Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
a0cb8cc72d1ed62deca800a1c67e27a7_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a0cb8cc72d1ed62deca800a1c67e27a7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a0cb8cc72d1ed62deca800a1c67e27a7_JaffaCakes118.exe
-
Size
221KB
-
MD5
a0cb8cc72d1ed62deca800a1c67e27a7
-
SHA1
c9b5729c5767be44e2d20afbf19024e658c7d426
-
SHA256
3be280337aae9309e2605469dbf49bb6d5e337969e2cc4cfbfb0e5ca9bfc5ff4
-
SHA512
6f9653350fcf6c743ff9c77e9c205571ccdb21fbeb1dbfaa6e59a4739aa07cbd73aeacb621a81dc4711c062fc4479cdc4b0ebf009d2f7fc361f77b1064dfdf11
-
SSDEEP
6144:slOgP/IqPDwJwW/EdBUByinHIPUMIVHoYlkMj:sHIWDU/YUBythwHoY+M
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" in.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" csrss.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2840 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 3008 in.exe 1724 csrss.exe -
Loads dropped DLL 4 IoCs
pid Process 2372 vbc.exe 2372 vbc.exe 3008 in.exe 3008 in.exe -
resource yara_rule behavioral1/files/0x0008000000016dbd-15.dat upx behavioral1/memory/3008-23-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/files/0x000a00000001752b-48.dat upx behavioral1/memory/3008-58-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1724-56-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1724-61-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1724-62-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1724-63-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1724-64-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1724-65-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1724-66-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1724-67-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1724-68-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1724-70-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1724-71-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1724-72-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1724-73-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1724-74-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1724-75-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\boot.exe" a0cb8cc72d1ed62deca800a1c67e27a7_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" in.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" in.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" csrss.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2124 set thread context of 2372 2124 a0cb8cc72d1ed62deca800a1c67e27a7_JaffaCakes118.exe 30 -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language in.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0cb8cc72d1ed62deca800a1c67e27a7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3008 in.exe 1724 csrss.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2372 2124 a0cb8cc72d1ed62deca800a1c67e27a7_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2372 2124 a0cb8cc72d1ed62deca800a1c67e27a7_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2372 2124 a0cb8cc72d1ed62deca800a1c67e27a7_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2372 2124 a0cb8cc72d1ed62deca800a1c67e27a7_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2372 2124 a0cb8cc72d1ed62deca800a1c67e27a7_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2372 2124 a0cb8cc72d1ed62deca800a1c67e27a7_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2372 2124 a0cb8cc72d1ed62deca800a1c67e27a7_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2372 2124 a0cb8cc72d1ed62deca800a1c67e27a7_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2372 2124 a0cb8cc72d1ed62deca800a1c67e27a7_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2372 2124 a0cb8cc72d1ed62deca800a1c67e27a7_JaffaCakes118.exe 30 PID 2372 wrote to memory of 3008 2372 vbc.exe 31 PID 2372 wrote to memory of 3008 2372 vbc.exe 31 PID 2372 wrote to memory of 3008 2372 vbc.exe 31 PID 2372 wrote to memory of 3008 2372 vbc.exe 31 PID 3008 wrote to memory of 2840 3008 in.exe 33 PID 3008 wrote to memory of 2840 3008 in.exe 33 PID 3008 wrote to memory of 2840 3008 in.exe 33 PID 3008 wrote to memory of 2840 3008 in.exe 33 PID 3008 wrote to memory of 1724 3008 in.exe 35 PID 3008 wrote to memory of 1724 3008 in.exe 35 PID 3008 wrote to memory of 1724 3008 in.exe 35 PID 3008 wrote to memory of 1724 3008 in.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0cb8cc72d1ed62deca800a1c67e27a7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a0cb8cc72d1ed62deca800a1c67e27a7_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\in.exe"C:\Users\Admin\AppData\Local\Temp\in.exe"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\csrss.exe" CityScape Enable4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2840
-
-
C:\Users\Admin\AppData\Roaming\csrss.exe/d C:\Users\Admin\AppData\Local\Temp\in.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1724
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5bf5281e799567f07c649dec2489c62a3
SHA148ec1c61d451f07141e9417d809f0de246e493c9
SHA256621e681661656aa4d3665d5e85bd60e7d97efbbd850e0754b8d91ad80f6c5e46
SHA5126373ade7a5d8382461b84b6d63f1fae9c78e84613cda802a37f54fb480160912cecdc2f9c4336ee61b721f63e94445328e8d1fb3d315d7ad5a9fec9be17d671c
-
Filesize
39KB
MD5f419207a1703bf718556d735ee277ef6
SHA1cecacabdaad751d217bc1316ff56e18b5444c324
SHA256f02e44cbdf4cc4c8bb86a27f69df416bb495f7e37c9b3107dc276815b4957724
SHA5120b6cbe6bdb9b8fce7a93813a90791fce3253a384b4ae196dc3bbb81c2b200f56343a013b3e7463f8d2a31e749d2a32bddddac1007f2d72413f6857707f2bfa16