Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe
-
Size
139KB
-
MD5
a9ee9939d46efe286708b9283280e39a
-
SHA1
67962c4adead5ed7c353ae17308d9ad1e1722b05
-
SHA256
d59692b6b2068e3e889d115b0870646194f9b1166dc9fd7fa8626017b6c4bd30
-
SHA512
4c2a3e2cf68b0dc5d5feb9305e27657cc995206e05187712e3c36796e8fc50a86052aab4eb7b7b1dd2fa33f7554b7e8f835eac8937be6e25767ce8de32e18a25
-
SSDEEP
1536:xbyWHRHOmj4EkRKoM16gDZyL5EVhAnGqqqqqq1qqqqqVAptsm0haGbydJiEWl/is:hbHRLj48oM11Xhx10ha2qrngPY
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\smss.exe\"" a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\smss.exe\"" smss.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2816 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 2120 smss.exe 2940 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 2644 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 2644 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2644-8-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2644-11-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2644-4-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2644-2-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2644-12-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2644-14-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2644-49-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2940-67-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2940-68-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2940-69-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2940-70-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2940-71-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2940-72-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2940-73-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2940-74-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2940-75-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2940-76-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2940-77-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2940-78-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2940-79-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2940-80-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2940-81-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\smss.exe\"" a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\smss.exe\"" a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\smss.exe\"" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\smss.exe\"" smss.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1832 set thread context of 2644 1832 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 30 PID 2120 set thread context of 2940 2120 smss.exe 35 -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2644 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 2940 smss.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2644 1832 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 30 PID 1832 wrote to memory of 2644 1832 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 30 PID 1832 wrote to memory of 2644 1832 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 30 PID 1832 wrote to memory of 2644 1832 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 30 PID 1832 wrote to memory of 2644 1832 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 30 PID 1832 wrote to memory of 2644 1832 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 30 PID 1832 wrote to memory of 2644 1832 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 30 PID 1832 wrote to memory of 2644 1832 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 30 PID 2644 wrote to memory of 2816 2644 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 32 PID 2644 wrote to memory of 2816 2644 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 32 PID 2644 wrote to memory of 2816 2644 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 32 PID 2644 wrote to memory of 2816 2644 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 32 PID 2644 wrote to memory of 2120 2644 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 34 PID 2644 wrote to memory of 2120 2644 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 34 PID 2644 wrote to memory of 2120 2644 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 34 PID 2644 wrote to memory of 2120 2644 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 34 PID 2120 wrote to memory of 2940 2120 smss.exe 35 PID 2120 wrote to memory of 2940 2120 smss.exe 35 PID 2120 wrote to memory of 2940 2120 smss.exe 35 PID 2120 wrote to memory of 2940 2120 smss.exe 35 PID 2120 wrote to memory of 2940 2120 smss.exe 35 PID 2120 wrote to memory of 2940 2120 smss.exe 35 PID 2120 wrote to memory of 2940 2120 smss.exe 35 PID 2120 wrote to memory of 2940 2120 smss.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\smss.exe" CityScape Enable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Users\Admin\AppData\Roaming\smss.exe/d C:\Users\Admin\AppData\Local\Temp\a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Roaming\smss.exe/d C:\Users\Admin\AppData\Local\Temp\a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2940
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD5bfff4accb83512cf122f6e8ba3eb0f2d
SHA1b5cd2bbddd29ef8a33481249ff900dcf8c4e5faf
SHA256387a09217140b10559b4a5c17976bcce92a22e5a8850e06e80cb56084b9b99a9
SHA512de89708f8115bf65e71c2404adf32d92025d7f24e01c968a03ed624e43ded37fff372f7971d5c3f58f977f74f794f3cd076fab2ef1cb7c49ffb02847bc5e84c1