Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 05:27
Static task
static1
Behavioral task
behavioral1
Sample
e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe
-
Size
612KB
-
MD5
e9530aac236ab40d5367665b55ac3bf9
-
SHA1
ccd887876fcee56286d31701ecb7f247c4be561c
-
SHA256
033884253a7a0d50221370381907ecaf9e2170da522a214b270ca5409d8f55e8
-
SHA512
b83f1a2bc0f69c86a070b15ceb534cd8b7eaf9dfdf0e427607279458b40697b2ff651c567d5f7787649f04de8352fc199b567fa3956b4d74c3253fc0e75a9a8e
-
SSDEEP
12288:fiWaUgkDhOPo0VdfG1mIn0sSelRnlUZrHQ:fiWDgkAJH6m0hl9lUtw
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wauclt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wauclt.exe -
Executes dropped EXE 1 IoCs
pid Process 2524 wauclt.exe -
Loads dropped DLL 2 IoCs
pid Process 2904 e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe 2904 e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Generic Host = "wauclt.exe" e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\wauclt.exe e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wauclt.exe e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wauclt.exe wauclt.exe File created C:\Windows\SysWOW64\wauclt.exe wauclt.exe -
Modifies registry class 17 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32\14.0.0.0 e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32\14.0.0.0\Assembly = "Microsoft.Office.Interop.Access, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32\14.0.0.0\Class = "Microsoft.Office.Interop.Access.AllDataAccessPagesClass" e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\onxjW = "@bWX_TOL\\IHfij~p" wauclt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\onxjW = "@bWX\\TOL\\IDkUPnH" wauclt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32\Class = "Microsoft.Office.Interop.Access.AllDataAccessPagesClass" e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32\RuntimeVersion = "v2.0.50727" e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ujBimbVoPur = "K^MFU_FMlfgXi@iTMWmH[bKBQe" wauclt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\CxWrypqypaea = "ahbHulentG_bwNVKr\x7fnAv{ST" wauclt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32 e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32\14.0.0.0\RuntimeVersion = "v2.0.50727" e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\civudS = "pXMblZ~^aTCqd{XBjvYLxDi" wauclt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\CxWrypqypaea = "ahbHulentG_bGNVKr\x7fnAF{ST" wauclt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA} e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32\Assembly = "Microsoft.Office.Interop.Access, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\vymxrn = "UR_iiFdhtfB{jlkh^I^llDPf^jBqFoIK" wauclt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\gdbycerkpn = "JPATlIBvCneUgHMNA_jd\\gEN|S" wauclt.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\ProgramData\TEMP:C980DA7D wauclt.exe File created C:\ProgramData\TEMP:C980DA7D wauclt.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2904 e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2904 e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Token: 33 2524 wauclt.exe Token: SeIncBasePriorityPrivilege 2524 wauclt.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2524 2904 e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2524 2904 e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2524 2904 e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2524 2904 e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\wauclt.exe"C:\Windows/system32\wauclt.exe"2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
612KB
MD5e9530aac236ab40d5367665b55ac3bf9
SHA1ccd887876fcee56286d31701ecb7f247c4be561c
SHA256033884253a7a0d50221370381907ecaf9e2170da522a214b270ca5409d8f55e8
SHA512b83f1a2bc0f69c86a070b15ceb534cd8b7eaf9dfdf0e427607279458b40697b2ff651c567d5f7787649f04de8352fc199b567fa3956b4d74c3253fc0e75a9a8e