Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 00:25
Static task
static1
Behavioral task
behavioral1
Sample
3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe
-
Size
68KB
-
MD5
3b4ed588d4845093ecec29abd12cf863
-
SHA1
829cd03506adcb03f9851e7a7a1a575080a41142
-
SHA256
6d269c91f637ccab7aaea9f6ecac23eee25b307562d6e0db3b97051ecacf84fb
-
SHA512
c0c46897b14997803a3bed9f1bc075f29169bfcb52f41caf2c9c9cc949344866d196363aad14b98d4c3394a3f21e516ca143184b9136466cb8b0637936038b1f
-
SSDEEP
768:9X1NaObxxe2XE6LOlChYhnQRYIqQsG7lBIYss:V1MMxLXhLYQoQsI8s
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2152 hddmgri.exe 2728 hddmgri.exe -
Loads dropped DLL 2 IoCs
pid Process 2948 3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe 2948 3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\hddmgri.exe 3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat hddmgri.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0087000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 hddmgri.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3502DF43-B7FB-4639-BED9-E61F7BD9135B} hddmgri.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix hddmgri.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings hddmgri.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 hddmgri.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad hddmgri.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3502DF43-B7FB-4639-BED9-E61F7BD9135B}\WpadDecisionTime = 109d232df2d3da01 hddmgri.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-4d-26-0b-9d-06\WpadDecisionReason = "1" hddmgri.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" hddmgri.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections hddmgri.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 hddmgri.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3502DF43-B7FB-4639-BED9-E61F7BD9135B}\WpadDecisionReason = "1" hddmgri.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3502DF43-B7FB-4639-BED9-E61F7BD9135B}\WpadDecision = "0" hddmgri.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-4d-26-0b-9d-06 hddmgri.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-4d-26-0b-9d-06\WpadDecision = "0" hddmgri.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" hddmgri.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" hddmgri.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings hddmgri.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ hddmgri.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" hddmgri.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3502DF43-B7FB-4639-BED9-E61F7BD9135B}\de-4d-26-0b-9d-06 hddmgri.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-4d-26-0b-9d-06\WpadDecisionTime = 109d232df2d3da01 hddmgri.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" hddmgri.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3502DF43-B7FB-4639-BED9-E61F7BD9135B}\WpadNetworkName = "Network 3" hddmgri.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2948 3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe 2948 3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2152 2948 3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe 31 PID 2948 wrote to memory of 2152 2948 3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe 31 PID 2948 wrote to memory of 2152 2948 3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe 31 PID 2948 wrote to memory of 2152 2948 3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\hddmgri.exeC:\Windows\system32\hddmgri.exe -inst2⤵
- Executes dropped EXE
PID:2152
-
-
C:\Windows\SysWOW64\hddmgri.exeC:\Windows\SysWOW64\hddmgri.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2728
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5631bda19fb0bc995a17672f79326e114
SHA1ca7f530fa033a0e8b5c9433a500413744a265f37
SHA256eebf38b80ac93252153118b8310bcb0cd7ca86418ae326d99174510d517d5661
SHA512ad6a59777ae546e36bfc45566986b1b8eeaab155bc05f4658ba36b2b1cbe2d19e1b9044e742793aea44fdfd616066c391f73b0149d32c6bf88880d92b4298844