Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 23:02
Behavioral task
behavioral1
Sample
4d72427546c5c7cd35e256401e80a030_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
4d72427546c5c7cd35e256401e80a030_JaffaCakes118.exe
-
Size
921KB
-
MD5
4d72427546c5c7cd35e256401e80a030
-
SHA1
d71c9ef0a220b89d1724584054ba0ed303b149a3
-
SHA256
c91a6632c59372e0af003bd914f91ca513a20861ac18a4a58e719e8307846935
-
SHA512
61f3d0f4772d20685dc41ab809c2f8f84fec4a0e64dbb0589a3663495472045841f99005d863b90622c92352225d6ecd98a055594404979b87a8cdad19af3c78
-
SSDEEP
24576:wRo4MROxnFl64vrZlI0AilFEvxHiAHGWM:wRLMiDrZlI0AilFEvxHi
Malware Config
Extracted
orcus
bambuvn.webhop.info:1352
ae9225f4fc36499e85213e441bb22bf6
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%programfiles%\Internet Explorer\svchost.exe
-
reconnect_delay
10000
-
registry_keyname
Updater Chrome
-
taskscheduler_taskname
Updater Chrome
-
watchdog_path
AppData\Taskmanagers.exe
Signatures
-
Orcus main payload 1 IoCs
resource yara_rule behavioral1/files/0x0009000000014b31-42.dat family_orcus -
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral1/memory/2488-43-0x0000000001390000-0x000000000147C000-memory.dmp orcus behavioral1/files/0x0009000000014b31-42.dat orcus -
Executes dropped EXE 3 IoCs
pid Process 2752 WindowsInput.exe 2628 WindowsInput.exe 2488 svchost.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsInput.exe 4d72427546c5c7cd35e256401e80a030_JaffaCakes118.exe File created C:\Windows\SysWOW64\WindowsInput.exe.config 4d72427546c5c7cd35e256401e80a030_JaffaCakes118.exe File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\svchost.exe 4d72427546c5c7cd35e256401e80a030_JaffaCakes118.exe File opened for modification C:\Program Files\Internet Explorer\svchost.exe 4d72427546c5c7cd35e256401e80a030_JaffaCakes118.exe File created C:\Program Files\Internet Explorer\svchost.exe.config 4d72427546c5c7cd35e256401e80a030_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2488 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2488 svchost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1936 wrote to memory of 1956 1936 4d72427546c5c7cd35e256401e80a030_JaffaCakes118.exe 28 PID 1936 wrote to memory of 1956 1936 4d72427546c5c7cd35e256401e80a030_JaffaCakes118.exe 28 PID 1936 wrote to memory of 1956 1936 4d72427546c5c7cd35e256401e80a030_JaffaCakes118.exe 28 PID 1956 wrote to memory of 1780 1956 csc.exe 30 PID 1956 wrote to memory of 1780 1956 csc.exe 30 PID 1956 wrote to memory of 1780 1956 csc.exe 30 PID 1936 wrote to memory of 2752 1936 4d72427546c5c7cd35e256401e80a030_JaffaCakes118.exe 31 PID 1936 wrote to memory of 2752 1936 4d72427546c5c7cd35e256401e80a030_JaffaCakes118.exe 31 PID 1936 wrote to memory of 2752 1936 4d72427546c5c7cd35e256401e80a030_JaffaCakes118.exe 31 PID 1936 wrote to memory of 2488 1936 4d72427546c5c7cd35e256401e80a030_JaffaCakes118.exe 33 PID 1936 wrote to memory of 2488 1936 4d72427546c5c7cd35e256401e80a030_JaffaCakes118.exe 33 PID 1936 wrote to memory of 2488 1936 4d72427546c5c7cd35e256401e80a030_JaffaCakes118.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d72427546c5c7cd35e256401e80a030_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4d72427546c5c7cd35e256401e80a030_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hasmg9ro.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA8D.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA8C.tmp"3⤵PID:1780
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2752
-
-
C:\Program Files\Internet Explorer\svchost.exe"C:\Program Files\Internet Explorer\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2488
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
PID:2628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
921KB
MD54d72427546c5c7cd35e256401e80a030
SHA1d71c9ef0a220b89d1724584054ba0ed303b149a3
SHA256c91a6632c59372e0af003bd914f91ca513a20861ac18a4a58e719e8307846935
SHA51261f3d0f4772d20685dc41ab809c2f8f84fec4a0e64dbb0589a3663495472045841f99005d863b90622c92352225d6ecd98a055594404979b87a8cdad19af3c78
-
Filesize
1KB
MD5ee63ca9c35cc0f2577d4d790d4445779
SHA18d9db6c81815ea8fe1931a63d025ed717c876d17
SHA25644f10ebcbad50a5ba6cafa15975d4b9fbf786b4bdcbcfc51249f0451620dc74a
SHA5123a96e028df5182d3aaccc55223ce8f3f881cfb7e0464fc8323bf8bc5b1c0c4719eb2b7ef6fb985c3a5057e03eb7a63e43d2f705f89b22cfa8bf57a1b995a1db4
-
Filesize
76KB
MD5f428d5c0e82571cc47f9e7364f812305
SHA18b92992ec9512731fc9deca232b8d35dd874d54d
SHA256d7a09862aa011fc9429ddfaf642572757dd4ae274c5b3b2a04093a25a21fd6a1
SHA512c26a59438f76e110d7a77510d08fcbffef38bcd9233339b5506e29500c0e5ee707f3b261d91557577a66c169cdd8231f995230f3047faa0c29b6696af311d8d7
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
676B
MD556ab2a4fefaa9d2780be9815c4c523c2
SHA191f564b51e9caaf10f07a609370643861d9d8ade
SHA256c54f81d8aa53cc3d567874a3c3082c40fc8a335c881a746451ac202a050cdce6
SHA5124570a7fc3b345f1d4872f5bef23ae49620f6c579f0914674a15d404c199ccb7eddabd79da79ab9c226b37d587e14ceed28d5990d71d05e28be33bde04cf8ed4f
-
Filesize
208KB
MD52b14ae8b54d216abf4d228493ceca44a
SHA1d134351498e4273e9d6391153e35416bc743adef
SHA2564e1cc3da1f7bf92773aae6cffa6d61bfc3e25aead3ad947f6215f93a053f346c
SHA5125761b605add10ae3ef80f3b8706c8241b4e8abe4ac3ce36b7be8a97d08b08da5a72fedd5e976b3c9e1c463613a943ebb5d323e6a075ef6c7c3b1abdc0d53ac05
-
Filesize
349B
MD586ee2b3488acbb3b20f4583a98ce06a9
SHA17eadd0513a57cdb5f703f07f930c74e6c5fe2520
SHA256d9ae339fa122735eb976ab67f3c143db6ff5c79f6df5670558fa7726b6e87ff0
SHA512b269dd7779263af1acd50c66fcdd3295fcc41341bff3fd7a410637c5cce3d06a4fbc8a4a145604a058cf2dc7083cc9acb809104771cc99c3b6959cb941b9547d