Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
95s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 15:30
Static task
static1
Behavioral task
behavioral1
Sample
a317c563f808f32548c916c0393b1521_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a317c563f808f32548c916c0393b1521_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a317c563f808f32548c916c0393b1521_JaffaCakes118.exe
-
Size
743KB
-
MD5
a317c563f808f32548c916c0393b1521
-
SHA1
a8a2ba9292e7b016acf69eb958ae9df17a57a95b
-
SHA256
ec5af709ccfd77c32a4f581266bed797a13564e79cd18e193b79302ff173d213
-
SHA512
9745b11e4fb932633bf129a06729845c128cd7410c84b2c1a8cab1fede04ea785838e858b2e1d1d27ccec6471fcded0509f3a139a45da13b15d2dbed05b4aa31
-
SSDEEP
12288:tRn8S++U4u/n/80dW5A0zyo6JwQ5oAlK+GPHvZJIk6bQQ52LYRg08yPwDRYQ:X8MU4ufxdW5A2mJr/kNHv/Ik633Y
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2152 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2520 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat svchost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\61642520.BAT a317c563f808f32548c916c0393b1521_JaffaCakes118.exe File created C:\Windows\svchost.exe a317c563f808f32548c916c0393b1521_JaffaCakes118.exe File opened for modification C:\Windows\svchost.exe a317c563f808f32548c916c0393b1521_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a317c563f808f32548c916c0393b1521_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 28 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-cf-84-f1-b8-c9\WpadDecisionTime = d01e1597baf0da01 svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-cf-84-f1-b8-c9 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FDD0E6C5-5088-4F0E-A879-158EA1B58B9D}\WpadDecision = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-cf-84-f1-b8-c9\WpadDecisionTime = f0a49165baf0da01 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FDD0E6C5-5088-4F0E-A879-158EA1B58B9D}\WpadDecisionReason = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FDD0E6C5-5088-4F0E-A879-158EA1B58B9D}\a2-cf-84-f1-b8-c9 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-cf-84-f1-b8-c9\WpadDecision = "0" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FDD0E6C5-5088-4F0E-A879-158EA1B58B9D} svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-cf-84-f1-b8-c9\WpadDecisionReason = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-cf-84-f1-b8-c9\WpadDetectedUrl svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FDD0E6C5-5088-4F0E-A879-158EA1B58B9D}\WpadDecisionTime = d01e1597baf0da01 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FDD0E6C5-5088-4F0E-A879-158EA1B58B9D}\WpadDecisionTime = f0a49165baf0da01 svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FDD0E6C5-5088-4F0E-A879-158EA1B58B9D}\WpadNetworkName = "Network 3" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3008 a317c563f808f32548c916c0393b1521_JaffaCakes118.exe Token: SeDebugPrivilege 2520 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2152 3008 a317c563f808f32548c916c0393b1521_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2152 3008 a317c563f808f32548c916c0393b1521_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2152 3008 a317c563f808f32548c916c0393b1521_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2152 3008 a317c563f808f32548c916c0393b1521_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2196 2520 svchost.exe 30 PID 2520 wrote to memory of 2196 2520 svchost.exe 30 PID 2520 wrote to memory of 2196 2520 svchost.exe 30 PID 2520 wrote to memory of 2196 2520 svchost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a317c563f808f32548c916c0393b1521_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a317c563f808f32548c916c0393b1521_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\61642520.BAT2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2152
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD5aeec2f0044fbcdc32fd3295cce721c54
SHA1418f6abf866b7915c7983d31a1a9a21bd4867733
SHA256073cef2737bc13f97f9be7f257abf45105e5a7f5be5869650b814ae5aabe0730
SHA512ba1f055fc36b8f4de08e6069dd3073be34372564bec0f480aca263cff3e6f0c34b0341cf947990056b32e26d82085c1ac068d9c5b41b8d46a5a8522badf28bae
-
Filesize
743KB
MD5a317c563f808f32548c916c0393b1521
SHA1a8a2ba9292e7b016acf69eb958ae9df17a57a95b
SHA256ec5af709ccfd77c32a4f581266bed797a13564e79cd18e193b79302ff173d213
SHA5129745b11e4fb932633bf129a06729845c128cd7410c84b2c1a8cab1fede04ea785838e858b2e1d1d27ccec6471fcded0509f3a139a45da13b15d2dbed05b4aa31