522dab7b07ae1247ec
-
Filesize
520KB
MD5f5a27157301659b614612fa2e15e0e0d
SHA1caea9aa24360e0d0720a72a68421ec29af9caa22
SHA25608b269771a6c963927b7e1162233be12a97217c550c17344647a0dd821ecf6c4
SHA512c69a6ee08443ccb147c9c314f843f18153fa92f251637c3f2edfeb2376fe7df59397712a19730fd91c54b897db25814e736f5ea0b508d9f79019b9c98f9771b5