Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe
-
Size
328KB
-
MD5
e829934a28cd2b212e09525cda51635d
-
SHA1
8472ffa2bee3c27fbb4454b06027ec628275334c
-
SHA256
6b4606e6f32523d2fa2097c0703d2f84f2aaf318a3821f3b759c4a5a1ab0fd61
-
SHA512
365d607c176bd9ece4a6183aad8ef698c52d0decba85472c2058bd2f30dbd88490830e89cdbb8c200d9e724ea82dd383a78fe988a8d9b939234c041966340b6f
-
SSDEEP
6144:dC3oPrJnHlNJweWmNZM0DLPd6qzFO2slVwweUmlDh+boi0GaX:7lNGe3M8Z5pO2s3Ppmhh+sc
Malware Config
Extracted
cybergate
v1.07.5
victim
127.0.0.1:999
diaporama.servepics.com:2323
7Y20846FVL0PVO
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
diaporama.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456a
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\diaporama.exe" vbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\diaporama.exe" vbc.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{K2S81S3P-Y3KC-Q4OO-HDH5-77JFC7RJHA5S} vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{K2S81S3P-Y3KC-Q4OO-HDH5-77JFC7RJHA5S}\StubPath = "C:\\Windows\\system32\\install\\diaporama.exe Restart" vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\msconfig = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\System\\Services\\msconfig.exe" e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\diaporama.exe" vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\diaporama.exe" vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\msconfig = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\System\\Services\\msconfig.exe" e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\diaporama.exe vbc.exe File opened for modification C:\Windows\SysWOW64\install\diaporama.exe vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2904 set thread context of 2680 2904 e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe 28 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2904 e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe 2904 e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe 2904 e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe 2904 e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe 2904 e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe 2904 e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe 2904 e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe 2680 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2904 e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2680 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2680 2904 e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2680 2904 e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2680 2904 e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2680 2904 e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2680 2904 e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2680 2904 e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2680 2904 e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2680 2904 e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2680 2904 e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2680 2904 e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2680 2904 e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2680 2904 e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe 28 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21 PID 2680 wrote to memory of 1352 2680 vbc.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e829934a28cd2b212e09525cda51635d_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵PID:2196
-
-
-