Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 21:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
01ae95f72f3b376e69b040c948a6c8f0_JaffaCakes118.exe
Resource
win7-20240221-en
7 signatures
150 seconds
General
-
Target
01ae95f72f3b376e69b040c948a6c8f0_JaffaCakes118.exe
-
Size
540KB
-
MD5
01ae95f72f3b376e69b040c948a6c8f0
-
SHA1
f6b7e259e6af97140e8b036811f08b2bc65ed3aa
-
SHA256
88f627d22a0002a90f5a3ba45e978aa8981e8ab9779d27939a2137ea7454ba16
-
SHA512
325f2a0a7bba951091e2c646bacb394760244e722487e8e4fddbd09850c96316444579fba40c2c0dd933de780ab19da8ca9fc869129b0068a8df7e6a38de1917
-
SSDEEP
6144:gbNTTjhnyC/OND+TAHQconU81eXbZAVeporZBwJgZuRhNYIU/H8tsOYnQ9:gbNTxyC2NmAHQfnCZANZTIU/H8tsj
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mfidlduplex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 22 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mfidlduplex.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00eb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mfidlduplex.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{52762615-43A3-422F-A9D9-1D71310E9262}\WpadDecisionTime = a052ca2c1f98da01 mfidlduplex.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-3a-ff-9b-33-9c\WpadDecisionReason = "1" mfidlduplex.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-3a-ff-9b-33-9c\WpadDecisionTime = a052ca2c1f98da01 mfidlduplex.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-3a-ff-9b-33-9c\WpadDecision = "0" mfidlduplex.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{52762615-43A3-422F-A9D9-1D71310E9262}\WpadDecisionTime = 000c91791f98da01 mfidlduplex.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mfidlduplex.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mfidlduplex.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{52762615-43A3-422F-A9D9-1D71310E9262} mfidlduplex.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{52762615-43A3-422F-A9D9-1D71310E9262}\WpadDecision = "0" mfidlduplex.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-3a-ff-9b-33-9c mfidlduplex.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00eb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mfidlduplex.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-3a-ff-9b-33-9c\WpadDecisionTime = 000c91791f98da01 mfidlduplex.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{52762615-43A3-422F-A9D9-1D71310E9262}\WpadNetworkName = "Network 3" mfidlduplex.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{52762615-43A3-422F-A9D9-1D71310E9262}\de-3a-ff-9b-33-9c mfidlduplex.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-3a-ff-9b-33-9c\WpadDetectedUrl mfidlduplex.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mfidlduplex.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mfidlduplex.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mfidlduplex.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mfidlduplex.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{52762615-43A3-422F-A9D9-1D71310E9262}\WpadDecisionReason = "1" mfidlduplex.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2936 01ae95f72f3b376e69b040c948a6c8f0_JaffaCakes118.exe 2120 01ae95f72f3b376e69b040c948a6c8f0_JaffaCakes118.exe 2300 mfidlduplex.exe 2672 mfidlduplex.exe 2672 mfidlduplex.exe 2672 mfidlduplex.exe 2672 mfidlduplex.exe 2672 mfidlduplex.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2120 01ae95f72f3b376e69b040c948a6c8f0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2120 2936 01ae95f72f3b376e69b040c948a6c8f0_JaffaCakes118.exe 28 PID 2936 wrote to memory of 2120 2936 01ae95f72f3b376e69b040c948a6c8f0_JaffaCakes118.exe 28 PID 2936 wrote to memory of 2120 2936 01ae95f72f3b376e69b040c948a6c8f0_JaffaCakes118.exe 28 PID 2936 wrote to memory of 2120 2936 01ae95f72f3b376e69b040c948a6c8f0_JaffaCakes118.exe 28 PID 2300 wrote to memory of 2672 2300 mfidlduplex.exe 30 PID 2300 wrote to memory of 2672 2300 mfidlduplex.exe 30 PID 2300 wrote to memory of 2672 2300 mfidlduplex.exe 30 PID 2300 wrote to memory of 2672 2300 mfidlduplex.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\01ae95f72f3b376e69b040c948a6c8f0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\01ae95f72f3b376e69b040c948a6c8f0_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\01ae95f72f3b376e69b040c948a6c8f0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\01ae95f72f3b376e69b040c948a6c8f0_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2120
-
-
C:\Windows\SysWOW64\mfidlduplex.exe"C:\Windows\SysWOW64\mfidlduplex.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\mfidlduplex.exe"C:\Windows\SysWOW64\mfidlduplex.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2672
-