Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 06:00
Static task
static1
Behavioral task
behavioral1
Sample
462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe
-
Size
60KB
-
MD5
462d0b018b21abd17a431079705cfc4d
-
SHA1
0d6b7671c8c57daf48e3c642c815f0430d5d698e
-
SHA256
12cf5ce7f8853947dad6853c942edc4a03e201b9995871828b97824861b6054b
-
SHA512
bbd6ca9c18759a39855286a882f84201adf37c287def138d9cbace52d37e19e23808ced552cf6249dcacb322bd582a6191ae4fd46dcbb790a278c5c5e215281a
-
SSDEEP
1536:b7sIiX7vfOMXgzuSM8TWbp7pnDCP8MmiLpP9HKDAI0gb:b7s6RP9HKnb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe" reg.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Isass.dll 462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe File created C:\Windows\SysWOW64\winfile29.dll 462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2092 462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2092 462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2092 wrote to memory of 3044 2092 462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe 31 PID 2092 wrote to memory of 3044 2092 462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe 31 PID 2092 wrote to memory of 3044 2092 462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe 31 PID 2092 wrote to memory of 3044 2092 462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe 31 PID 3044 wrote to memory of 2228 3044 cmd.exe 33 PID 3044 wrote to memory of 2228 3044 cmd.exe 33 PID 3044 wrote to memory of 2228 3044 cmd.exe 33 PID 3044 wrote to memory of 2228 3044 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\temp.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\reg.exereg Add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell /d explorer.exe,462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe /f3⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:2228
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD5e2114a3a7a52faa397f0bbc84bf1b81e
SHA19964ef20f2f124eb991d507f2deee51c98fbbc2a
SHA256ac917290544a52c7d8dd6b7706f19d31097a13e0f6839429657390efa574cf6c
SHA512e31f5046a89caa3b35a346d1fee54e44a269fdd87b70f58d822927d804faef20ed7b5baa007d1b94ab3b6bf27e0e7338b28b2af59d8d6778365979708e8bfae2