Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 17:52
Behavioral task
behavioral1
Sample
52f15ded65ac36ee36194e0e34e5d676_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
52f15ded65ac36ee36194e0e34e5d676_JaffaCakes118.exe
-
Size
151KB
-
MD5
52f15ded65ac36ee36194e0e34e5d676
-
SHA1
cec20fb9463fae3e9e7d1e15bdba149148473896
-
SHA256
a6e67bad8ad92eb2408c728393bf6f879b6aa95226168162038e97762838dcca
-
SHA512
ee422afbb5eadf24ecf72fd2d00f1a710833576820eebd45decd31df3fd8f3f78781b078047f5cbc9ff7c1650a4dec9c7ac5556753f0ec91aedb0e1190a64553
-
SSDEEP
3072:aKinQUmqpY57u4mslkSlNbRaf7D/mre7B8CEEARYEJ:aKiQoc75mseCA7D/9B6NRYY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2636 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2824 cfrm.exe 2616 tmp7484.tmp -
Loads dropped DLL 2 IoCs
pid Process 2824 cfrm.exe 2824 cfrm.exe -
resource yara_rule behavioral1/memory/2736-0-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2736-26-0x0000000000400000-0x000000000042D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52f15ded65ac36ee36194e0e34e5d676_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfrm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2616 tmp7484.tmp -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2824 2736 52f15ded65ac36ee36194e0e34e5d676_JaffaCakes118.exe 31 PID 2736 wrote to memory of 2824 2736 52f15ded65ac36ee36194e0e34e5d676_JaffaCakes118.exe 31 PID 2736 wrote to memory of 2824 2736 52f15ded65ac36ee36194e0e34e5d676_JaffaCakes118.exe 31 PID 2736 wrote to memory of 2824 2736 52f15ded65ac36ee36194e0e34e5d676_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2616 2824 cfrm.exe 33 PID 2824 wrote to memory of 2616 2824 cfrm.exe 33 PID 2824 wrote to memory of 2616 2824 cfrm.exe 33 PID 2824 wrote to memory of 2616 2824 cfrm.exe 33 PID 2736 wrote to memory of 2636 2736 52f15ded65ac36ee36194e0e34e5d676_JaffaCakes118.exe 34 PID 2736 wrote to memory of 2636 2736 52f15ded65ac36ee36194e0e34e5d676_JaffaCakes118.exe 34 PID 2736 wrote to memory of 2636 2736 52f15ded65ac36ee36194e0e34e5d676_JaffaCakes118.exe 34 PID 2736 wrote to memory of 2636 2736 52f15ded65ac36ee36194e0e34e5d676_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\52f15ded65ac36ee36194e0e34e5d676_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\52f15ded65ac36ee36194e0e34e5d676_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\cfrm.exec:\cfrm.exe -autoclean -reboot2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\tmp7484.tmpC:\Users\Admin\AppData\Local\Temp\tmp7484.tmp -autoclean -reboot -child3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\3e9a7ca1328320af7aab23f6c9ef0d36.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209B
MD5a5287bb07f02c0f5166cb81c25aaaa40
SHA1449d5417590555386ce7c7f2bd38c15d2c9e9b84
SHA25665fc16af0692fe328f689d8bc27690894a1d4f8f2f9a7e4a25be08a7c8640101
SHA512a3a13790f0278c8365a6305e4e3c1f49fe9416e6a51dcf94fad87294a8b0fbd3c8c36f6d93717b5a3c0e7e00924274257fe72d2e4c7d7317cc4d4f31eeaf258d
-
Filesize
119KB
MD57f873faebce05a7a49452b09360cee9a
SHA188cacc6658c810135a2f1d84ee36fde01b644a49
SHA256ad327f7948ad280e830e6f0db4b83f0549a3deada51e888520337ac80436f9e7
SHA512f7aa4b62a2ea3361237d59dc81f74a05a4783231ee8cfd3d67473f024d374dca435d9d1ed70ea43d226371ff5babaa17200c5774d29792aeca91f377904c3b56