Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
04/02/2025, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe
-
Size
1.2MB
-
MD5
981e906ab1ad31504e51446cd676b6c9
-
SHA1
3cc10f981674e7d034bcd332a34d3fe3b85ed316
-
SHA256
c6ce5a6066399c9bcbda29754885904212e175ba039cdfb9673f52d0a6e6605d
-
SHA512
98504fcf43225ac2a22d90d74ee002da9720eed2cf50d54023b6e41d83f67ed2fc2faf9fce2b3dd69a932e6fb421003c1a7451785605d4a65f21aa8b20763fdb
-
SSDEEP
24576:8YfbaD02b292QmX32w/N5cd+AD4swhQr8e4UZQO0CmL9j7iCFZO0EcS2eyJmY1Cr:8TlymnLH4D47hkuO0r9jGCFZb9wKE
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2940 temp.exe 2704 WexTarCTx.ExE -
Loads dropped DLL 2 IoCs
pid Process 1520 JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe 1520 JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WexTarCTx.ExE temp.exe File opened for modification C:\Windows\SysWOW64\ieapfltr.dat WexTarCTx.ExE File opened for modification C:\Windows\SysWOW64\WexTarCTx.ExE WexTarCTx.ExE File opened for modification C:\Windows\SysWOW64\ieapfltr.dat temp.exe File created C:\Windows\SysWOW64\WexTarCTx.ExE temp.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\uninstal.bat temp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language temp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WexTarCTx.ExE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2940 temp.exe Token: SeDebugPrivilege 2704 WexTarCTx.ExE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2940 1520 JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe 30 PID 1520 wrote to memory of 2940 1520 JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe 30 PID 1520 wrote to memory of 2940 1520 JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe 30 PID 1520 wrote to memory of 2940 1520 JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe 30 PID 2940 wrote to memory of 2904 2940 temp.exe 32 PID 2940 wrote to memory of 2904 2940 temp.exe 32 PID 2940 wrote to memory of 2904 2940 temp.exe 32 PID 2940 wrote to memory of 2904 2940 temp.exe 32 PID 2940 wrote to memory of 2904 2940 temp.exe 32 PID 2940 wrote to memory of 2904 2940 temp.exe 32 PID 2940 wrote to memory of 2904 2940 temp.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\temp.exe"C:\Users\Admin\AppData\Local\Temp\temp.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat3⤵
- System Location Discovery: System Language Discovery
PID:2904
-
-
-
C:\Windows\SysWOW64\WexTarCTx.ExEC:\Windows\SysWOW64\WexTarCTx.ExE1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134B
MD5d844dfb0f997e4d32cdb6dafa4d7717a
SHA1eaa7b33e52129f946e1aca0ce3cf45a7ce36b5ec
SHA2560f38f96239893411209b61471bb7c2412a8637ce0e5cbf9cc3c23e14ee44759a
SHA512fdeeeda586bf1d748ab962bd579ab3ef69a59ab9306bd3b29663dd496bba31e0a20b62e6076c08bfef44ad821e9dd69e88a29a56d427cbba532947cf91947be5
-
Filesize
743KB
MD542efebba0b23aebc470df8448d9841c3
SHA176f1112262dfa5ab2142832cbf1204c0bd78ae9e
SHA25683a920746478bd0113e59da8a0fcee4e0901bc24b2a1866c49212ebfb08a35cd
SHA512b72be7beff4f452d034426f3d7e34296099000aa480793baf87eb917f65cd3063bfb3b7cf3ac2f961daaa32aa980b0e740e5b7cf3328477897e21d48649b1088