Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe
-
Size
477KB
-
MD5
f4891c4b2d5d817c50477bb8fa11c0a4
-
SHA1
ce348c1ffa3a29ae6d318d9ab1f3fdede334e24a
-
SHA256
598667091482e960508b94f2f46f6a6895afe071f3e37cd27cb4989865c2ee86
-
SHA512
a545659229b733c74c7f402bcca6fe037ca53d11f4f07a2b62938474d2c22a5a9be77348967fb3a06ef6cd28dfd0da420b129a8c80d526e176c7d907c76f075e
-
SSDEEP
6144:5JzKf/zmCja4qQmQCrcbnFuuUcTFx0T21BOcCSaa1MSSB6T1KpQcHCbhI:5JY1ja4qQ+rcbFudkuN/S/1MSSPQcHKa
Malware Config
Extracted
formbook
3.9
fr
geturstuff.life
kisakollections.com
bkipmtahuna.com
aoxou.com
thebigandfreeupdates.download
utvtribe.com
icontoken.com
naturexperience.com
h2sentertainmentcafe.com
careerproresumepa.com
franchiseindia.directory
psychouniversity.com
traveng.com
mylifestylebyclem.com
greentmraelty.com
imoneg.com
lupusrebelacademy.com
ghqxc.info
lylulidbd.com
dalfreestyle.com
cloudinerd.com
nexuscero.com
teacherqiu.com
thegotore.com
xn--uj1aq81b.ink
aj7u52.com
livingbcnarea.com
olbst.com
rane.ltd
awesomecoopervip.com
kxmdq.com
mamahux.info
mailserverlayer.net
livelearnheal.net
faizki.com
myclarabella.com
adxcreative.net
becomeoneevents.com
village-gabarrier.com
portablestations.com
routerlogin.tips
news3038.ltd
joyfashionclothes.com
wzlghb.com
boxcleversashwindows.com
mikesquickdeals4u.com
lossensuales.com
carinsurancequotesowc.info
hapuo.com
brandongallups.com
preloadmypc.com
nbmimc.com
zengerfarm.com
microfibrebeachtowel.com
runamokproductions.com
bjtaiyan.com
depressiontalks.com
rememberaways.info
xionolif.world
988qipaiq.com
bzlouti.com
candidofleitas.com
arnieslonglifetea.com
xbelief.com
smaleg.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2348-22-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/2348-27-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/2276-33-0x0000000000080000-0x00000000000AA000-memory.dmp formbook behavioral1/memory/2276-40-0x0000000000080000-0x00000000000AA000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 2484 syscheck.exe 2348 syscheck.exe -
Loads dropped DLL 2 IoCs
pid Process 2372 cmd.exe 2484 syscheck.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\sysmgr = "C:\\Users\\Admin\\AppData\\Local\\syscheck.exe -boot" syscheck.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2484 set thread context of 2348 2484 syscheck.exe 35 PID 2348 set thread context of 1324 2348 syscheck.exe 21 PID 2276 set thread context of 1324 2276 svchost.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2348 syscheck.exe 2348 syscheck.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2348 syscheck.exe 2348 syscheck.exe 2348 syscheck.exe 2276 svchost.exe 2276 svchost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2772 f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe Token: SeDebugPrivilege 2484 syscheck.exe Token: SeDebugPrivilege 2348 syscheck.exe Token: SeDebugPrivilege 2276 svchost.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2848 2772 f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe 28 PID 2772 wrote to memory of 2848 2772 f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe 28 PID 2772 wrote to memory of 2848 2772 f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe 28 PID 2772 wrote to memory of 2848 2772 f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe 28 PID 2772 wrote to memory of 2372 2772 f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe 32 PID 2772 wrote to memory of 2372 2772 f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe 32 PID 2772 wrote to memory of 2372 2772 f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe 32 PID 2772 wrote to memory of 2372 2772 f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe 32 PID 2372 wrote to memory of 2484 2372 cmd.exe 34 PID 2372 wrote to memory of 2484 2372 cmd.exe 34 PID 2372 wrote to memory of 2484 2372 cmd.exe 34 PID 2372 wrote to memory of 2484 2372 cmd.exe 34 PID 2484 wrote to memory of 2348 2484 syscheck.exe 35 PID 2484 wrote to memory of 2348 2484 syscheck.exe 35 PID 2484 wrote to memory of 2348 2484 syscheck.exe 35 PID 2484 wrote to memory of 2348 2484 syscheck.exe 35 PID 2484 wrote to memory of 2348 2484 syscheck.exe 35 PID 2484 wrote to memory of 2348 2484 syscheck.exe 35 PID 2484 wrote to memory of 2348 2484 syscheck.exe 35 PID 1324 wrote to memory of 2276 1324 Explorer.EXE 36 PID 1324 wrote to memory of 2276 1324 Explorer.EXE 36 PID 1324 wrote to memory of 2276 1324 Explorer.EXE 36 PID 1324 wrote to memory of 2276 1324 Explorer.EXE 36 PID 2276 wrote to memory of 1708 2276 svchost.exe 37 PID 2276 wrote to memory of 1708 2276 svchost.exe 37 PID 2276 wrote to memory of 1708 2276 svchost.exe 37 PID 2276 wrote to memory of 1708 2276 svchost.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵PID:2848
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\syscheck.exe"C:\Users\Admin\AppData\Local\syscheck.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\syscheck.exe"C:\Users\Admin\AppData\Local\syscheck.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵PID:1708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
477KB
MD5f4891c4b2d5d817c50477bb8fa11c0a4
SHA1ce348c1ffa3a29ae6d318d9ab1f3fdede334e24a
SHA256598667091482e960508b94f2f46f6a6895afe071f3e37cd27cb4989865c2ee86
SHA512a545659229b733c74c7f402bcca6fe037ca53d11f4f07a2b62938474d2c22a5a9be77348967fb3a06ef6cd28dfd0da420b129a8c80d526e176c7d907c76f075e