Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 19:13
Static task
static1
Behavioral task
behavioral1
Sample
43c458db74417ef4a537243c95660832_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
43c458db74417ef4a537243c95660832_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
43c458db74417ef4a537243c95660832_JaffaCakes118.exe
-
Size
192KB
-
MD5
43c458db74417ef4a537243c95660832
-
SHA1
edba6332de8d00d9e0708d309e2e5ec8eb31ac46
-
SHA256
a8f6badd8ca0a8224cb192605a110c07913dfc248c69c151e50a6f97f543bac7
-
SHA512
7968e93df84ac836d0e962e12611a4c1ee7f61dcc6fb63f459466249f07dd8895920366f63be50c9ddfef5e56c7b274bd8a88e03f873ffa80ee4a03d8a7cf7c4
-
SSDEEP
3072:MW5IJzFoJpEoZmq7xK+krIiP3Jzb9ym1RKzHzMK1RzVnOcwLsTEF27AK7pzQjX5:MWXJ6o1xKJcK53dTKzHD9BI8pzsX
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2128-5-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2424-2-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2424-12-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2652-76-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/2424-174-0x0000000000400000-0x0000000000447000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43c458db74417ef4a537243c95660832_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43c458db74417ef4a537243c95660832_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43c458db74417ef4a537243c95660832_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2128 2424 43c458db74417ef4a537243c95660832_JaffaCakes118.exe 31 PID 2424 wrote to memory of 2128 2424 43c458db74417ef4a537243c95660832_JaffaCakes118.exe 31 PID 2424 wrote to memory of 2128 2424 43c458db74417ef4a537243c95660832_JaffaCakes118.exe 31 PID 2424 wrote to memory of 2128 2424 43c458db74417ef4a537243c95660832_JaffaCakes118.exe 31 PID 2424 wrote to memory of 2652 2424 43c458db74417ef4a537243c95660832_JaffaCakes118.exe 34 PID 2424 wrote to memory of 2652 2424 43c458db74417ef4a537243c95660832_JaffaCakes118.exe 34 PID 2424 wrote to memory of 2652 2424 43c458db74417ef4a537243c95660832_JaffaCakes118.exe 34 PID 2424 wrote to memory of 2652 2424 43c458db74417ef4a537243c95660832_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\43c458db74417ef4a537243c95660832_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\43c458db74417ef4a537243c95660832_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\43c458db74417ef4a537243c95660832_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\43c458db74417ef4a537243c95660832_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\43c458db74417ef4a537243c95660832_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\43c458db74417ef4a537243c95660832_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD540fe946b16c776858a39c878994556ee
SHA162eca5a6f1e5fae42bb00b8bb0fe319e55ca3799
SHA2567a39454d5703e1e38bbdddea570c29453541e56fa73ede815f999447f495c66f
SHA51278a982239ba98d7f26dbcd0a8ae897084bb16f89cefd0c6d52ab9691ac9b92394d477fb9779e15daff1ea1de55778ff5a7ce5647c678331ba7874077b932b0b2
-
Filesize
600B
MD5e205ce21619e001a3a4967a97c67189e
SHA170a94d6a5837b6ac373db17cab7a1817a9a8ac57
SHA256adc7ab1181b030aa7328ed27e5dc48be464b56655e3bf3d21696a9c8f75547da
SHA51278288221920f3e584d057f4a95bd97b2765feb8f34e97cd4af8395b1fbbf9d8c573165976a1ee8abcc73f9c0c1aae7c33abda0001fecef1180378c94365e0772
-
Filesize
996B
MD5971088cc1ba3fdd2b6e70527b65b0f6c
SHA199098c7d0476fba5edc184285888aa413a77cdb0
SHA256b6e2d505d14a4800b952d51d2aa25a845535bbde692022dc18e93319c349a7be
SHA512d4b1be2cf9c5db41cb465ad2c224e444fdcbe01c06a211122f0903bc6d5e71f42c88e2c697dd30d4909c7ba0ffea9a69717f692dbc23620fbf98717d5c2090d2