Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
59cb2ee7fe981360d5d59f1db137fcd2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
59cb2ee7fe981360d5d59f1db137fcd2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
59cb2ee7fe981360d5d59f1db137fcd2_JaffaCakes118.exe
-
Size
548KB
-
MD5
59cb2ee7fe981360d5d59f1db137fcd2
-
SHA1
997a93b61b532098d501bed3d102215728d7bff8
-
SHA256
6bede486f098902186630667977203f607dc0046af1ff3eb007104bdaa0015d8
-
SHA512
570cc815876b4c316dc0cb937e582715d9101a31d46fc45fc528d9a96e5f8730cc1d00511dc4c8b630753f88de878b877ccbfd6c7845b473f0350d959e6d9509
-
SSDEEP
6144:gQp+JNxNQl47Rdom4QRmzidNbd5jxNCpfH:gi+Xx+0ym4QR1dNb3jxABH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2800 543_543.exe -
Loads dropped DLL 1 IoCs
pid Process 2664 rundll32.exe -
Boot or Logon Autostart Execution: Time Providers 1 TTPs 5 IoCs
The Windows Time service (W32Time) enables time synchronization across and within domains.
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\W32Time\TimeProviders\xyz\DllName = "C:\\CFLog\\\\5NE6K.2" 543_543.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\W32Time\TimeProviders\xyz\Enabled = "1" 543_543.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\W32Time\TimeProviders\xyz\InputProvider = "1" 543_543.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\W32Time\TimeProviders\xyz 543_543.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\W32Time\TimeProviders\xyz 543_543.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2824 sc.exe 2188 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7C9975-ECA1-4190-B0EB-E37BC5E40893}\LocalServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7C9975-ECA1-4190-B0EB-E37BC5E40893} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7C9975-ECA1-4190-B0EB-E37BC5E40893}\LocalServer32\ = "=" rundll32.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2800 543_543.exe 2664 rundll32.exe 2664 rundll32.exe 2664 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 DllHost.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2800 2404 59cb2ee7fe981360d5d59f1db137fcd2_JaffaCakes118.exe 32 PID 2404 wrote to memory of 2800 2404 59cb2ee7fe981360d5d59f1db137fcd2_JaffaCakes118.exe 32 PID 2404 wrote to memory of 2800 2404 59cb2ee7fe981360d5d59f1db137fcd2_JaffaCakes118.exe 32 PID 2404 wrote to memory of 2800 2404 59cb2ee7fe981360d5d59f1db137fcd2_JaffaCakes118.exe 32 PID 2800 wrote to memory of 2664 2800 543_543.exe 33 PID 2800 wrote to memory of 2664 2800 543_543.exe 33 PID 2800 wrote to memory of 2664 2800 543_543.exe 33 PID 2800 wrote to memory of 2664 2800 543_543.exe 33 PID 2800 wrote to memory of 2664 2800 543_543.exe 33 PID 2800 wrote to memory of 2664 2800 543_543.exe 33 PID 2800 wrote to memory of 2664 2800 543_543.exe 33 PID 2800 wrote to memory of 2824 2800 543_543.exe 34 PID 2800 wrote to memory of 2824 2800 543_543.exe 34 PID 2800 wrote to memory of 2824 2800 543_543.exe 34 PID 2800 wrote to memory of 2824 2800 543_543.exe 34 PID 2800 wrote to memory of 2188 2800 543_543.exe 36 PID 2800 wrote to memory of 2188 2800 543_543.exe 36 PID 2800 wrote to memory of 2188 2800 543_543.exe 36 PID 2800 wrote to memory of 2188 2800 543_543.exe 36 PID 2800 wrote to memory of 2916 2800 543_543.exe 37 PID 2800 wrote to memory of 2916 2800 543_543.exe 37 PID 2800 wrote to memory of 2916 2800 543_543.exe 37 PID 2800 wrote to memory of 2916 2800 543_543.exe 37 PID 2916 wrote to memory of 2812 2916 net.exe 40 PID 2916 wrote to memory of 2812 2916 net.exe 40 PID 2916 wrote to memory of 2812 2916 net.exe 40 PID 2916 wrote to memory of 2812 2916 net.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\59cb2ee7fe981360d5d59f1db137fcd2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\59cb2ee7fe981360d5d59f1db137fcd2_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\543_543.exe"C:\543_543.exe"2⤵
- Executes dropped EXE
- Boot or Logon Autostart Execution: Time Providers
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\windows\SysWOW64\rundll32.exeC:\windows\system32\rundll32.exe C:\CFLog\\5NE6K.2 itf23⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
C:\Windows\SysWOW64\sc.exesc stop w32time3⤵
- Launches sc.exe
PID:2824
-
-
C:\Windows\SysWOW64\sc.exesc config w32time start= auto3⤵
- Launches sc.exe
PID:2188
-
-
C:\Windows\SysWOW64\net.exenet start w32time3⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start w32time4⤵PID:2812
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD5f65ef7213a72120144eb2e842d99fcc6
SHA16a88dee31ec2d5d4752e6917e31ece91cc722bd5
SHA256e6f9b7bb52aa7015ef7d14ecf9957f35fcc4c3d15e99676c463e657267869406
SHA512f5b8f957d54b3843f9e6bc5566ef84059a28cae0fd4a42b387e6541972db6226eb03a6dfa7d413dc480edc4611c2ed2ce08b569322cbdeddc135523dc8dac0cc
-
Filesize
20KB
MD5778679c749fd8e3a927a77837538fcc3
SHA1bf6d69cab5bdaa6707c2391109475dbed6442160
SHA25692993c5ee7620dc82a36b7e6e01efa4280f3492f4068204bf5fd7e5aeca7c275
SHA5127742d0a4f238a0db9e69344587d987762103c3e81f212721636d42c363ed7459735327acc32e7122d38b0142da47c06395dc49ac48422d365b7163877f6cd582