Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe
-
Size
291KB
-
MD5
fe74e997a5467841f5b915450e9d89e4
-
SHA1
e6b1433edb9906c504f0a1afdf7132a825743b22
-
SHA256
73e4ce6e3b6c1e9f92ea8bc8f7d65ff4df1e2ba6d78fad549caf4d226b6e26eb
-
SHA512
c5b372907fe939e6f00c53dee2c0cc5d6c444cc161541c6a10e12e5ee5a9143a9d3fbd3dff648d772f713eea9f38c4370d782ba8f0fa855a3a0eaf9b8a3ea396
-
SSDEEP
6144:qseuhm7O/klr2tqahdbzI6cxVcw5BbE2CApcv2M1XjWLiiacHpdt:MuhmJao5PCACvrTOi9O
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\sysdt.sys winsmm.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\DarkstSer\Parameters\ServiceDll = "C:\\Windows\\system32\\System64.dll" tempdir.exe -
Executes dropped EXE 3 IoCs
pid Process 2660 winsmm.exe 2580 tempdir.exe 2692 tempdir.exe -
Loads dropped DLL 6 IoCs
pid Process 2220 fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe 2220 fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe 2660 winsmm.exe 2660 winsmm.exe 2580 tempdir.exe 2604 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\KMe.bat tempdir.exe File created C:\Windows\SysWOW64\System64.dat tempdir.exe File created C:\Windows\SysWOW64\System64.dll tempdir.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 tempdir.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2660 2220 fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe 28 PID 2220 wrote to memory of 2660 2220 fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe 28 PID 2220 wrote to memory of 2660 2220 fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe 28 PID 2220 wrote to memory of 2660 2220 fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe 28 PID 2660 wrote to memory of 2580 2660 winsmm.exe 29 PID 2660 wrote to memory of 2580 2660 winsmm.exe 29 PID 2660 wrote to memory of 2580 2660 winsmm.exe 29 PID 2660 wrote to memory of 2580 2660 winsmm.exe 29 PID 2580 wrote to memory of 2692 2580 tempdir.exe 30 PID 2580 wrote to memory of 2692 2580 tempdir.exe 30 PID 2580 wrote to memory of 2692 2580 tempdir.exe 30 PID 2580 wrote to memory of 2692 2580 tempdir.exe 30 PID 2692 wrote to memory of 1256 2692 tempdir.exe 21 PID 2692 wrote to memory of 1256 2692 tempdir.exe 21 PID 2692 wrote to memory of 1256 2692 tempdir.exe 21 PID 2692 wrote to memory of 2504 2692 tempdir.exe 32 PID 2692 wrote to memory of 2504 2692 tempdir.exe 32 PID 2692 wrote to memory of 2504 2692 tempdir.exe 32 PID 2692 wrote to memory of 2504 2692 tempdir.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\winsmm.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\winsmm.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\tempdir.exeC:\Users\Admin\AppData\Local\Temp\tempdir.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\tempdir.exeC:\Users\Admin\AppData\Local\Temp\tempdir.exe -Nod325⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\KMe.bat6⤵PID:2504
-
-
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netservice1⤵
- Loads dropped DLL
PID:2604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225KB
MD5c9685a9486c27d37f64fa2521f276d43
SHA13e88a8ada69f5d3b20cec12d731b0b7ecc5c8458
SHA25690a3b7a01912dfdaadaa3cc786fcc18b3837f7330dbb515c295a467db759fe44
SHA51258adc5a80abcfbce73d86f0c9da73e4527a83a2854aa337b14d0c29538e14c2fab32883712664323eef175200e696880b170578d02d5fc625bd8cd7993c07b06
-
Filesize
465KB
MD55e4dda7df4df581270f84feb503c1997
SHA1a625dc8fc1549f6e859bf3d19b2a112728c0b1eb
SHA256916a97987f7171a554de264a8c1786c92d41246073fa8f1a432882466dc125fe
SHA512c890e85ae76602ff23c3a078f3c00a331a8ee8a2c70a624731a34eba278e1b427c1e2e909a904fc278ba2040974be27a5faae36fed59c9e92b951f18280b0cbc
-
Filesize
61B
MD58f3848be53fc40fa7cfceea85e573d16
SHA1f5e07757d091a4549c1b5163d2fa853a0199f55d
SHA256165f6a63e2302b68389779848da0166e5412c53111722885719f616ef5e18b3b
SHA5121ea3b4311bda4032fe5b3e4c1353c654a1d49dc0105f9af5cfee8dedf9ef1a3a1c005e71890bdc87e9ffcee31c4f787ba6f0968cdfc60aa0a7febbca93300577
-
Filesize
162B
MD5c9f55e03623a1ea7f9bcbf13d205e32b
SHA14e9d1f218e21035c4d36fe1b1cb9ca1620dfaabb
SHA256df0e39eedb54ca9eadfd2254e8b263169bc65387be7243a1793afb794c7e0981
SHA5129f5da8106b9ac6cebad0cb67864052a86c044ba3c631bfa742ca9133c1a2f6f79ac3b286b03865ee32ba1089452c9b7fa3e486d1d4390b3586d0e83a5ecd0424
-
Filesize
357KB
MD5a715478f4401f70db0b423b777e6bb1c
SHA16d1ce804cbe10f55147ea5207e9a7a4bf5090c7a
SHA256af04167568ccd9c6700a5f825de9d1a02144cdef1ee651ab2d78c08dbc40a5bb
SHA5120030f6ee04c39bed886d576061f7eb0f6ec60f2d7efd3066c48394b9990161e133d3248ec4ddaa5dcfb6c00de309c9d6e13029a4768acd620dba8cab962b4130