Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
489969040de8996c10112600b5af0102_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
489969040de8996c10112600b5af0102_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
489969040de8996c10112600b5af0102_JaffaCakes118.exe
-
Size
624KB
-
MD5
489969040de8996c10112600b5af0102
-
SHA1
b84cb222f0f228f735bda64c222b6b1f4ad20a6a
-
SHA256
600f0c7f3065a243989f6ce276bc0599e65163b88cc1ec3ae1fd64cf7f713b9d
-
SHA512
df9526d91b4df620440377a2249f364f2409766266884b629530de2c0dab62e1b1c2ef27f4565b00c4c23629cb3e50abc44b643f34e34754376f80e955824c75
-
SSDEEP
6144:q8WuvadI/lk4MGw2uTniKCcpOHykxJyjGvj3T:qJuOI9TpnGiK5OHtxd
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2588 z.exe 584 app.exe -
Loads dropped DLL 5 IoCs
pid Process 2844 489969040de8996c10112600b5af0102_JaffaCakes118.exe 2844 489969040de8996c10112600b5af0102_JaffaCakes118.exe 2588 z.exe 2588 z.exe 584 app.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\bak8011252.log z.exe -
Boot or Logon Autostart Execution: Time Providers 1 TTPs 4 IoCs
The Windows Time service (W32Time) enables time synchronization across and within domains.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\W32Time\TimeProviders\285 z.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\W32Time\TimeProviders\285\DllName = "C:\\gvmdsj\\6t_8Q.ggG" z.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\W32Time\TimeProviders\285\Enabled = "1" z.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\W32Time\TimeProviders\285\InputProvider = "1" z.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2084 sc.exe 1808 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7C9975-ECA1-4190-B0EB-E37BC5E40893}\LocalServer32\ = "=" app.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node app.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\ app.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID app.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\ app.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7C9975-ECA1-4190-B0EB-E37BC5E40893} app.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7C9975-ECA1-4190-B0EB-E37BC5E40893}\ app.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7C9975-ECA1-4190-B0EB-E37BC5E40893}\LocalServer32 app.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2588 z.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe 584 app.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2744 DllHost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2588 2844 489969040de8996c10112600b5af0102_JaffaCakes118.exe 31 PID 2844 wrote to memory of 2588 2844 489969040de8996c10112600b5af0102_JaffaCakes118.exe 31 PID 2844 wrote to memory of 2588 2844 489969040de8996c10112600b5af0102_JaffaCakes118.exe 31 PID 2844 wrote to memory of 2588 2844 489969040de8996c10112600b5af0102_JaffaCakes118.exe 31 PID 2588 wrote to memory of 1808 2588 z.exe 32 PID 2588 wrote to memory of 1808 2588 z.exe 32 PID 2588 wrote to memory of 1808 2588 z.exe 32 PID 2588 wrote to memory of 1808 2588 z.exe 32 PID 2588 wrote to memory of 2084 2588 z.exe 34 PID 2588 wrote to memory of 2084 2588 z.exe 34 PID 2588 wrote to memory of 2084 2588 z.exe 34 PID 2588 wrote to memory of 2084 2588 z.exe 34 PID 2588 wrote to memory of 660 2588 z.exe 36 PID 2588 wrote to memory of 660 2588 z.exe 36 PID 2588 wrote to memory of 660 2588 z.exe 36 PID 2588 wrote to memory of 660 2588 z.exe 36 PID 2588 wrote to memory of 584 2588 z.exe 38 PID 2588 wrote to memory of 584 2588 z.exe 38 PID 2588 wrote to memory of 584 2588 z.exe 38 PID 2588 wrote to memory of 584 2588 z.exe 38 PID 660 wrote to memory of 776 660 net.exe 39 PID 660 wrote to memory of 776 660 net.exe 39 PID 660 wrote to memory of 776 660 net.exe 39 PID 660 wrote to memory of 776 660 net.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\489969040de8996c10112600b5af0102_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\489969040de8996c10112600b5af0102_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\z.exe"C:\Users\Admin\AppData\Local\Temp\z.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Boot or Logon Autostart Execution: Time Providers
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\sc.exesc stop w32time3⤵
- Launches sc.exe
PID:1808
-
-
C:\Windows\SysWOW64\sc.exesc config w32time start= auto3⤵
- Launches sc.exe
PID:2084
-
-
C:\Windows\SysWOW64\net.exenet start w32time3⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start w32time4⤵PID:776
-
-
-
C:\gvmdsj\app.exeC:\gvmdsj\app.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:584
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39B
MD57cdf9efe6d348fb5f02b6d708bed157f
SHA1c9f1808033ff7437245104ca4365cbfbac795c56
SHA25674dae75c52e25f7cc33dca6c01329e97232651f24e62151cca305da300834416
SHA5121af3c0fe1058ca6f067628876f10a831fd77adf862252a1176ee5fcf358e13a26a63d07c6b98a6aeda596af6dd3d9414a2e4ab7c562dec390ecf3517f74b99f6
-
Filesize
28KB
MD525495f6452bbd173e6f8896299a3d28d
SHA15fea1e186623f8802e7214bf57fa37c6037af76f
SHA256431fca043e704d0743cb5dc08cb9076a6c81af3fe58dacfaafe8a517dfb28bff
SHA51293b8fc45e87d4045d52aa740f84707197d5c53dc56b2a86670ee6c4a17fffdeb55138c4b819c74b05a3f2b37408e4c05a2f331a32d415e4f0a4709bf95db1488
-
Filesize
15KB
MD5c8c7f7472e5c059cbcc99d1eedd0d1ae
SHA110013a17639887f8c8ee2b37ec111352b9102832
SHA256066bd9a9e327df4422beb4922e49be328db8adc1b7c6fad7e4b5f1c47c5655c9
SHA51282762abeade3df840095f95f0559a1a6164e62bae3ff74e547df22dc59034b3ac65a540065aba2434798a6d3a8915ac455d564e0ab885333601fffa32e3272d0