Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05/01/2025, 09:34
Behavioral task
behavioral1
Sample
JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe
-
Size
7.6MB
-
MD5
9b035bad2b8a21fb2c57fd784c89b8d5
-
SHA1
ee15fad65f3f22df7f54e218176c45d369ebb70f
-
SHA256
2d49873798ab5ee10992f377ebb27ee940b1f354b9ec4ebebe687177ea2b214c
-
SHA512
96c0189aba67db2f1c38affa5ac44665566ea17e20e5f749aef771739c81beb96bbcac8ea35aad80cffc9d492e23fcbaefbf03f72011d9bd1ccac36182466dde
-
SSDEEP
196608:imEljesxwhzav1yo31CPwDv3uFZjeg2EeJUO9WLQUDxtw3iFFrS6XOfTV73cP:balxwZ6v1CPwDv3uFteg2EeJUO9WLjD/
Malware Config
Extracted
bitrat
1.32
7ix5nfolcp4ta4mk2dtihev73rw7d2edpbd5tp7sf7zgmpv66fpxnwqd.onion:80
-
communication_password
e10adc3949ba59abbe56e057f20f883e
-
tor_process
dllhost
Signatures
-
BitRAT payload 2 IoCs
resource yara_rule behavioral1/memory/2124-0-0x0000000000400000-0x0000000000BAA000-memory.dmp family_bitrat behavioral1/memory/2124-45-0x0000000000400000-0x0000000000BAA000-memory.dmp family_bitrat -
Bitrat family
-
ACProtect 1.3x - 1.4x DLL software 7 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00060000000186dd-18.dat acprotect behavioral1/files/0x000600000001932d-20.dat acprotect behavioral1/files/0x0006000000018710-22.dat acprotect behavioral1/files/0x0007000000018718-24.dat acprotect behavioral1/files/0x0005000000019606-26.dat acprotect behavioral1/files/0x0007000000018766-28.dat acprotect behavioral1/files/0x000500000001960a-30.dat acprotect -
Executes dropped EXE 4 IoCs
pid Process 2952 dllhost.exe 1028 dllhost.exe 1592 dllhost.exe 1804 dllhost.exe -
Loads dropped DLL 33 IoCs
pid Process 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 2952 dllhost.exe 2952 dllhost.exe 2952 dllhost.exe 2952 dllhost.exe 2952 dllhost.exe 2952 dllhost.exe 2952 dllhost.exe 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 1028 dllhost.exe 1028 dllhost.exe 1028 dllhost.exe 1028 dllhost.exe 1028 dllhost.exe 1028 dllhost.exe 1028 dllhost.exe 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 1592 dllhost.exe 1592 dllhost.exe 1592 dllhost.exe 1592 dllhost.exe 1592 dllhost.exe 1592 dllhost.exe 1592 dllhost.exe 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 1804 dllhost.exe 1804 dllhost.exe 1804 dllhost.exe 1804 dllhost.exe 1804 dllhost.exe 1804 dllhost.exe 1804 dllhost.exe -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe -
resource yara_rule behavioral1/files/0x0005000000019608-11.dat upx behavioral1/files/0x00060000000186dd-18.dat upx behavioral1/files/0x000600000001932d-20.dat upx behavioral1/files/0x0006000000018710-22.dat upx behavioral1/files/0x0007000000018718-24.dat upx behavioral1/files/0x0005000000019606-26.dat upx behavioral1/files/0x0007000000018766-28.dat upx behavioral1/files/0x000500000001960a-30.dat upx behavioral1/memory/2952-34-0x0000000074A10000-0x0000000074A59000-memory.dmp upx behavioral1/memory/2952-41-0x00000000744B0000-0x000000007477F000-memory.dmp upx behavioral1/memory/2952-39-0x0000000074AB0000-0x0000000074AD4000-memory.dmp upx behavioral1/memory/2952-38-0x0000000074200000-0x00000000742CE000-memory.dmp upx behavioral1/memory/2952-37-0x0000000074980000-0x0000000074A08000-memory.dmp upx behavioral1/memory/2952-36-0x00000000742D0000-0x00000000743DA000-memory.dmp upx behavioral1/memory/2952-33-0x0000000000F80000-0x0000000001384000-memory.dmp upx behavioral1/memory/2952-35-0x00000000743E0000-0x00000000744A8000-memory.dmp upx behavioral1/memory/2952-47-0x0000000000F80000-0x0000000001384000-memory.dmp upx behavioral1/memory/2952-48-0x00000000743E0000-0x00000000744A8000-memory.dmp upx behavioral1/memory/2952-49-0x0000000074200000-0x00000000742CE000-memory.dmp upx behavioral1/memory/2952-51-0x00000000744B0000-0x000000007477F000-memory.dmp upx behavioral1/memory/2952-50-0x0000000000F80000-0x0000000001384000-memory.dmp upx behavioral1/memory/2952-59-0x0000000000F80000-0x0000000001384000-memory.dmp upx behavioral1/memory/2952-81-0x0000000000F80000-0x0000000001384000-memory.dmp upx behavioral1/memory/2952-100-0x0000000000F80000-0x0000000001384000-memory.dmp upx behavioral1/memory/1028-140-0x0000000074510000-0x0000000074598000-memory.dmp upx behavioral1/memory/1028-142-0x0000000074A30000-0x0000000074A54000-memory.dmp upx behavioral1/memory/1028-141-0x0000000074080000-0x000000007414E000-memory.dmp upx behavioral1/memory/1028-139-0x00000000745A0000-0x00000000746AA000-memory.dmp upx behavioral1/memory/1028-138-0x00000000746B0000-0x0000000074778000-memory.dmp upx behavioral1/memory/1028-137-0x00000000749C0000-0x0000000074A09000-memory.dmp upx behavioral1/memory/1028-136-0x00000000741E0000-0x00000000744AF000-memory.dmp upx behavioral1/memory/1028-135-0x0000000000F80000-0x0000000001384000-memory.dmp upx behavioral1/memory/2124-134-0x0000000004F10000-0x0000000005314000-memory.dmp upx behavioral1/memory/2952-125-0x0000000000F80000-0x0000000001384000-memory.dmp upx behavioral1/memory/2124-154-0x0000000004F10000-0x0000000005314000-memory.dmp upx behavioral1/memory/1028-158-0x0000000074080000-0x000000007414E000-memory.dmp upx behavioral1/memory/1028-157-0x00000000746B0000-0x0000000074778000-memory.dmp upx behavioral1/memory/1028-156-0x00000000741E0000-0x00000000744AF000-memory.dmp upx behavioral1/memory/1028-155-0x0000000000F80000-0x0000000001384000-memory.dmp upx behavioral1/memory/1028-159-0x0000000000F80000-0x0000000001384000-memory.dmp upx behavioral1/memory/1028-167-0x0000000000F80000-0x0000000001384000-memory.dmp upx behavioral1/memory/1028-178-0x0000000000F80000-0x0000000001384000-memory.dmp upx behavioral1/memory/1028-195-0x0000000000F80000-0x0000000001384000-memory.dmp upx behavioral1/memory/1592-213-0x00000000746B0000-0x0000000074778000-memory.dmp upx behavioral1/memory/1592-217-0x0000000074A30000-0x0000000074A54000-memory.dmp upx behavioral1/memory/1592-216-0x0000000074510000-0x0000000074598000-memory.dmp upx behavioral1/memory/1592-215-0x0000000074080000-0x000000007414E000-memory.dmp upx behavioral1/memory/1592-214-0x00000000745A0000-0x00000000746AA000-memory.dmp upx behavioral1/memory/1592-212-0x00000000749C0000-0x0000000074A09000-memory.dmp upx behavioral1/memory/1592-211-0x00000000741E0000-0x00000000744AF000-memory.dmp upx behavioral1/memory/1592-210-0x0000000000F80000-0x0000000001384000-memory.dmp upx behavioral1/memory/1592-224-0x0000000000F80000-0x0000000001384000-memory.dmp upx behavioral1/memory/1592-227-0x0000000074080000-0x000000007414E000-memory.dmp upx behavioral1/memory/1592-226-0x00000000746B0000-0x0000000074778000-memory.dmp upx behavioral1/memory/1592-225-0x00000000741E0000-0x00000000744AF000-memory.dmp upx behavioral1/memory/1592-269-0x0000000000F80000-0x0000000001384000-memory.dmp upx behavioral1/memory/1804-285-0x0000000074A30000-0x0000000074A54000-memory.dmp upx behavioral1/memory/1804-284-0x0000000074510000-0x0000000074598000-memory.dmp upx behavioral1/memory/1804-283-0x0000000074080000-0x000000007414E000-memory.dmp upx behavioral1/memory/1804-282-0x00000000745A0000-0x00000000746AA000-memory.dmp upx behavioral1/memory/1804-281-0x00000000746B0000-0x0000000074778000-memory.dmp upx behavioral1/memory/1804-280-0x00000000749C0000-0x0000000074A09000-memory.dmp upx behavioral1/memory/1804-279-0x00000000741E0000-0x00000000744AF000-memory.dmp upx behavioral1/memory/1804-278-0x0000000000F80000-0x0000000001384000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2952 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 31 PID 2124 wrote to memory of 2952 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 31 PID 2124 wrote to memory of 2952 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 31 PID 2124 wrote to memory of 2952 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 31 PID 2124 wrote to memory of 1028 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 32 PID 2124 wrote to memory of 1028 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 32 PID 2124 wrote to memory of 1028 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 32 PID 2124 wrote to memory of 1028 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 32 PID 2124 wrote to memory of 1592 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 33 PID 2124 wrote to memory of 1592 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 33 PID 2124 wrote to memory of 1592 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 33 PID 2124 wrote to memory of 1592 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 33 PID 2124 wrote to memory of 1804 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 34 PID 2124 wrote to memory of 1804 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 34 PID 2124 wrote to memory of 1804 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 34 PID 2124 wrote to memory of 1804 2124 JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9b035bad2b8a21fb2c57fd784c89b8d5.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\07fa2a3b\tor\dllhost.exe"C:\Users\Admin\AppData\Local\07fa2a3b\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2952
-
-
C:\Users\Admin\AppData\Local\07fa2a3b\tor\dllhost.exe"C:\Users\Admin\AppData\Local\07fa2a3b\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1028
-
-
C:\Users\Admin\AppData\Local\07fa2a3b\tor\dllhost.exe"C:\Users\Admin\AppData\Local\07fa2a3b\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1592
-
-
C:\Users\Admin\AppData\Local\07fa2a3b\tor\dllhost.exe"C:\Users\Admin\AppData\Local\07fa2a3b\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD58444726dbfa5a19898d8da546773e487
SHA1581431020e34d824a931e2056d1d51102dacc119
SHA256ed0648776018f919da4ec054c2e193717d651b9dde6443dadd0254f73e096242
SHA51249db385ee101213021eea583543ebda067828f372412ce1a924da31f69ba6e2128cf505578cc6b61d1696cd8aeb12451bfa458f0a76e1d3790a81f8c738e1979
-
Filesize
2.8MB
MD5b43aec5ea555bf7254c44179c9af6c10
SHA16119f40468beaa4690bb5999264a68f0549f7a61
SHA2565e9766db78a669068bfb2b6b601b348841dcbf3697d08756ba047eaa9313780a
SHA512192151b2ea0c2ed60572a0ef75f24136f2785187873ed47eccad96e26028642585fcb0caad7b1d0e4171721735159710fca4aa013078c32efc7f1304f0875803
-
Filesize
21.4MB
MD5c0ee54304ca5485cf99d59004d117390
SHA1e02f7c5fd916ef3bf7f1d297ab9f1b13cdf5f6d5
SHA256827f91e1db4adb8376bdc9018d5f8bcb72f9a31f22b02dfabd86a834cca35911
SHA5125f2603067f75ff4814bb55465d326885dce3ceb48ecd709757de7600d6a793e4627b404bdfb1a3f403b31d6058cfb6a52996aaaa4fcc5daf1e515e03b1af8ef4
-
Filesize
21.4MB
MD5d2bdb66f0c30ea948c0f6a94749d621e
SHA16a5f4b7ea0cdc91ebea5be346867731cdb469ebe
SHA256feb8282ddf56e7593e53fc1054e7c813b5476eff7ab7e4f83535d3e0f28c3afc
SHA512cebb9e98f5ebb5806145e0f5d93403854b2297e45c9c9f7f6e89f631ae08e061947eec664c2e19ca6f94076320efbc5b6143e42509959246d20c2aea5cd73037
-
Filesize
6.6MB
MD531b094600d1866b2842165cd02658ebb
SHA155a729d77503b7116de70fe05573bed89bca35f7
SHA256b723d154476a1b4d81a76742d9b4e98d602a6530f9743d5f1acc5392772eac32
SHA5126e623b41ae0f4f861c8a73b29ee687ca8e8f53c3d25c9e9226febaa29b15956b0bb677711c7f0a0eed957dabecafc09097249a376bbd80dde657ead62b096183
-
Filesize
9KB
MD520e89bed56d6dc79519ace6626555807
SHA166e6d2f64da4ab7b6b1458f9cc88417fde33c747
SHA2568c9cca824e883156eed8dbcab37a94f9f208afb22361c316a66596412117ba7e
SHA512d5980107b9cc955ad5db48a4a1e1cea8e4929fc73495d5648426174a952f96a6c55fba0aed28ad2d6e32954736aca53af477b45bf594aa595c2240a99d63b08b
-
Filesize
9KB
MD5be7c8f605947782206f87b1b51a71a11
SHA1e4e085c316973b4208a8fed19a5df1894afdafb6
SHA256569c6ec1de819812bb692bbcfa726cc55542826bf106e66f97edfd2da2b34547
SHA512b1cb314fc3fe4e3ad346f4300b864cb9fd7d6746547d8248cda36294c77b720178b9b14184af732a1b1db95795c2757e9749d9b9680ef22a798be19dae27883f
-
Filesize
9KB
MD56d5e4025cca53a7eccf1961183f9de6b
SHA1f243ea5f82c4dd80354cac5cb60e3a902202403c
SHA2569009447aa785ae17f67b16309b041ddef612c4495d89caf98be3c1e28fb919eb
SHA5122ce6a5fd92b168c9905c43b8dbabcdcdc9b12bb2c956e055ed17e1b05084399af77abda7e4c2aad99d1417ac7a2172384fa0287ac217e54e90e826ee0ab8bd62
-
Filesize
1.7MB
MD52384a02c4a1f7ec481adde3a020607d3
SHA17e848d35a10bf9296c8fa41956a3daa777f86365
SHA256c8db0ff0f7047ed91b057005e86ad3a23eae616253313aa047c560d9eb398369
SHA5121ac74dd2d863acd7415ef8b9490a5342865462fbabdad0645da22424b0d56f5e9c389a3d7c41386f2414d6c4715c79a6ddecb6e6cff29e98319e1fd1060f4503
-
Filesize
366KB
MD5099983c13bade9554a3c17484e5481f1
SHA1a84e69ad9722f999252d59d0ed9a99901a60e564
SHA256b65f9aa0c7912af64bd9b05e9322e994339a11b0c8907e6a6166d7b814bda838
SHA51289f1a963de77873296395662d4150e3eff7a2d297fb9ec54ec06aa2e40d41e5f4fc4611e9bc34126d760c9134f2907fea3bebdf2fbbd7eaddad99f8e4be1f5e2
-
Filesize
286KB
MD5b0d98f7157d972190fe0759d4368d320
SHA15715a533621a2b642aad9616e603c6907d80efc4
SHA2562922193133dabab5b82088d4e87484e2fac75e9e0c765dacaf22eb5f4f18b0c5
SHA51241ce56c428158533bf8b8ffe0a71875b5a3abc549b88d7d3e69acc6080653abea344d6d66fff39c04bf019fcaa295768d620377d85a933ddaf17f3d90df29496
-
Filesize
439KB
MD5c88826ac4bb879622e43ead5bdb95aeb
SHA187d29853649a86f0463bfd9ad887b85eedc21723
SHA256c4d898b1a4285a45153af9ed88d79aa2a073dcb7225961b6b276b532b4d18b6f
SHA512f733041ef35b9b8058fbcf98faa0d1fea5c0858fea941ecebbe9f083cd73e3e66323afffd8d734097fcdd5e6e59db4d94f51fca5874edbcd2a382d9ba6cd97b3
-
Filesize
88KB
MD52c916456f503075f746c6ea649cf9539
SHA1fa1afc1f3d728c89b2e90e14ca7d88b599580a9d
SHA256cbb5236d923d4f4baf2f0d2797c72a2cbae42ef7ac0acce786daf5fdc5b456e6
SHA5121c1995e1aa7c33c597c64122395275861d9219e46d45277d4f1768a2e06227b353d5d77d6b7cb655082dc6fb9736ad6f7cfcc0c90e02776e27d50857e792e3fd
-
Filesize
188KB
MD5d407cc6d79a08039a6f4b50539e560b8
SHA121171adbc176dc19aaa5e595cd2cd4bd1dfd0c71
SHA25692cfd0277c8781a15a0f17b7aee6cff69631b9606a001101631f04b3381efc4e
SHA512378a10fed915591445d97c6d04e82d28008d8ea65e0e40c142b8ee59867035d561d4e103495c8f0d9c19b51597706ce0b450c25516aa0f1744579ffcd097ae0c
-
Filesize
139B
MD5dbd537e3da06f7d7aeaf58f4decc0c94
SHA17e740ea6dcf8545710f99519014e9bb029028a84
SHA256349b36a467d778e29b96528cdd25d6c34a54be659a9ef516b3833106ceb679b2
SHA512a84633c420c825b15ef2fc5cf83a6d75fcdddbb06d3b7dc74537d5bc98b5d910d3dec4838f30be3a06373662d2946f156f36bd2e033e0b6089753006ac327a90
-
Filesize
52KB
MD5add33041af894b67fe34e1dc819b7eb6
SHA16db46eb021855a587c95479422adcc774a272eeb
SHA2568688bd7ca55dcc0c23c429762776a0a43fe5b0332dfd5b79ef74e55d4bbc1183
SHA512bafc441198d03f0e7fe804bab89283c389d38884d0f87d81b11950a9b79fcbf7b32be4bb16f4fcd9179b66f865c563c172a46b4514a6087ef0af64425a4b2cfa
-
Filesize
973KB
MD55cfe61ff895c7daa889708665ef05d7b
SHA15e58efe30406243fbd58d4968b0492ddeef145f2
SHA256f9c1d18b50ce7484bf212cb61a9035602cfb90ebdfe66a077b9f6df73196a9f5
SHA51243b6f10391a863a21f70e05cee41900729c7543750e118ff5d74c0cac3d1383f10bcb73eade2a28b555a393cada4795e204246129b01ad9177d1167827dd68da