Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    29/05/2024, 13:19 UTC

General

  • Target

    80df2f0d4da5e61f4341c4d971170395_JaffaCakes118.exe

  • Size

    3.9MB

  • MD5

    80df2f0d4da5e61f4341c4d971170395

  • SHA1

    4246048db2e697a05f8dc252e3cb60f7ce83832a

  • SHA256

    915738e4e4df8462f006d169a1cdebc3f311f7250b794281f78fa24d90586e4b

  • SHA512

    8a78824845d3b5f235028dd19107a6a9469f5f1bb4b18d7e41e54e6aff1d76157e0866c1cdb6d0d46029bca4307afc501a50f04d03926902ff96d8ca44acf069

  • SSDEEP

    98304:b2tpzpptdlPk/vq1FXRF7LOmt64dcn1mx71J/T+BXuBFBrEy:b8tdcq1FXRxZtcnAJ1REXsBIy

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 2 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\80df2f0d4da5e61f4341c4d971170395_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\80df2f0d4da5e61f4341c4d971170395_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\System\install.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2248
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Program Files (x86)\System\install.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3024
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im rutserv.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2536
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im rfusclient.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2644
        • C:\Windows\SysWOW64\reg.exe
          reg delete "HKLM\SYSTEM\Remote Manipulator System" /f
          4⤵
            PID:2800
          • C:\Windows\SysWOW64\regedit.exe
            regedit /s "regedit.reg"
            4⤵
            • Runs .reg file with regedit
            PID:2548
          • C:\Windows\SysWOW64\timeout.exe
            timeout 2
            4⤵
            • Delays execution with timeout.exe
            PID:2308
          • C:\Program Files (x86)\System\rutserv.exe
            rutserv.exe /silentinstall
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2624
          • C:\Program Files (x86)\System\rutserv.exe
            rutserv.exe /firewall
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:2892
          • C:\Program Files (x86)\System\rutserv.exe
            rutserv.exe /start
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:820
    • C:\Program Files (x86)\System\rutserv.exe
      "C:\Program Files (x86)\System\rutserv.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Program Files (x86)\System\rfusclient.exe
        "C:\Program Files (x86)\System\rfusclient.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2744
        • C:\Program Files (x86)\System\rfusclient.exe
          "C:\Program Files (x86)\System\rfusclient.exe" /tray
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: SetClipboardViewer
          PID:1548
      • C:\Program Files (x86)\System\rfusclient.exe
        "C:\Program Files (x86)\System\rfusclient.exe" /tray
        2⤵
        • Executes dropped EXE
        PID:2396

    Network

    • flag-us
      DNS
      rmansys.ru
      rutserv.exe
      Remote address:
      8.8.8.8:53
      Request
      rmansys.ru
      IN A
      Response
      rmansys.ru
      IN A
      194.67.96.234
    • flag-ru
      GET
      http://rmansys.ru/utils/inet_id_notify.php?test=1
      rutserv.exe
      Remote address:
      194.67.96.234:80
      Request
      GET /utils/inet_id_notify.php?test=1 HTTP/1.1
      Host: rmansys.ru
      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
      Accept-Encoding: identity
      User-Agent: Mozilla/4.0 (compatible; RMS)
      Response
      HTTP/1.1 200 OK
      Server: nginx
      Date: Wed, 29 May 2024 13:19:22 GMT
      Content-Type: text/html; charset=utf-8
      Content-Length: 13
      Connection: keep-alive
      X-Powered-By: PHP/8.3.2
    • flag-ru
      POST
      http://rmansys.ru/utils/inet_id_notify.php
      rutserv.exe
      Remote address:
      194.67.96.234:80
      Request
      POST /utils/inet_id_notify.php HTTP/1.0
      Connection: keep-alive
      Content-Type: multipart/form-data; boundary=--------052924131922397
      Content-Length: 1020
      Host: rmansys.ru
      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
      Accept-Charset: UTF-8
      Accept-Encoding: identity
      User-Agent: Mozilla/4.0 (compatible; RMS)
      Response
      HTTP/1.1 200 OK
      Server: nginx
      Date: Wed, 29 May 2024 13:19:24 GMT
      Content-Type: text/html; charset=utf-8
      Content-Length: 13
      Connection: keep-alive
      X-Powered-By: PHP/8.3.2
    • flag-us
      DNS
      rms-server.tektonit.ru
      rutserv.exe
      Remote address:
      8.8.8.8:53
      Request
      rms-server.tektonit.ru
      IN A
      Response
      rms-server.tektonit.ru
      IN CNAME
      main.internetid.ru
      main.internetid.ru
      IN A
      95.213.205.83
    • 194.67.96.234:80
      http://rmansys.ru/utils/inet_id_notify.php?test=1
      http
      rutserv.exe
      440 B
      365 B
      5
      4

      HTTP Request

      GET http://rmansys.ru/utils/inet_id_notify.php?test=1

      HTTP Response

      200
    • 194.67.96.234:80
      http://rmansys.ru/utils/inet_id_notify.php
      http
      rutserv.exe
      1.6kB
      405 B
      6
      5

      HTTP Request

      POST http://rmansys.ru/utils/inet_id_notify.php

      HTTP Response

      200
    • 95.213.205.83:5655
      rms-server.tektonit.ru
      rutserv.exe
      1.9kB
      1.3kB
      19
      21
    • 8.8.8.8:53
      rmansys.ru
      dns
      rutserv.exe
      56 B
      72 B
      1
      1

      DNS Request

      rmansys.ru

      DNS Response

      194.67.96.234

    • 8.8.8.8:53
      rms-server.tektonit.ru
      dns
      rutserv.exe
      68 B
      114 B
      1
      1

      DNS Request

      rms-server.tektonit.ru

      DNS Response

      95.213.205.83

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\System\install.bat

      Filesize

      480B

      MD5

      99db27d776e103cad354b531ee1f20b9

      SHA1

      0b82d146df8528f66d1d14756f211fd3a8b1b91a

      SHA256

      240020a1a1941d1455135b5cb134e502a13b148be16cbb1552482aa03c29f8f3

      SHA512

      bc2ed33495c0a752397b2f1b9b7ba65f94ea5be82dde74c618342c83b68f1b92a4783b672cd427843533799e1af0875e0fd000b12236852e9e2fa93005d7ac69

    • C:\Program Files (x86)\System\install.vbs

      Filesize

      117B

      MD5

      65fc32766a238ff3e95984e325357dbb

      SHA1

      3ac16a2648410be8aa75f3e2817fbf69bb0e8922

      SHA256

      a7b067e9e4d44efe579c7cdb1e847d61af2323d3d73c6fffb22e178ae476f420

      SHA512

      621e81fc2d0f9dd92413481864638a140bee94c7dbd31f944826b21bd6ad6b8a59e63de9f7f0025cffc0efb7f9975dde77f523510ee23ada62c152a63a22f608

    • C:\Program Files (x86)\System\regedit.reg

      Filesize

      11KB

      MD5

      e07d9ed7f410a5b1ee9b9d790c21dccd

      SHA1

      bf6b1a88220c78f6502399c6ddbcc30fa21a880c

      SHA256

      84bb424fe3412a9bff5284101e7dd0ee615a33094c4f404062e25f97fbac5d26

      SHA512

      699eafb0cffa275b4d72a3356bd2c163e418ad961f5448b91deb809eb147691be29d4d468b295cbb08f0ca21e8c9999fa185ffe2682c5b35317ab7827f8a083c

    • C:\Program Files (x86)\System\rfusclient.exe

      Filesize

      1.5MB

      MD5

      b8667a1e84567fcf7821bcefb6a444af

      SHA1

      9c1f91fe77ad357c8f81205d65c9067a270d61f0

      SHA256

      dc9d875e659421a51addd8e8a362c926369e84320ab0c5d8bbb1e4d12d372fc9

      SHA512

      ec6af663a3b41719d684f04504746f91196105ef6f8baa013b4bd02df6684eca49049d5517691f8e3a4ba6351fe35545a27f728b1d29d949e950d574a012f852

    • C:\Program Files (x86)\System\rutserv.exe

      Filesize

      1.7MB

      MD5

      37a8802017a212bb7f5255abc7857969

      SHA1

      cb10c0d343c54538d12db8ed664d0a1fa35b6109

      SHA256

      1699b9b4fc1724f9b0918b57ca58c453829a3935efd89bd4e9fa66b5e9f2b8a6

      SHA512

      4e20141da8ea4499daf8be5cc41b664dc4229e9575765caf6dc5873d8d0a09f9e200988e1404e767d0415005876a4cf38d5737bd3e1b2c12c4a8fb28adb4f0a0

    • C:\Program Files (x86)\System\vp8decoder.dll

      Filesize

      155KB

      MD5

      88318158527985702f61d169434a4940

      SHA1

      3cc751ba256b5727eb0713aad6f554ff1e7bca57

      SHA256

      4c04d7968a9fe9d9258968d3a722263334bbf5f8af972f206a71f17fa293aa74

      SHA512

      5d88562b6c6d2a5b14390512712819238cd838914f7c48a27f017827cb9b825c24ff05a30333427acec93cd836e8f04158b86d17e6ac3dd62c55b2e2ff4e2aff

    • C:\Program Files (x86)\System\vp8encoder.dll

      Filesize

      593KB

      MD5

      6298c0af3d1d563834a218a9cc9f54bd

      SHA1

      0185cd591e454ed072e5a5077b25c612f6849dc9

      SHA256

      81af82019d9f45a697a8ca1788f2c5c0205af9892efd94879dedf4bc06db4172

      SHA512

      389d89053689537cdb582c0e8a7951a84549f0c36484db4346c31bdbe7cb93141f6a354069eb13e550297dc8ec35cd6899746e0c16abc876a0fe542cc450fffe

    • memory/820-76-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/820-41-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/820-42-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/820-44-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/820-45-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/820-46-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/820-43-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/1548-81-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/1548-88-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/1548-86-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/1548-84-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/1548-85-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/1548-83-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/1548-82-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/2064-20-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/2064-0-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/2396-70-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/2396-73-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/2396-71-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/2396-72-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/2396-112-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/2396-102-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/2396-98-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/2396-94-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/2396-91-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/2396-74-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/2396-68-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/2624-25-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2624-27-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2624-26-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2624-31-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2624-28-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2624-30-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2624-29-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2728-61-0x0000000003300000-0x00000000038B6000-memory.dmp

      Filesize

      5.7MB

    • memory/2728-89-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2728-48-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2728-110-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2728-106-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2728-100-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2728-51-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2728-49-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2728-96-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2728-62-0x0000000003CB0000-0x0000000004266000-memory.dmp

      Filesize

      5.7MB

    • memory/2728-50-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2728-53-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2728-52-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2744-90-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/2744-64-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/2744-67-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/2744-65-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/2744-63-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/2744-69-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/2744-66-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/2892-37-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2892-33-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2892-35-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2892-39-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2892-34-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2892-36-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/2892-38-0x0000000000400000-0x0000000000AB9000-memory.dmp

      Filesize

      6.7MB

    • memory/3024-24-0x0000000002370000-0x0000000002A29000-memory.dmp

      Filesize

      6.7MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.