Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 10:21
Static task
static1
Behavioral task
behavioral1
Sample
56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe
-
Size
167KB
-
MD5
56e7175fdb315b23eb2f83798a6b671e
-
SHA1
e27c385f2c1a7e28e3b412349c9916d90bb5a84a
-
SHA256
b5dcfb7d3cc9da1dd16eb433cbf0fe67c1593fd1c911b647f3dc6555e06bd0e9
-
SHA512
46afae0e50c207fd2e094011a0d5034e9a1bf8e0fa86c5f2ee88b3fdb087fb737ca908722958f4e16e9d1d52af8dc4106d8c1123f6d86c5ec3357a6a5b903f5e
-
SSDEEP
3072:5Zo8G4tsoOSFxW6Oh7zdq+PV+F+MKciWCPepKFeli/tsTrT1KOnV6QI7:7lJRFxMxRP+KciWU9YatygOVzi
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2648 D232F5B66D4.exe 2672 cAXFD14.exe -
Loads dropped DLL 4 IoCs
pid Process 2228 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe 2228 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe 2648 D232F5B66D4.exe 2648 D232F5B66D4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\0V3DUA4J1E8DZGWXJMHFDOGJBRKQBFR = "C:\\cleansweep\\D232F5B66D4.exe /q" cAXFD14.exe -
resource yara_rule behavioral1/memory/2228-3-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral1/memory/2228-4-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral1/memory/2228-5-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral1/memory/2228-11-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral1/memory/2648-25-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral1/memory/2648-29-0x0000000000400000-0x0000000000486000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D232F5B66D4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cAXFD14.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PhishingFilter cAXFD14.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" cAXFD14.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" cAXFD14.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery cAXFD14.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" cAXFD14.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2228 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe 2228 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe 2648 D232F5B66D4.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe 2672 cAXFD14.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2228 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe Token: SeDebugPrivilege 2228 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe Token: SeDebugPrivilege 2228 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe Token: SeDebugPrivilege 2228 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe Token: SeDebugPrivilege 2648 D232F5B66D4.exe Token: SeDebugPrivilege 2648 D232F5B66D4.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe Token: SeDebugPrivilege 2672 cAXFD14.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2648 2228 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe 29 PID 2228 wrote to memory of 2648 2228 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe 29 PID 2228 wrote to memory of 2648 2228 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe 29 PID 2228 wrote to memory of 2648 2228 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe 29 PID 2648 wrote to memory of 2672 2648 D232F5B66D4.exe 30 PID 2648 wrote to memory of 2672 2648 D232F5B66D4.exe 30 PID 2648 wrote to memory of 2672 2648 D232F5B66D4.exe 30 PID 2648 wrote to memory of 2672 2648 D232F5B66D4.exe 30 PID 2648 wrote to memory of 2672 2648 D232F5B66D4.exe 30 PID 2648 wrote to memory of 2672 2648 D232F5B66D4.exe 30 PID 2672 wrote to memory of 2228 2672 cAXFD14.exe 28 PID 2672 wrote to memory of 2228 2672 cAXFD14.exe 28 PID 2672 wrote to memory of 2228 2672 cAXFD14.exe 28 PID 2672 wrote to memory of 2228 2672 cAXFD14.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\cleansweep\D232F5B66D4.exe"C:\cleansweep\D232F5B66D4.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\cAXFD14.exe"C:\Users\Admin\AppData\Local\Temp\cAXFD14.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
167KB
MD556e7175fdb315b23eb2f83798a6b671e
SHA1e27c385f2c1a7e28e3b412349c9916d90bb5a84a
SHA256b5dcfb7d3cc9da1dd16eb433cbf0fe67c1593fd1c911b647f3dc6555e06bd0e9
SHA51246afae0e50c207fd2e094011a0d5034e9a1bf8e0fa86c5f2ee88b3fdb087fb737ca908722958f4e16e9d1d52af8dc4106d8c1123f6d86c5ec3357a6a5b903f5e
-
Filesize
5KB
MD5937d1d2fc50e92ca749503a06fb23ef0
SHA1487ecc8343726941f7c3ef530fa887912e6255f2
SHA25658f18af48110a661afade234e479793d29fc5313f1389c95238d8d82a54b887f
SHA512d95385e7ba4945033373bc3f2cdae19e63cae34a13e2fb89aa4eca5abf2de098b5d3175e2f7993a3dc0aeb32e4ba02ad257db7251cf0671127d1cd7f707b8a8e
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be