Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
27/10/2024, 22:53
Static task
static1
Behavioral task
behavioral1
Sample
765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe
-
Size
133KB
-
MD5
765c661785dabc5692bf2560b5ddb7a8
-
SHA1
bdfdeacb530e31171c33c93c4d5338d18bfdde61
-
SHA256
099abdd3556d9f39ee963c663479fb2aa74af294ddadae6ef83ba71b7d035564
-
SHA512
2a7964535c1e5bc3c2f12478dc21e089fac2850ca9f452f92303c807a2d5bd2c2443497600474510c4ba578cd18f866831b1c054a51d67fccac360aa5392bff8
-
SSDEEP
3072:PegF2jRYn8cdwdA/lVhWsf0sbbHB5FeXDRLumUggT:mgF2p3A/rAsf0sXDFqRKu6
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\shell.exe" 765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2836-3-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral1/memory/1768-93-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral1/memory/1768-96-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral1/memory/1768-95-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral1/memory/2836-97-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral1/memory/2072-169-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral1/memory/2072-171-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral1/memory/2836-172-0x0000000000400000-0x0000000000475000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2836 wrote to memory of 1768 2836 765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe 31 PID 2836 wrote to memory of 1768 2836 765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe 31 PID 2836 wrote to memory of 1768 2836 765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe 31 PID 2836 wrote to memory of 1768 2836 765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe 31 PID 2836 wrote to memory of 2072 2836 765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe 32 PID 2836 wrote to memory of 2072 2836 765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe 32 PID 2836 wrote to memory of 2072 2836 765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe 32 PID 2836 wrote to memory of 2072 2836 765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:1768
-
-
C:\Users\Admin\AppData\Local\Temp\765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\dwm.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
612B
MD5f8775d59e14353a65c51d73941bb1eac
SHA108e1c47cb4c435f6467ccd98ce6233191a19bc6e
SHA256d941e62d3b14fc2874389ead5466b24e8d025409204e28457caeb4c805bbda39
SHA51296b0426df5149fb8d9be95201d6e345c026a1d1bd2dfda1b3edecafedc14727138cc39b95a9dbb609355781eb834fda04f3a87679c52b52a6f4db9f761591b98
-
Filesize
1KB
MD5e39bf41053064fbb4700a35fa1ffa919
SHA168cf15592057538b0af820e35d6e483711c2ab54
SHA25687ca061313246ef15ec12805afd4063b07b57a6bf424f9b53676d89888860fe2
SHA51207ee79538fba41c11d985bd8b3172aeba2818e4918643f17582827c158164895276b624df4203b2829b909af0b0f43f805a94f57d1e5e50624f6771dc229f3cc
-
Filesize
924B
MD55cbdda63a1ab4ba2a3ab0415e5029977
SHA13a8c2244af844e508c713151696385923150fd91
SHA256537f1cf82d603620e3225925490b8063944c24e2a116fb7de4bf512a79b1573d
SHA5124129672537876c6803b9a8d276a5534721533ac01b799fcc7da3709b5d140880d4a04e30bb5642f41a4df9f88965ae59a9c80a25650e921a6e0b70c30d424eaa