Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe
-
Size
143KB
-
MD5
6746a46d8023849b2ee3bcb88bfbf05c
-
SHA1
0c63d0856fafb1e2ecfdae13f309cb34acf74e8c
-
SHA256
5bd2b621ae65adc56421aeca86e023e0399309467f3cb744647d76c0aa6ed263
-
SHA512
c6bf76062d81d84ff39677bf927b01d02f2de8597c359cafea263c353354c18ea4371771601f07d68524c0413074bdbabb1fd6a2e525cdd4e0042b6099d4fb02
-
SSDEEP
3072:ME5wSKjV1GPf3hvXnd6r7ddQNUgZUl3mypDZ8sYFW4kUXEnDQq:MPSK+XhPn8kGgZUl3my9wec
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 2384 netsh.exe 2140 netsh.exe 1892 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 2132 api-ms-win-core-profile-l1-1-032.exe 2572 ELSCore32.exe -
Loads dropped DLL 2 IoCs
pid Process 2132 api-ms-win-core-profile-l1-1-032.exe 2132 api-ms-win-core-profile-l1-1-032.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1738137179 6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe File created C:\Windows\SysWOW64\api-ms-win-core-profile-l1-1-032.exe 6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\api-ms-win-core-profile-l1-1-032.exe 6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat api-ms-win-core-profile-l1-1-032.exe File opened for modification C:\Windows\SysWOW64\1738137179 api-ms-win-core-profile-l1-1-032.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2668 2292 WerFault.exe 29 -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ api-ms-win-core-profile-l1-1-032.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" api-ms-win-core-profile-l1-1-032.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings api-ms-win-core-profile-l1-1-032.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections api-ms-win-core-profile-l1-1-032.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FF497C0C-4BE3-44E1-B6B4-EDA43D64871D}\WpadDecisionReason = "1" api-ms-win-core-profile-l1-1-032.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" api-ms-win-core-profile-l1-1-032.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" api-ms-win-core-profile-l1-1-032.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 api-ms-win-core-profile-l1-1-032.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-81-b4-ba-e3-fa\WpadDecisionReason = "1" api-ms-win-core-profile-l1-1-032.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" api-ms-win-core-profile-l1-1-032.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FF497C0C-4BE3-44E1-B6B4-EDA43D64871D}\WpadDecision = "0" api-ms-win-core-profile-l1-1-032.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-81-b4-ba-e3-fa api-ms-win-core-profile-l1-1-032.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-81-b4-ba-e3-fa\WpadDecisionTime = 9099b16bf0dcda01 api-ms-win-core-profile-l1-1-032.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix api-ms-win-core-profile-l1-1-032.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" api-ms-win-core-profile-l1-1-032.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 api-ms-win-core-profile-l1-1-032.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FF497C0C-4BE3-44E1-B6B4-EDA43D64871D} api-ms-win-core-profile-l1-1-032.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FF497C0C-4BE3-44E1-B6B4-EDA43D64871D}\WpadDecisionTime = 9099b16bf0dcda01 api-ms-win-core-profile-l1-1-032.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FF497C0C-4BE3-44E1-B6B4-EDA43D64871D}\WpadNetworkName = "Network 3" api-ms-win-core-profile-l1-1-032.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FF497C0C-4BE3-44E1-B6B4-EDA43D64871D}\56-81-b4-ba-e3-fa api-ms-win-core-profile-l1-1-032.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-81-b4-ba-e3-fa\WpadDecision = "0" api-ms-win-core-profile-l1-1-032.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings api-ms-win-core-profile-l1-1-032.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad api-ms-win-core-profile-l1-1-032.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0074000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 api-ms-win-core-profile-l1-1-032.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1892 2292 6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe 30 PID 2292 wrote to memory of 1892 2292 6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe 30 PID 2292 wrote to memory of 1892 2292 6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe 30 PID 2292 wrote to memory of 1892 2292 6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2384 2292 6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe 32 PID 2292 wrote to memory of 2384 2292 6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe 32 PID 2292 wrote to memory of 2384 2292 6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe 32 PID 2292 wrote to memory of 2384 2292 6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe 32 PID 2292 wrote to memory of 2140 2292 6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe 34 PID 2292 wrote to memory of 2140 2292 6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe 34 PID 2292 wrote to memory of 2140 2292 6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe 34 PID 2292 wrote to memory of 2140 2292 6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe 34 PID 2292 wrote to memory of 2668 2292 6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe 37 PID 2292 wrote to memory of 2668 2292 6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe 37 PID 2292 wrote to memory of 2668 2292 6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe 37 PID 2292 wrote to memory of 2668 2292 6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe 37 PID 2132 wrote to memory of 2572 2132 api-ms-win-core-profile-l1-1-032.exe 38 PID 2132 wrote to memory of 2572 2132 api-ms-win-core-profile-l1-1-032.exe 38 PID 2132 wrote to memory of 2572 2132 api-ms-win-core-profile-l1-1-032.exe 38 PID 2132 wrote to memory of 2572 2132 api-ms-win-core-profile-l1-1-032.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6746a46d8023849b2ee3bcb88bfbf05c_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Windows Update Service" dir=in action=allow program="c:\windows\syswow64\api-ms-win-core-profile-l1-1-032.exe" enable=yes profile=domain2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1892
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Windows Update Service" dir=in action=allow program="c:\windows\syswow64\api-ms-win-core-profile-l1-1-032.exe" enable=yes profile=private2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2384
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Windows Update Service" dir=in action=allow program="c:\windows\syswow64\api-ms-win-core-profile-l1-1-032.exe" enable=yes profile=public2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 4882⤵
- Program crash
PID:2668
-
-
C:\Windows\SysWOW64\api-ms-win-core-profile-l1-1-032.exeC:\Windows\SysWOW64\api-ms-win-core-profile-l1-1-032.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\ProgramData\ELSCore32.exeschutz2⤵
- Executes dropped EXE
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54B
MD57b26edb7476e8bcabba7b91704f290b8
SHA1aef7dee89b2e8bb9c47d7af0adb69f96b6813ad4
SHA256cff516676a12bee16f7a9ee618acfb6ad17688eb77b3d550f3fd1b13bd5edbca
SHA512823e6c6776f248a3709f5fdda4a4d8629610853f4d02016b9fffea1a3ca3833462af2bf750d81bc45a5775037dc1f598959100cd915af81e3d2aaeb1eb53266b
-
Filesize
26B
MD56a3f2837513f8746c0b590c24735fcb1
SHA125f90820a2f7fdf5cd14650c993a7426e33749dd
SHA25697f0210295e62654ae40b17ff4567834f14de90734ecd60bad9797ad0cacd740
SHA512c79d9892d4f8682ae0baf2a0e7978687066e34b5d1ed72140760b7659f53a5c7904a2ef28105bf7f5a0001400fb6593965aa4862f7eafca9ab24a9916b8fe1f3
-
Filesize
143KB
MD56746a46d8023849b2ee3bcb88bfbf05c
SHA10c63d0856fafb1e2ecfdae13f309cb34acf74e8c
SHA2565bd2b621ae65adc56421aeca86e023e0399309467f3cb744647d76c0aa6ed263
SHA512c6bf76062d81d84ff39677bf927b01d02f2de8597c359cafea263c353354c18ea4371771601f07d68524c0413074bdbabb1fd6a2e525cdd4e0042b6099d4fb02