Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 04:09
Static task
static1
Behavioral task
behavioral1
Sample
9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe
-
Size
798KB
-
MD5
9ce6783342d18bcf75d5e0f8bdaf6a5c
-
SHA1
cf3ad375943f8e7356b99dfdc42427998451634f
-
SHA256
41589067b84a24326985a48925acd3e67d699b97f8a5ad79199c0d1625e3353f
-
SHA512
b71a20e3083fdad2b9dd972dea286a40eeb53953a82292b610554607482f0346cc4099a4a6a4da4073e730357df07f3b52da05f956fb00f6f18f9a4d6c15b9ca
-
SSDEEP
24576:dsZsEw//DAmUJuDdZidUr761ZpIfr4uICbut:ds3wzAfJuDdZxCTIzjICbut
Malware Config
Extracted
latentbot
xporphyriax.zapto.org
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\SystemCertificates\\SystemCert.exe" 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate SystemCert.exe -
Executes dropped EXE 2 IoCs
pid Process 2024 SystemCert.exe 2280 SystemCert.exe -
Loads dropped DLL 3 IoCs
pid Process 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 2024 SystemCert.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Operating System Certificates = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\SystemCertificates\\SystemCert.exe" 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3004 set thread context of 3068 3004 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 29 PID 2024 set thread context of 2280 2024 SystemCert.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SystemCert.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SystemCert.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier SystemCert.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SystemCert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SystemCert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier SystemCert.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier SystemCert.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2280 SystemCert.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: SeSecurityPrivilege 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: SeSystemProfilePrivilege 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: SeSystemtimePrivilege 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: SeBackupPrivilege 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: SeRestorePrivilege 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: SeShutdownPrivilege 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: SeDebugPrivilege 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: SeUndockPrivilege 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: SeManageVolumePrivilege 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: SeImpersonatePrivilege 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: 33 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: 34 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: 35 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2280 SystemCert.exe Token: SeSecurityPrivilege 2280 SystemCert.exe Token: SeTakeOwnershipPrivilege 2280 SystemCert.exe Token: SeLoadDriverPrivilege 2280 SystemCert.exe Token: SeSystemProfilePrivilege 2280 SystemCert.exe Token: SeSystemtimePrivilege 2280 SystemCert.exe Token: SeProfSingleProcessPrivilege 2280 SystemCert.exe Token: SeIncBasePriorityPrivilege 2280 SystemCert.exe Token: SeCreatePagefilePrivilege 2280 SystemCert.exe Token: SeBackupPrivilege 2280 SystemCert.exe Token: SeRestorePrivilege 2280 SystemCert.exe Token: SeShutdownPrivilege 2280 SystemCert.exe Token: SeDebugPrivilege 2280 SystemCert.exe Token: SeSystemEnvironmentPrivilege 2280 SystemCert.exe Token: SeChangeNotifyPrivilege 2280 SystemCert.exe Token: SeRemoteShutdownPrivilege 2280 SystemCert.exe Token: SeUndockPrivilege 2280 SystemCert.exe Token: SeManageVolumePrivilege 2280 SystemCert.exe Token: SeImpersonatePrivilege 2280 SystemCert.exe Token: SeCreateGlobalPrivilege 2280 SystemCert.exe Token: 33 2280 SystemCert.exe Token: 34 2280 SystemCert.exe Token: 35 2280 SystemCert.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3004 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 2024 SystemCert.exe 2280 SystemCert.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3068 3004 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 29 PID 3004 wrote to memory of 3068 3004 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 29 PID 3004 wrote to memory of 3068 3004 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 29 PID 3004 wrote to memory of 3068 3004 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 29 PID 3004 wrote to memory of 3068 3004 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 29 PID 3004 wrote to memory of 3068 3004 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 29 PID 3004 wrote to memory of 3068 3004 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 29 PID 3004 wrote to memory of 3068 3004 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 29 PID 3004 wrote to memory of 3068 3004 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 29 PID 3004 wrote to memory of 3068 3004 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 29 PID 3004 wrote to memory of 3068 3004 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 29 PID 3004 wrote to memory of 3068 3004 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 29 PID 3004 wrote to memory of 3068 3004 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 29 PID 3004 wrote to memory of 3068 3004 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 29 PID 3004 wrote to memory of 3068 3004 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 29 PID 3068 wrote to memory of 2024 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 30 PID 3068 wrote to memory of 2024 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 30 PID 3068 wrote to memory of 2024 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 30 PID 3068 wrote to memory of 2024 3068 9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe 30 PID 2024 wrote to memory of 2280 2024 SystemCert.exe 31 PID 2024 wrote to memory of 2280 2024 SystemCert.exe 31 PID 2024 wrote to memory of 2280 2024 SystemCert.exe 31 PID 2024 wrote to memory of 2280 2024 SystemCert.exe 31 PID 2024 wrote to memory of 2280 2024 SystemCert.exe 31 PID 2024 wrote to memory of 2280 2024 SystemCert.exe 31 PID 2024 wrote to memory of 2280 2024 SystemCert.exe 31 PID 2024 wrote to memory of 2280 2024 SystemCert.exe 31 PID 2024 wrote to memory of 2280 2024 SystemCert.exe 31 PID 2024 wrote to memory of 2280 2024 SystemCert.exe 31 PID 2024 wrote to memory of 2280 2024 SystemCert.exe 31 PID 2024 wrote to memory of 2280 2024 SystemCert.exe 31 PID 2024 wrote to memory of 2280 2024 SystemCert.exe 31 PID 2024 wrote to memory of 2280 2024 SystemCert.exe 31 PID 2024 wrote to memory of 2280 2024 SystemCert.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9ce6783342d18bcf75d5e0f8bdaf6a5c_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SystemCertificates\SystemCert.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SystemCertificates\SystemCert.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SystemCertificates\SystemCert.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SystemCertificates\SystemCert.exe"4⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2280
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
798KB
MD59ce6783342d18bcf75d5e0f8bdaf6a5c
SHA1cf3ad375943f8e7356b99dfdc42427998451634f
SHA25641589067b84a24326985a48925acd3e67d699b97f8a5ad79199c0d1625e3353f
SHA512b71a20e3083fdad2b9dd972dea286a40eeb53953a82292b610554607482f0346cc4099a4a6a4da4073e730357df07f3b52da05f956fb00f6f18f9a4d6c15b9ca