Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    49s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/06/2024, 08:33 UTC

General

  • Target

    0461883e6e2c3ff8795c042dfaae7ae9_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    0461883e6e2c3ff8795c042dfaae7ae9

  • SHA1

    811e50f926d6d5a0a5fa0aba498835f01fc6d410

  • SHA256

    32bcfbafc087bd71c5087c447facbda8d98bc780a701bffc36170b40382f13a9

  • SHA512

    f87d42152b930b388a7fbcc903b488ffbe356b7b4ef988306b242cb920f2112843bc4292a3876d23ecbe493902b3a6989dc6142721b123efd19b8d33fc63301d

  • SSDEEP

    1536:UkB2FcIuvmp/8Mkdr5tuQ06FJ4x3YbxDEHI1pWqAk1Im:UPc1Opc8q8uDxWhk1I

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Signatures

  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • UPX packed file 40 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\fontdrvhost.exe
    "fontdrvhost.exe"
    1⤵
      PID:772
    • C:\Windows\system32\fontdrvhost.exe
      "fontdrvhost.exe"
      1⤵
        PID:776
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        1⤵
          PID:336
        • C:\Windows\system32\sihost.exe
          sihost.exe
          1⤵
            PID:1080
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
            1⤵
              PID:2476
            • C:\Windows\system32\taskhostw.exe
              taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
              1⤵
                PID:3108
              • C:\Windows\Explorer.EXE
                C:\Windows\Explorer.EXE
                1⤵
                  PID:3424
                  • C:\Users\Admin\AppData\Local\Temp\0461883e6e2c3ff8795c042dfaae7ae9_JaffaCakes118.exe
                    "C:\Users\Admin\AppData\Local\Temp\0461883e6e2c3ff8795c042dfaae7ae9_JaffaCakes118.exe"
                    2⤵
                    • Modifies firewall policy service
                    • UAC bypass
                    • Windows security bypass
                    • Windows security modification
                    • Checks whether UAC is enabled
                    • Enumerates connected drives
                    • Drops autorun.inf file
                    • Drops file in Program Files directory
                    • Drops file in Windows directory
                    • Modifies registry class
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    • System policy modification
                    PID:3000
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                  1⤵
                    PID:3568
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                    1⤵
                      PID:3776
                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                      1⤵
                        PID:3924
                      • C:\Windows\System32\RuntimeBroker.exe
                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                        1⤵
                          PID:3984
                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                          1⤵
                            PID:4076
                          • C:\Windows\System32\RuntimeBroker.exe
                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                            1⤵
                              PID:4168
                            • C:\Windows\System32\RuntimeBroker.exe
                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                              1⤵
                                PID:4468
                              • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
                                "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca
                                1⤵
                                  PID:4052
                                • C:\Windows\system32\backgroundTaskHost.exe
                                  "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                  1⤵
                                    PID:1816
                                  • C:\Windows\System32\RuntimeBroker.exe
                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                    1⤵
                                      PID:2812
                                    • C:\Windows\System32\RuntimeBroker.exe
                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                      1⤵
                                        PID:4548

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • F:\tvqe.pif

                                        Filesize

                                        100KB

                                        MD5

                                        34740cd5e43a13b61dffd970d8fc1e19

                                        SHA1

                                        d0aedc2b29fb778248af6a5abdf48f73ec11ea13

                                        SHA256

                                        74552d4ab904c4a44c8d5c2559c325130ac2fe73fed8fe7d434c2bb7c9740daa

                                        SHA512

                                        6c809ba2ca2d8a65cae53c301755841d974280639e79269cacc7f58541027198b7cdf8d3c785cd366d8c203a2aa9f9ebdc3810ee9e814541b8551771c518cdc1

                                      • memory/3000-26-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-18-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-5-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-11-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-12-0x0000000003E00000-0x0000000003E02000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/3000-10-0x0000000003E00000-0x0000000003E02000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/3000-6-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-9-0x0000000003E10000-0x0000000003E11000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3000-8-0x0000000003E00000-0x0000000003E02000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/3000-1-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-15-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-14-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-13-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-16-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-17-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-29-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-19-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-20-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-22-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-23-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-24-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-0-0x0000000000400000-0x0000000000416000-memory.dmp

                                        Filesize

                                        88KB

                                      • memory/3000-3-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-28-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-60-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-33-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-36-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-38-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-40-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-41-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-43-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-44-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-52-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-53-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-55-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-56-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-57-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-58-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-31-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-64-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-65-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-66-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-68-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-69-0x0000000003E00000-0x0000000003E02000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/3000-70-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      • memory/3000-7-0x00000000020F0000-0x000000000317E000-memory.dmp

                                        Filesize

                                        16.6MB

                                      We care about your privacy.

                                      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.