Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 17:40
Static task
static1
Behavioral task
behavioral1
Sample
52e5b4bd12fe5fc8d87f78632b2746d6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
52e5b4bd12fe5fc8d87f78632b2746d6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
52e5b4bd12fe5fc8d87f78632b2746d6_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
52e5b4bd12fe5fc8d87f78632b2746d6
-
SHA1
46a8f5ed4794696f9c9a820d0e74f2ab5c6ccd92
-
SHA256
c00d4aa34ab7f5bc9e1354b32eafc3f77f146d7915cea5897aad966eb0b68cf1
-
SHA512
3d297aa210190d16a7b2c2d0001bb7c3cbbe0494eeb73a10481e0f3b591aef3312ce1c23d2d79b819c30c93e23340e23e7705d55679ce460948982d3bc603bd2
-
SSDEEP
24576:wiUC5ES9ATaNYYrBtjr1vig/m0uGyeqEF/lnGfYrck:zUCyylvn5mdWck
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2348 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2992 812979504.exe -
Loads dropped DLL 4 IoCs
pid Process 2348 cmd.exe 2348 cmd.exe 2992 812979504.exe 2992 812979504.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\52e5b4bd12fe5fc8d87f78632b2746d6_JaffaCakes118 = "\"C:\\Users\\Admin\\AppData\\Local\\812979504.exe\" 0 36 " 52e5b4bd12fe5fc8d87f78632b2746d6_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\812979504 = "\"C:\\Users\\Admin\\AppData\\Local\\812979504.exe\" 0 49 " 812979504.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 812979504.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52e5b4bd12fe5fc8d87f78632b2746d6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2536 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2992 812979504.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2992 812979504.exe 2992 812979504.exe 2992 812979504.exe 2992 812979504.exe 2992 812979504.exe 2992 812979504.exe 2992 812979504.exe 2992 812979504.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2992 812979504.exe 2992 812979504.exe 2992 812979504.exe 2992 812979504.exe 2992 812979504.exe 2992 812979504.exe 2992 812979504.exe 2992 812979504.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2348 1732 52e5b4bd12fe5fc8d87f78632b2746d6_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2348 1732 52e5b4bd12fe5fc8d87f78632b2746d6_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2348 1732 52e5b4bd12fe5fc8d87f78632b2746d6_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2348 1732 52e5b4bd12fe5fc8d87f78632b2746d6_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2536 2348 cmd.exe 32 PID 2348 wrote to memory of 2536 2348 cmd.exe 32 PID 2348 wrote to memory of 2536 2348 cmd.exe 32 PID 2348 wrote to memory of 2536 2348 cmd.exe 32 PID 2348 wrote to memory of 2992 2348 cmd.exe 33 PID 2348 wrote to memory of 2992 2348 cmd.exe 33 PID 2348 wrote to memory of 2992 2348 cmd.exe 33 PID 2348 wrote to memory of 2992 2348 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\52e5b4bd12fe5fc8d87f78632b2746d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\52e5b4bd12fe5fc8d87f78632b2746d6_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\094648740.bat" "2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v 52e5b4bd12fe5fc8d87f78632b2746d6_JaffaCakes118 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2536
-
-
C:\Users\Admin\AppData\Local\812979504.exeC:\Users\Admin\AppData\Local\812979~1.EXE -i3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2992
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD552e5b4bd12fe5fc8d87f78632b2746d6
SHA146a8f5ed4794696f9c9a820d0e74f2ab5c6ccd92
SHA256c00d4aa34ab7f5bc9e1354b32eafc3f77f146d7915cea5897aad966eb0b68cf1
SHA5123d297aa210190d16a7b2c2d0001bb7c3cbbe0494eeb73a10481e0f3b591aef3312ce1c23d2d79b819c30c93e23340e23e7705d55679ce460948982d3bc603bd2
-
Filesize
440B
MD53e38d2b7b5ecb6eee682e665b3e5347b
SHA1a78dcc34ffbe1b4b139447009041edcdd6807afb
SHA256d64f275e0e94a0c110ea503d77a9473884e54f27ee3fc9151022ac9456b0c361
SHA512b919f4f6d4781c70a071b3393cafd0a7a7734e46c2b5b42d463f7724d86957d5cb4d483c86064590ec898321094c0f2ec52cca716fe336a963da49ab41f0402c