Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 22:15
Static task
static1
Behavioral task
behavioral1
Sample
1184f38a5ab591929c39dc6af3012d50_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1184f38a5ab591929c39dc6af3012d50_JaffaCakes118.dll
Resource
win10v2004-20231215-en
General
-
Target
1184f38a5ab591929c39dc6af3012d50_JaffaCakes118.dll
-
Size
383KB
-
MD5
1184f38a5ab591929c39dc6af3012d50
-
SHA1
28d5e8bcfa8967ec69265fd851f948e185c541de
-
SHA256
ae3de70319b20534d219ae86900c2d54498b91078f76aa4f1a86c6cdb12e6cc9
-
SHA512
1d89eff0e925426e0deaa312c86e6286fcd6ea8e820caab1dbba8e3fdd43d66029e9b4df18115b5cbdb37f227c14ec1eda658ecc97b1539fbfc654ce23817263
-
SSDEEP
6144:IRD4MlqMABEN37jt9ZA3H8DaLCw0w6LhMA8aF8pVqEDFqf1b/3C:IRZQOrcHwwH6tMzaFg8EDcf1r3C
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1224 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wmbdcrujqsagqwc = "\"C:\\Users\\Admin\\AppData\\Roaming\\1I7ATgK\\raserver.exe\"" Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\5299\rrinstaller.exe cmd.exe File opened for modification C:\Windows\system32\5299\rrinstaller.exe cmd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1748 schtasks.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\MSCFile Process not Found Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\MSCFile\shell\open Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\MSCFile\shell\open\command\ = "C:\\Windows\\system32\\cmd.exe /c C:\\Users\\Admin\\AppData\\Local\\Temp\\EsMKWo.cmd" Process not Found Key deleted \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\MSCFile\shell\open\command Process not Found Key deleted \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\MSCFile\shell\open Process not Found Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\MSCFile\shell\open\command Process not Found Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\MSCFile\shell Process not Found Key deleted \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\MSCFile\shell Process not Found Key deleted \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\MSCFile Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2060 rundll32.exe 2060 rundll32.exe 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1172 1224 Process not Found 28 PID 1224 wrote to memory of 1172 1224 Process not Found 28 PID 1224 wrote to memory of 1172 1224 Process not Found 28 PID 1224 wrote to memory of 2448 1224 Process not Found 29 PID 1224 wrote to memory of 2448 1224 Process not Found 29 PID 1224 wrote to memory of 2448 1224 Process not Found 29 PID 1224 wrote to memory of 2668 1224 Process not Found 30 PID 1224 wrote to memory of 2668 1224 Process not Found 30 PID 1224 wrote to memory of 2668 1224 Process not Found 30 PID 1224 wrote to memory of 2672 1224 Process not Found 31 PID 1224 wrote to memory of 2672 1224 Process not Found 31 PID 1224 wrote to memory of 2672 1224 Process not Found 31 PID 1224 wrote to memory of 2436 1224 Process not Found 32 PID 1224 wrote to memory of 2436 1224 Process not Found 32 PID 1224 wrote to memory of 2436 1224 Process not Found 32 PID 1224 wrote to memory of 2228 1224 Process not Found 34 PID 1224 wrote to memory of 2228 1224 Process not Found 34 PID 1224 wrote to memory of 2228 1224 Process not Found 34 PID 2228 wrote to memory of 2652 2228 cmd.exe 36 PID 2228 wrote to memory of 2652 2228 cmd.exe 36 PID 2228 wrote to memory of 2652 2228 cmd.exe 36 PID 1224 wrote to memory of 2272 1224 Process not Found 37 PID 1224 wrote to memory of 2272 1224 Process not Found 37 PID 1224 wrote to memory of 2272 1224 Process not Found 37 PID 1224 wrote to memory of 1956 1224 Process not Found 38 PID 1224 wrote to memory of 1956 1224 Process not Found 38 PID 1224 wrote to memory of 1956 1224 Process not Found 38 PID 1224 wrote to memory of 2724 1224 Process not Found 40 PID 1224 wrote to memory of 2724 1224 Process not Found 40 PID 1224 wrote to memory of 2724 1224 Process not Found 40 PID 2724 wrote to memory of 2736 2724 eventvwr.exe 41 PID 2724 wrote to memory of 2736 2724 eventvwr.exe 41 PID 2724 wrote to memory of 2736 2724 eventvwr.exe 41 PID 2736 wrote to memory of 1748 2736 cmd.exe 43 PID 2736 wrote to memory of 1748 2736 cmd.exe 43 PID 2736 wrote to memory of 1748 2736 cmd.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1184f38a5ab591929c39dc6af3012d50_JaffaCakes118.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
C:\Windows\system32\wimserv.exeC:\Windows\system32\wimserv.exe1⤵PID:1172
-
C:\Windows\system32\gpscript.exeC:\Windows\system32\gpscript.exe1⤵PID:2448
-
C:\Windows\system32\odbcad32.exeC:\Windows\system32\odbcad32.exe1⤵PID:2668
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵PID:2672
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\1k6c512.cmd1⤵PID:2436
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Delete /F /TN "User_Feed_Synchronization-{496a1bfb-bb00-6ae2-db67-52874c80023b}"1⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\system32\schtasks.exeschtasks.exe /Delete /F /TN "User_Feed_Synchronization-{496a1bfb-bb00-6ae2-db67-52874c80023b}"2⤵PID:2652
-
-
C:\Windows\system32\rrinstaller.exeC:\Windows\system32\rrinstaller.exe1⤵PID:2272
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\vHO5HbD.cmd1⤵
- Drops file in System32 directory
PID:1956
-
C:\Windows\System32\eventvwr.exe"C:\Windows\System32\eventvwr.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\EsMKWo.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\system32\schtasks.exeschtasks.exe /Create /F /TN "Awbvuqtgexjqq" /SC minute /MO 60 /TR "C:\Windows\system32\5299\rrinstaller.exe" /RL highest3⤵
- Creates scheduled task(s)
PID:1748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237B
MD57ef2c7b93d85e274143192806a5dba67
SHA1ebbd019ef12cc8e9c6d4ba43f0ffb0b5a7c5ba7a
SHA2562c3ec5c44918f8a7cbb1a91065164e07a9b5bcc5f69acd5093e2ed1458f90985
SHA512a711bae48b297f09662a80ea8b91399bc39ab63ad71420e16b7aee25ed826236c3789a9dcb54afe1ac214e35b7df80acafd62f4b8db5727adebfa015f0c3d6cd
-
Filesize
135B
MD5d3cdeca099e73cebb801c0a83665d690
SHA19d04dfccc38f822a1daff4fd1f97295c7b775536
SHA2568502d35d5f2b1974691e8e13dd773cda87389f9e922cee802ac3f4e0347706ad
SHA51259510dc0cecb112b409a89dfcb9dad167b065207af64ac98b7f518577293117493d2b6fc409c4af52b31494b997d8a02d49a23351de9a27258c2ee71ac656aad
-
Filesize
389KB
MD571326cc6b3f30822699ce524676757b7
SHA1d67ffe3688e5735a25d240904dbacdf151d443f7
SHA256503c32559d1099e0d84fdc9a17d5d576b0a45655a891ec28ce5bcd4244a88913
SHA5125339749d731f984f2c82d0ab575d9496c433e90444d679b5bf90392a4124387cb8e4a921e8dac8d536494b314e2dafffd2c8db558a849b9d366ae7210d665ef1
-
Filesize
385KB
MD5519e68480286e14a0c5fda293afbe6ef
SHA108ce35b09345912c8e683791e46e5be9e37584b5
SHA2561da5fb31642f2cf4e8fe15d29aab3a3977b961f38729ed874bc5209d0936ac48
SHA512d8938b7647c230964d39b9da1ddedc551202a8249ccc9e3c2a63db6b80baa02663f8b033c5a920be71fbe643d9b9718a62d6b0305a5bd0817da7791d1800be40
-
Filesize
195B
MD5254307a96e0b7e73e915b92b51ee8eb2
SHA174eaeff0b202945dd0ed994aff8302056d48d524
SHA2563a3ce79f35675d925710313847ba319aa7cea50a7a8525bb4586f676e6ed8e36
SHA512e8728621e62a50abe43dbf3df56c90c390c8000ca0818f73add86c250bf77f15366173fa36e537426d32094eb1099cc1f66af104e96a68261eb1cf17a92fa4bc
-
Filesize
123KB
MD5cd0bc0b6b8d219808aea3ecd4e889b19
SHA19f8f4071ce2484008e36fdfd963378f4ebad703f
SHA25616abc530c0367df1ad631f09e14c565cf99561949aa14acc533cd54bf8a5e22c
SHA51284291ea3fafb38ef96817d5fe4a972475ef8ea24a4353568029e892fa8e15cf8e8f6ef4ff567813cd3b38092f0db4577d9dccb22be755eebdd4f77e623dc80ac
-
Filesize
894B
MD53b3a4895ea2b10f27108379f306186e2
SHA1cc7b57d58d0e808f840db32496cfd5d3f4185e59
SHA256fa5f1a69f4262c1e063e84ca46affb6f68c6c9640441fac44127b63de45ac50d
SHA512bda103e488fb45bf9079ea7a7b74ec34d25e0f900462ed22c2f1af4050cf74eb1283e64118ec42080992bcb7f0a13b02bdb791358cc942f63363dcba559868bd