Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 03:43
Behavioral task
behavioral1
Sample
28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118.exe
-
Size
917KB
-
MD5
28260a8f637d0d6dfdad0461e24eacac
-
SHA1
14e42641eb6cd50a37fea63bf7c11b69f30eb3a6
-
SHA256
a58d0d19ebeb7f3ff0ad74eb9606a71a7d3960099ba5de5b295f79dcd4216a2d
-
SHA512
3a29c8a837f225c64534bd786ae6d935f857fb94b5a9f44ae8e56a3f2d3e6d6175ca0d60f4bc7c5cce441bbb4e49a1ef0ae1334e5ede8e836da7e618a3b2246d
-
SSDEEP
24576:oBT4MROxnFD3XEsYxrZlI0AilFEvxHi0/:oB0MiJirZlI0AilFEvxHi
Malware Config
Extracted
orcus
0.tcp.ngrok.io:10836
f3b2c54fefc748608450f2a783561b9b
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
%programfiles%\sysfiles\svchost.exe
-
reconnect_delay
10000
-
registry_keyname
OWO
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\wd.exe
Signatures
-
Orcus main payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000015136-40.dat family_orcus -
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral1/memory/2464-41-0x0000000000800000-0x00000000008EA000-memory.dmp orcus behavioral1/files/0x0008000000015136-40.dat orcus -
Executes dropped EXE 6 IoCs
pid Process 2712 WindowsInput.exe 2740 WindowsInput.exe 2464 svchost.exe 2996 svchost.exe 2936 wd.exe 2352 wd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\OWO = "\"C:\\Program Files\\sysfiles\\svchost.exe\"" svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 0.tcp.ngrok.io 4 0.tcp.ngrok.io -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsInput.exe 28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118.exe File created C:\Windows\SysWOW64\WindowsInput.exe.config 28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118.exe File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\sysfiles\svchost.exe 28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118.exe File opened for modification C:\Program Files\sysfiles\svchost.exe 28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118.exe File created C:\Program Files\sysfiles\svchost.exe.config 28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2352 wd.exe 2352 wd.exe 2352 wd.exe 2464 svchost.exe 2352 wd.exe 2464 svchost.exe 2352 wd.exe 2464 svchost.exe 2352 wd.exe 2352 wd.exe 2464 svchost.exe 2464 svchost.exe 2352 wd.exe 2352 wd.exe 2464 svchost.exe 2464 svchost.exe 2352 wd.exe 2464 svchost.exe 2352 wd.exe 2352 wd.exe 2464 svchost.exe 2352 wd.exe 2464 svchost.exe 2464 svchost.exe 2352 wd.exe 2352 wd.exe 2464 svchost.exe 2352 wd.exe 2464 svchost.exe 2352 wd.exe 2464 svchost.exe 2352 wd.exe 2464 svchost.exe 2464 svchost.exe 2352 wd.exe 2464 svchost.exe 2352 wd.exe 2464 svchost.exe 2352 wd.exe 2352 wd.exe 2464 svchost.exe 2464 svchost.exe 2352 wd.exe 2464 svchost.exe 2352 wd.exe 2464 svchost.exe 2352 wd.exe 2352 wd.exe 2464 svchost.exe 2352 wd.exe 2464 svchost.exe 2352 wd.exe 2464 svchost.exe 2352 wd.exe 2464 svchost.exe 2464 svchost.exe 2352 wd.exe 2464 svchost.exe 2352 wd.exe 2352 wd.exe 2464 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2936 wd.exe Token: SeDebugPrivilege 2464 svchost.exe Token: SeDebugPrivilege 2352 wd.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2464 svchost.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2464 svchost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 912 wrote to memory of 2308 912 28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118.exe 28 PID 912 wrote to memory of 2308 912 28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118.exe 28 PID 912 wrote to memory of 2308 912 28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118.exe 28 PID 2308 wrote to memory of 2116 2308 csc.exe 30 PID 2308 wrote to memory of 2116 2308 csc.exe 30 PID 2308 wrote to memory of 2116 2308 csc.exe 30 PID 912 wrote to memory of 2712 912 28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118.exe 31 PID 912 wrote to memory of 2712 912 28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118.exe 31 PID 912 wrote to memory of 2712 912 28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118.exe 31 PID 912 wrote to memory of 2464 912 28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118.exe 33 PID 912 wrote to memory of 2464 912 28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118.exe 33 PID 912 wrote to memory of 2464 912 28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118.exe 33 PID 2464 wrote to memory of 2936 2464 svchost.exe 35 PID 2464 wrote to memory of 2936 2464 svchost.exe 35 PID 2464 wrote to memory of 2936 2464 svchost.exe 35 PID 2464 wrote to memory of 2936 2464 svchost.exe 35 PID 556 wrote to memory of 2996 556 taskeng.exe 36 PID 556 wrote to memory of 2996 556 taskeng.exe 36 PID 556 wrote to memory of 2996 556 taskeng.exe 36 PID 2936 wrote to memory of 2352 2936 wd.exe 37 PID 2936 wrote to memory of 2352 2936 wd.exe 37 PID 2936 wrote to memory of 2352 2936 wd.exe 37 PID 2936 wrote to memory of 2352 2936 wd.exe 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\28260a8f637d0d6dfdad0461e24eacac_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\edjt1h-y.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES147B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC147A.tmp"3⤵PID:2116
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2712
-
-
C:\Program Files\sysfiles\svchost.exe"C:\Program Files\sysfiles\svchost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Roaming\wd.exe"C:\Users\Admin\AppData\Roaming\wd.exe" /launchSelfAndExit "C:\Program Files\sysfiles\svchost.exe" 24643⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Roaming\wd.exe"C:\Users\Admin\AppData\Roaming\wd.exe" /watchProcess "C:\Program Files\sysfiles\svchost.exe" 24644⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
PID:2740
-
C:\Windows\system32\taskeng.exetaskeng.exe {2A1B3741-57A0-497D-9058-1948543930B0} S-1-5-21-2297530677-1229052932-2803917579-1000:HKULBIBU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Program Files\sysfiles\svchost.exe"C:\Program Files\sysfiles\svchost.exe"2⤵
- Executes dropped EXE
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
917KB
MD528260a8f637d0d6dfdad0461e24eacac
SHA114e42641eb6cd50a37fea63bf7c11b69f30eb3a6
SHA256a58d0d19ebeb7f3ff0ad74eb9606a71a7d3960099ba5de5b295f79dcd4216a2d
SHA5123a29c8a837f225c64534bd786ae6d935f857fb94b5a9f44ae8e56a3f2d3e6d6175ca0d60f4bc7c5cce441bbb4e49a1ef0ae1334e5ede8e836da7e618a3b2246d
-
Filesize
1KB
MD5ba49c59bee6614eea0669b52b7f4fe06
SHA18c7c25d989782854277a42f47406b0ef6f107ea0
SHA256005ce981357f9fc99f3ccd0af52ec654558e7f02ee1376533f6ab89e403a8e22
SHA512d46394a8abae13755b2cd8f89f9869c48d71e4a312fceb045c2a50b9ea43e7bf84ac49809fd427b3d5a160a80c9270f0a57a25f29dee92fcd6d389e98d5a9e91
-
Filesize
76KB
MD59dc5b6294543a5dae558536fc314e178
SHA1c07936d0779ffb359607329b7e602bb96b5c2cf2
SHA256bda6c5eb0c2a5fcb060b4b1c27a15ee054700c4d15bd4d7c5f6640520457b219
SHA512eadbb2ec54e6927d3d1a8c6979ebbe44b599fef0d900d9c4b4c700fcaab25e99cd0376c0cf0c23db4daee4bcea9f80305315a52cd066db6cf2b1ae2bfc389805
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
676B
MD50e722fcc3447d91bde191485603fb762
SHA1dc7d1fbd05c74c99002431d874d453aa39ba546d
SHA256801292bdbadd8a7dd9b70020b7db18f09dab07e68a23855983611d5cb8e9b4f3
SHA5128265ca8747e78617bc7a6c75b983e5b4d0a9f14de0b73cf53128ff24ddd647d2acf0303f2b943f2dc09c73fc905f813f31f23c351848b2b384e68f72c0c94ab6
-
Filesize
208KB
MD5c555d9796194c1d9a1310a05a2264e08
SHA182641fc4938680519c3b2e925e05e1001cbd71d7
SHA256ccbb8fd27ab2f27fbbd871793886ff52ff1fbd9117c98b8d190c1a96b67e498a
SHA5120b85ca22878998c7697c589739905b218f9b264a32c8f99a9f9dd73d0687a5de46cc7e851697ee16424baf94d301e411648aa2d061ac149a6d2e06b085e07090
-
Filesize
349B
MD5ab80ee41a1d7553579bf4adb25c7c89a
SHA1eee019e68dd86e34c7526692d93e93e9858c6f78
SHA25676afa9ee6715ace824ab3bf5646ecbdab3a53ec70948fbea49571f5285f0bb31
SHA5127ff1786adda3204f786270260fd7c5a3e3bcb0c8ccd467327c6b243ddd9f3c282170837005a0e314a2233bb3099a792b250374bc4836ea2c2bb333ccc27d49c0