Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2025, 21:23
Behavioral task
behavioral1
Sample
JaffaCakes118_7bc04706079ee3a6c7375ae98b08145f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7bc04706079ee3a6c7375ae98b08145f.exe
Resource
win10v2004-20250313-en
General
-
Target
JaffaCakes118_7bc04706079ee3a6c7375ae98b08145f.exe
-
Size
28KB
-
MD5
7bc04706079ee3a6c7375ae98b08145f
-
SHA1
ab9a9bd4518f785042ed605f4c845c5d7c5f7423
-
SHA256
2069199d07ce5ec4adf7b76c5e38cf404ba0e2f5d88c1e8e2aaf0ef96e09436f
-
SHA512
1db82b15516a1f223f9eabdfe69987b653bfb497186448fb457d6f04038caa0e405536e130f84d56ddb46a1f6b76cd079f2849a4eb0214b67832c9c6afc2e716
-
SSDEEP
384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNJjBR:Dv8IRRdsxq1DjJcqfi7
Malware Config
Signatures
-
Detects MyDoom family 10 IoCs
resource yara_rule behavioral2/memory/3944-13-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/3944-32-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/3944-37-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/3944-237-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/3944-251-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/3944-258-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/3944-275-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/3944-295-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/3944-297-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/3944-307-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 3652 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" JaffaCakes118_7bc04706079ee3a6c7375ae98b08145f.exe -
resource yara_rule behavioral2/memory/3944-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x00080000000241f2-4.dat upx behavioral2/memory/3652-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3944-13-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3652-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3652-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3652-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3652-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3652-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3944-32-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3652-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3944-37-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3652-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x000f000000024008-48.dat upx behavioral2/memory/3944-237-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3652-239-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3944-251-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3652-252-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3652-257-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3944-258-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3652-259-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3944-275-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3652-276-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3944-295-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3652-296-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3944-297-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3652-298-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3944-307-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3652-308-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\java.exe JaffaCakes118_7bc04706079ee3a6c7375ae98b08145f.exe File created C:\Windows\java.exe JaffaCakes118_7bc04706079ee3a6c7375ae98b08145f.exe File created C:\Windows\services.exe JaffaCakes118_7bc04706079ee3a6c7375ae98b08145f.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7bc04706079ee3a6c7375ae98b08145f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3944 wrote to memory of 3652 3944 JaffaCakes118_7bc04706079ee3a6c7375ae98b08145f.exe 86 PID 3944 wrote to memory of 3652 3944 JaffaCakes118_7bc04706079ee3a6c7375ae98b08145f.exe 86 PID 3944 wrote to memory of 3652 3944 JaffaCakes118_7bc04706079ee3a6c7375ae98b08145f.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7bc04706079ee3a6c7375ae98b08145f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7bc04706079ee3a6c7375ae98b08145f.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD5493728881335de65dcd285a8d61dd11d
SHA1ddf860008603ef18132f01115c25ecb3218d7522
SHA256af8db95a154873937702db4b459840c1d97c2fa27381ac3ec4852fdef74af0ba
SHA512094dc55895f70f3fabb4aa005121778bb0597ddf0894beb32c1850636b79eba2aacb20599882108a25b391210aa5a4f580ad6548e82b8285f52e9eaa850dba04
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
138KB
MD5d08f4f64a1918425ccb8f15f327f82e1
SHA1f67fa44077ee68828edeaca23e2cce1d81ff1371
SHA256c5f3cce8c065c3eb4d67edf03ec0bda7bc1c8bc880e978b0704133be22d912fd
SHA512eadc5adf86d2c9aa18363eeb687d80854128a621cb8cdcfd0f324e2b096aec7c846ffa2051020995ed077a6c67a2d65beda229db3a09434ca4406bde7f597fbb
-
Filesize
153KB
MD5996b0a91f29d3443352f3785fd9bd2ce
SHA1bdaaa7c921524eb25b2ddbaa0721eb3d2b67a551
SHA25651ffc3390e5031a5b02d8621a2b005b9e8b5d57d39ffab29afe6ed2f487fc129
SHA512161e28f38157fc1d463792713709013b252211be6b3c5305b6e5fa134849534a57955c620de57db447497715ad971e75aae5b7454175edcfd04b685ee13f5850
-
Filesize
1KB
MD568117ef88bd5ac8ec55fa1360e00804c
SHA1d9205007e8eecb17fbe4a9267a3278e4dc52811c
SHA256f26fb812f82dd2a4a3a7a83a98e0154394a37c66edbf9e24a8ee95db9aa35ae3
SHA512a71cb30b5955bb60c3ad61d2bd6e18f427e347b0120e017d1a004b27f1128975986d9451a64147af6add5cd1ca1c3fa403554b988434eb60a1f7228af653f15d
-
Filesize
28KB
MD5758c1ea9e4d07156a4648ab287744b43
SHA1d4e6f059e9e08e09cf2b523b938d6fad2fad45ed
SHA25638495684187e7c06599883bd53be91a513ef603eba472526278b290992006485
SHA512d0436298aa4e67981194a3cb32f539f0a2bf28b798d9bb2b11a1bcd663b0eda9e8f0d8f576ae28ca5416c823b7f9936afbfc9852b1455d0978028754bab65b6c
-
Filesize
1KB
MD5248eb63ceef9a177bba68d2ce492c50b
SHA1a5b3394d8d053637b7d92a60eae387ddf68a9ac3
SHA256dd4ee029e2caf3ec1f99023f8ba2a7109f870c9717a1373aaf399573e8241514
SHA51204d0ad9063adeb2d36a5e85a0d7033bac4e8b931415464edc4687604c322202a49189c51b958ef407e8b085adc98c7cf5ea4d61073636b12837b55d25698b409
-
Filesize
1KB
MD5b12cc15b32b5e8064bf367d8e0c1b9a5
SHA156bd693f6510caaee4457527f285482970ebb1df
SHA2568c8c576c6b039151cf3f60bcc348f2359abcfea5151ee560f885359a87e73313
SHA51291fdb0995daf60eaef232c348e19768da5bc2514097321908e1c9eef96475b8424c0da4eb8ec578ca80eeaebfca163c1c34f59e36727613b9f3d8e36bc17e938
-
Filesize
1KB
MD54698a4547ecf10f4eeaecbb11ee48d81
SHA10c08f3fb7cc1ebd5c4afd297ba3ca4e236095e1b
SHA256928e1b79bb1acaf267e65f713741092a10c1ff5a5c0c2bd307f9191a9290fe68
SHA512f3574528e4f0aa8c96550b091026b4ad12884acb1238ff89c0db38e7144effafcc951df07e36f7ab936029fc21efa9595d876ddc1f6db50cabf21e99e22fb512
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2