Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/12/2024, 12:58
Behavioral task
behavioral1
Sample
c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe
-
Size
777KB
-
MD5
c7cda02f2f136ad064bd0c5014d623f9
-
SHA1
95de8248db7678b929491e381a24258105b3111e
-
SHA256
f1ff7d6e883357e0e5509d5f83dac3e3af91670089510b76cc7caba699659c71
-
SHA512
137aa13bcc35b108bff3c10ba17b9be13ece93cd0786bba08755262806b992a54cffd22cb6660f9bacab74091580147e2f87d7964816d71f5e51415b4be65f58
-
SSDEEP
12288:YOlx4kk9HKda4YfM/1T3PPSnPI2VAWNDTJHq9DIMTW8c1O:YA4Ya1fQzPPSnPFqWtTJK9DIMTW8t
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2752 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2784 uvahn.exe 1440 rypug.exe -
Loads dropped DLL 2 IoCs
pid Process 2308 c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe 2784 uvahn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rypug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uvahn.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe 1440 rypug.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1440 rypug.exe Token: SeIncBasePriorityPrivilege 1440 rypug.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2784 2308 c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe 31 PID 2308 wrote to memory of 2784 2308 c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe 31 PID 2308 wrote to memory of 2784 2308 c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe 31 PID 2308 wrote to memory of 2784 2308 c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe 31 PID 2308 wrote to memory of 2752 2308 c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe 32 PID 2308 wrote to memory of 2752 2308 c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe 32 PID 2308 wrote to memory of 2752 2308 c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe 32 PID 2308 wrote to memory of 2752 2308 c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe 32 PID 2784 wrote to memory of 1440 2784 uvahn.exe 34 PID 2784 wrote to memory of 1440 2784 uvahn.exe 34 PID 2784 wrote to memory of 1440 2784 uvahn.exe 34 PID 2784 wrote to memory of 1440 2784 uvahn.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\uvahn.exe"C:\Users\Admin\AppData\Local\Temp\uvahn.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\rypug.exe"C:\Users\Admin\AppData\Local\Temp\rypug.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD5ed0bc55935d6dfb5df599516f92d8785
SHA18588e3ba425766a9526faf48f20a38ec30df5748
SHA25677180c284849927d251d5d5464c9db55e11fb62936b67e30a98ff298b2192cbe
SHA51268e1b216ad0379144ecde616c72277cc99a45439accb9980ecae6975c40ee43826cf08953c88762142e60e7e62c2f8dd6ffb65cf2e2cb9af47e28fdfc6c738c1
-
Filesize
512B
MD5e4f1ae12237c8b81fbab239e2f33fa13
SHA1934e05d8b30a2ce1a8c6f9092301b77897bd501a
SHA256be452a0895f609dda6a5513d9b0b0035ea5f74979420d5e34e3808fe27683195
SHA512b500bb517253b1ca2314e1777798a9058a45f2f77f7811f45250ab104b2dcb68db81d3195d6e746d14f2da1a074b3019c5773082a6b4db955e46edf9b001f3c3
-
Filesize
156KB
MD5ec531f5f0b9f17bc6d2334b2115e10ea
SHA122be8f49a22c0085196e51c873d6428269bec563
SHA256fa147ad1e623ac584d01e5abcb41bd0d3ff0f43f16cb3c46a28bae499861a9bc
SHA512e51a9126faed0cfab6b353220f9c42e2870f532d32dad6009c92f8f13f364a26c9f29270556a20592e3ccb7e036d239d285532290c5688008a6155f150607543
-
Filesize
777KB
MD5f0c11af4bcb076767b3ed01f4db7766f
SHA1250ddff548f1f516425e4312aae3685a1e22d5c2
SHA25684e8bc9d40740ab1b5046c390f9eb5ed5c254d5e1532b98d9c6d92e2c1b5fa8f
SHA512818f28bbd0c1e22acf27300649328916133e4b439475d812a93405dca0cc1fb1208708b771460d57a6f4d784faece0c474d1af5c65f8079ab21be2bb01017088