Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 11:10
Static task
static1
Behavioral task
behavioral1
Sample
571d5c4b38305641cacafc463d6f9cef_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
571d5c4b38305641cacafc463d6f9cef_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$TEMP/MpegBuster.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$TEMP/MpegBuster.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Uninstall.exe
Resource
win10v2004-20241007-en
General
-
Target
571d5c4b38305641cacafc463d6f9cef_JaffaCakes118.exe
-
Size
82KB
-
MD5
571d5c4b38305641cacafc463d6f9cef
-
SHA1
64c6f7efe42b72d5da38adf025b156d18cc9c59b
-
SHA256
69ac420621d91567fb3b01e59493cfd723a977962ca3d80fe99c17780225d8f4
-
SHA512
292130eec577a96fc0c8d94706893f0c0cc05581b78f438292f783686c796d0ffa21200308c6bb0aa8eecc6d786fd31b1c289d4f94909eca6e2b151708e078da
-
SSDEEP
1536:lFYSF3bc72R2WbtjZTovF/AvSw6RRBJWbciBZFCv2P0Vi20rYa3Uqwu:lPg729btBovpvw6RRsbB2O2iT+Tu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2720 MpegBuster.exe -
Loads dropped DLL 7 IoCs
pid Process 2412 571d5c4b38305641cacafc463d6f9cef_JaffaCakes118.exe 2412 571d5c4b38305641cacafc463d6f9cef_JaffaCakes118.exe 2164 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe 2412 571d5c4b38305641cacafc463d6f9cef_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\MpegBuster\Uninstall.exe 571d5c4b38305641cacafc463d6f9cef_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2164 2720 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 571d5c4b38305641cacafc463d6f9cef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MpegBuster.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral1/files/0x000500000001961c-19.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2720 2412 571d5c4b38305641cacafc463d6f9cef_JaffaCakes118.exe 30 PID 2412 wrote to memory of 2720 2412 571d5c4b38305641cacafc463d6f9cef_JaffaCakes118.exe 30 PID 2412 wrote to memory of 2720 2412 571d5c4b38305641cacafc463d6f9cef_JaffaCakes118.exe 30 PID 2412 wrote to memory of 2720 2412 571d5c4b38305641cacafc463d6f9cef_JaffaCakes118.exe 30 PID 2720 wrote to memory of 2164 2720 MpegBuster.exe 31 PID 2720 wrote to memory of 2164 2720 MpegBuster.exe 31 PID 2720 wrote to memory of 2164 2720 MpegBuster.exe 31 PID 2720 wrote to memory of 2164 2720 MpegBuster.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\571d5c4b38305641cacafc463d6f9cef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\571d5c4b38305641cacafc463d6f9cef_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\MpegBuster.exeC:\Users\Admin\AppData\Local\Temp\MpegBuster.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 4083⤵
- Loads dropped DLL
- Program crash
PID:2164
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD56f5da74f61b6a47926343eb9910acc44
SHA1dcd5491faa78fa2b8000dca4406616dabbe95e49
SHA25668c52474873609f2f75c0bb9bbd0c46de026cd40fc19f44865acf1e9976282f3
SHA5128709acdbc39ad0657650246a38940925288658e44ea45eec4a354a8f58cd6aa371e270055f5bb5df1720c09ed110f8e4cc7a9662ca566405726acae6b9e711a2
-
Filesize
23KB
MD590d86909b73d3112e8f7c80ae353b3e4
SHA17db0624c31fa6a03a0354cb36bfa475851a06702
SHA25693a706f1dbc4de3a1250e3e6d2c2c9534bf030b8fe8a12f271b6030d67492346
SHA5120ffc27c054405d58e3b8dd57537856e18f6509448b622acf57fb62890cc6367c1163a09dd05d351291f3055eafe8152bac1a26f784c6f75845030114a1e7a241