Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 15:42
Static task
static1
Behavioral task
behavioral1
Sample
5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe
-
Size
428KB
-
MD5
5c942556fc2236f74e7881960c0495d2
-
SHA1
cbfcce2e916621d273350457309912ade4e94d7b
-
SHA256
50a2078e95128a5d98e7687ab1d2733ad3fb97bbe3d8cd42ae0715564e1fa2a0
-
SHA512
b58ae3c9d5e8a3f760535717ef0b8d5f011d0c063192b201a5e9bb7faf38ecd70540613cabbb975080a2a143a668c24eb942fc8d327be18ac726f405f557d404
-
SSDEEP
12288:ZqmpplpGoGL3etQoMiXM8gxf/Sj4ykzMDRxT:Z563ey8gZqj4y7L
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" lncom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" services.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run lncom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" lncom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" services.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 5 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y} lncom.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ lncom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" lncom.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" services.exe -
resource yara_rule behavioral2/files/0x000900000002342a-37.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation 5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 4780 lncom.exe 3832 fservice.exe 2644 services.exe -
Loads dropped DLL 5 IoCs
pid Process 2644 services.exe 2644 services.exe 2644 services.exe 3832 fservice.exe 4780 lncom.exe -
resource yara_rule behavioral2/files/0x00090000000233d4-5.dat upx behavioral2/memory/4780-16-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/3832-26-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/3832-50-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4780-55-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/2644-57-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/2644-59-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/2644-61-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/2644-62-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/2644-64-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/2644-66-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/2644-68-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/2644-70-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/2644-72-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/2644-74-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/2644-76-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/2644-78-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/2644-80-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/2644-82-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/2644-84-0x0000000000400000-0x00000000005FC000-memory.dmp upx -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ lncom.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ services.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\reginv.dll services.exe File created C:\Windows\SysWOW64\lncom_.jpg 5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe File created C:\Windows\SysWOW64\fservice.exe lncom.exe File opened for modification C:\Windows\SysWOW64\fservice.exe lncom.exe File created C:\Windows\SysWOW64\winkey.dll services.exe File created C:\Windows\SysWOW64\fservice.exe services.exe File created C:\Windows\SysWOW64\lncom.exe.bat lncom.exe File created C:\Windows\SysWOW64\lncom.exe 5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe File created C:\Windows\SysWOW64\fservice.exe fservice.exe File opened for modification C:\Windows\SysWOW64\fservice.exe fservice.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\system\sservice.exe services.exe File created C:\Windows\system\sservice.exe lncom.exe File opened for modification C:\Windows\system\sservice.exe lncom.exe File created C:\Windows\services.exe fservice.exe File opened for modification C:\Windows\services.exe fservice.exe File created C:\Windows\system\sservice.exe fservice.exe File opened for modification C:\Windows\system\sservice.exe fservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe 2644 services.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2644 services.exe 2644 services.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2976 wrote to memory of 4780 2976 5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe 85 PID 2976 wrote to memory of 4780 2976 5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe 85 PID 2976 wrote to memory of 4780 2976 5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe 85 PID 2976 wrote to memory of 2980 2976 5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe 86 PID 2976 wrote to memory of 2980 2976 5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe 86 PID 2976 wrote to memory of 2980 2976 5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe 86 PID 4780 wrote to memory of 3832 4780 lncom.exe 89 PID 4780 wrote to memory of 3832 4780 lncom.exe 89 PID 4780 wrote to memory of 3832 4780 lncom.exe 89 PID 3832 wrote to memory of 2644 3832 fservice.exe 90 PID 3832 wrote to memory of 2644 3832 fservice.exe 90 PID 3832 wrote to memory of 2644 3832 fservice.exe 90 PID 2644 wrote to memory of 1376 2644 services.exe 92 PID 2644 wrote to memory of 1376 2644 services.exe 92 PID 2644 wrote to memory of 1376 2644 services.exe 92 PID 2644 wrote to memory of 2940 2644 services.exe 93 PID 2644 wrote to memory of 2940 2644 services.exe 93 PID 2644 wrote to memory of 2940 2644 services.exe 93 PID 2940 wrote to memory of 5088 2940 NET.exe 96 PID 2940 wrote to memory of 5088 2940 NET.exe 96 PID 2940 wrote to memory of 5088 2940 NET.exe 96 PID 1376 wrote to memory of 1320 1376 NET.exe 97 PID 1376 wrote to memory of 1320 1376 NET.exe 97 PID 1376 wrote to memory of 1320 1376 NET.exe 97 PID 4780 wrote to memory of 2520 4780 lncom.exe 102 PID 4780 wrote to memory of 2520 4780 lncom.exe 102 PID 4780 wrote to memory of 2520 4780 lncom.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\lncom.exe"C:\Windows\system32\lncom.exe"2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\fservice.exeC:\Windows\system32\fservice.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\services.exeC:\Windows\services.exe -XP4⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\NET.exeNET STOP srservice5⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP srservice6⤵PID:1320
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP navapsvc5⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP navapsvc6⤵PID:5088
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\lncom.exe.bat3⤵PID:2520
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\5C9425~1.EXE.bat2⤵PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133B
MD5affd4b7a38ac9aa9e3136214d1f1b300
SHA1609f90b3b0097fd1c57c41a297455ddb700939aa
SHA2569c6380ec4f8c797cc1652c40558919388ddaa185ed84b33e9961913b551d8739
SHA512ee5de4ef626739a6a168037f9e5de67fa954e1fbbd3024634968c8b22594b7b7bd708daeab35a513362e9bb01c297c22852b2f95ea480176eb7dd6bd12d4931a
-
Filesize
342KB
MD5dd747ad0fadb8049994dbf630daf1379
SHA1be5bab73a9de91910970a307a3415577f951c6e4
SHA2569244d387fe54d19ce577e075332b5b0c2a18bdfd71ea7842cd62f3591295a684
SHA51288a2c33b9266fdb3edf46f80ddeb0a1108bf65e619ac7c7001300a41e20d1e7070e6a173c54f17a5f91fa957b6ca012a78d6192660e8a1385bb7b327f74cd2a3
-
Filesize
99B
MD51f73e450d92934cd37c041eb3f1ff51f
SHA1f3e9dece5d6b7d7a0e4966c16ffe31437539d4a0
SHA2563a57d154715459926a51a9e3925687c0c78ec9c88bc39c303b5b93385d34d67e
SHA5125f982d614e54870ae3ad212f049ca3685602812c1bb066a5f6155e694adb994d6d1608ca7a25bcab605812c6e7e6b22817aaf0dba9e906787add9b0a8e3f32a5
-
Filesize
81KB
MD5070cf6787aa56fbdaa1b2fd98708c34c
SHA1fb662cbd45033e03f65e0f278f44f4206a3c4293
SHA256e073f22bff5d22fdbf3665855d2f979d300c4e28421a7edf5d616dd92c71580f
SHA51293adca8cd47db7fd07d1bb0834c92ef0460d86975ee17276573223eb378d3cc7bc8324c0cd62c024664159b0320501d37bbc97d266a40ed2a51fb3e8e163ba52
-
Filesize
36KB
MD5562e0d01d6571fa2251a1e9f54c6cc69
SHA183677ad3bc630aa6327253c7b3deffbd4a8ce905
SHA256c5b1d800c86d550c0b68c57c0d9911c1dd21df9e5e37e9e7bc032b5e66fdebe6
SHA512166e132432eca24061f7e7d0c58c0b286e971ae2bc50f7c890b7707dd5dede19fcd83a5f79b6fd3f93dd691e07ad9bc1bd05fe82ccaade1610282188571585ea
-
Filesize
13KB
MD5b4c72da9fd1a0dcb0698b7da97daa0cd
SHA1b25a79e8ea4c723c58caab83aed6ea48de7ed759
SHA25645d266269634ba2de70f179a26d7224111e677e66b38dff2802851b71ce4458f
SHA512f5f184416c5381d275bc093c9275e9fdb35c58e2c401d188aef097950013de6e43269da5d4dd5e7baea34735bd7de664d15fe487b2292fd66926c9845b0cd066