Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe
-
Size
94KB
-
MD5
b2a53173b9154b477af5d6e8e7ddb9df
-
SHA1
3471cad194d3b928dc3d0d4b738cc6cd81234f79
-
SHA256
3f97c3855ee4dee62275a6b3d8a2a22d4200a0d2ab03da5e0b08157e30b9ec7a
-
SHA512
ffacca7f0cf03aca07632e929080468b1280bdebee5940298e4178a2b94f6ed427f0a0364836e6d63713353831d2c33fb54780a26963170c445539c17b5a7324
-
SSDEEP
1536:2HpqdKQfKImkaXmcGhoc//////lVQcprzIxYLadR7fvlPP+/zPwKiuicqaa+IW0F:2QKLI1aXmcGyc//////zrwrdf+7oKi/P
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0008000000014d78-13.dat acprotect -
Deletes itself 1 IoCs
pid Process 2712 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2464 wmnet.exe -
Loads dropped DLL 3 IoCs
pid Process 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 2464 wmnet.exe -
resource yara_rule behavioral1/files/0x00070000000120fb-1.dat upx behavioral1/memory/2676-2-0x00000000001B0000-0x00000000001B9000-memory.dmp upx behavioral1/files/0x0008000000014d78-13.dat upx behavioral1/memory/2464-14-0x0000000010000000-0x0000000010010000-memory.dmp upx behavioral1/memory/2464-18-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2464-19-0x0000000010000000-0x0000000010010000-memory.dmp upx -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\08223B03.dll wmnet.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\FOnts\eCgMhGRkPUcdutd0.ttf wmnet.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmnet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLsID\{08223B03-1B38-4A33-A83A-A4D3CC1D6E4E}\InprocServer32 wmnet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node wmnet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLsID wmnet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08223B03-1B38-4A33-A83A-A4D3CC1D6E4E} wmnet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08223B03-1B38-4A33-A83A-A4D3CC1D6E4E}\InprocServer32 wmnet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08223B03-1B38-4A33-A83A-A4D3CC1D6E4E}\InprocServer32\ = "C:\\Windows\\SysWow64\\08223B03.dll" wmnet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08223B03-1B38-4A33-A83A-A4D3CC1D6E4E}\InprocServer32\ThreadingModel = "Apartment" wmnet.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 2464 wmnet.exe 2464 wmnet.exe 2464 wmnet.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe Token: SeDebugPrivilege 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe Token: SeDebugPrivilege 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe Token: SeDebugPrivilege 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe Token: SeDebugPrivilege 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe Token: SeDebugPrivilege 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe Token: SeDebugPrivilege 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe Token: SeDebugPrivilege 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe Token: SeDebugPrivilege 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe Token: SeDebugPrivilege 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe Token: SeDebugPrivilege 2464 wmnet.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2464 wmnet.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2676 wrote to memory of 904 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 30 PID 2676 wrote to memory of 904 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 30 PID 2676 wrote to memory of 904 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 30 PID 2676 wrote to memory of 904 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 30 PID 2676 wrote to memory of 2016 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 31 PID 2676 wrote to memory of 2016 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 31 PID 2676 wrote to memory of 2016 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 31 PID 2676 wrote to memory of 2016 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 31 PID 2676 wrote to memory of 1840 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 32 PID 2676 wrote to memory of 1840 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 32 PID 2676 wrote to memory of 1840 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 32 PID 2676 wrote to memory of 1840 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 32 PID 2676 wrote to memory of 2488 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 35 PID 2676 wrote to memory of 2488 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 35 PID 2676 wrote to memory of 2488 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 35 PID 2676 wrote to memory of 2488 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 35 PID 2676 wrote to memory of 3056 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 36 PID 2676 wrote to memory of 3056 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 36 PID 2676 wrote to memory of 3056 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 36 PID 2676 wrote to memory of 3056 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 36 PID 2676 wrote to memory of 2324 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 38 PID 2676 wrote to memory of 2324 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 38 PID 2676 wrote to memory of 2324 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 38 PID 2676 wrote to memory of 2324 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 38 PID 2016 wrote to memory of 2684 2016 net.exe 43 PID 2016 wrote to memory of 2684 2016 net.exe 43 PID 904 wrote to memory of 2252 904 net.exe 42 PID 2016 wrote to memory of 2684 2016 net.exe 43 PID 2016 wrote to memory of 2684 2016 net.exe 43 PID 904 wrote to memory of 2252 904 net.exe 42 PID 904 wrote to memory of 2252 904 net.exe 42 PID 904 wrote to memory of 2252 904 net.exe 42 PID 2488 wrote to memory of 2736 2488 net.exe 44 PID 2488 wrote to memory of 2736 2488 net.exe 44 PID 2488 wrote to memory of 2736 2488 net.exe 44 PID 2488 wrote to memory of 2736 2488 net.exe 44 PID 1840 wrote to memory of 2788 1840 net.exe 45 PID 1840 wrote to memory of 2788 1840 net.exe 45 PID 1840 wrote to memory of 2788 1840 net.exe 45 PID 1840 wrote to memory of 2788 1840 net.exe 45 PID 3056 wrote to memory of 2808 3056 net.exe 46 PID 3056 wrote to memory of 2808 3056 net.exe 46 PID 3056 wrote to memory of 2808 3056 net.exe 46 PID 3056 wrote to memory of 2808 3056 net.exe 46 PID 2324 wrote to memory of 2812 2324 net.exe 47 PID 2324 wrote to memory of 2812 2324 net.exe 47 PID 2324 wrote to memory of 2812 2324 net.exe 47 PID 2324 wrote to memory of 2812 2324 net.exe 47 PID 2676 wrote to memory of 2464 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 48 PID 2676 wrote to memory of 2464 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 48 PID 2676 wrote to memory of 2464 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 48 PID 2676 wrote to memory of 2464 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 48 PID 2464 wrote to memory of 2876 2464 wmnet.exe 50 PID 2464 wrote to memory of 2876 2464 wmnet.exe 50 PID 2464 wrote to memory of 2876 2464 wmnet.exe 50 PID 2464 wrote to memory of 2876 2464 wmnet.exe 50 PID 2676 wrote to memory of 2712 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 52 PID 2676 wrote to memory of 2712 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 52 PID 2676 wrote to memory of 2712 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 52 PID 2676 wrote to memory of 2712 2676 b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b2a53173b9154b477af5d6e8e7ddb9df_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"3⤵
- System Location Discovery: System Language Discovery
PID:2252
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Windows Firewall/Internet Connection Sharing (ICS)"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"3⤵
- System Location Discovery: System Language Discovery
PID:2684
-
-
-
C:\Windows\SysWOW64\net.exenet stop System Restore Service2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop System Restore Service3⤵
- System Location Discovery: System Language Discovery
PID:2788
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Security Center"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"3⤵
- System Location Discovery: System Language Discovery
PID:2736
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Windows Firewall/Internet Connection Sharing (ICS)"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"3⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
-
C:\Windows\SysWOW64\net.exenet stop System Restore Service2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop System Restore Service3⤵
- System Location Discovery: System Language Discovery
PID:2812
-
-
-
C:\Users\Admin\AppData\Local\Temp\wmnet.exeC:\Users\Admin\AppData\Local\Temp\wmnet.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\wmnet.exe >> NUL3⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del C:\avp.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5a3572767adcc4fd09dc4d9c18e2cc79b
SHA1a88406a6b6ee8b67b6a5952f039989398dbfe71d
SHA256475ba77f291cb1a34fe13ac678f7f3438813914299c5943c6b9dfb69189a9ebd
SHA51239f9fe10828b6dab1373af552fafe4fe83de30945fbc28c05c310d4a8690ae59059b2c74abdbd05f4072fe3a5e93ecacdb35bfef52569462d3e222672c1392dc
-
Filesize
15KB
MD52e8621a3f5c9ae5ca3e6062b11b8936d
SHA1cd3d3342a9455ace35eb2220f3f0465915a48dee
SHA256e6c6aea9cf9f0e39e6cbc4b5dcb780d2a2f032612e00c86ebe26ac3def9288e5
SHA512b6d53bc59ecd2819e0504c719e24413c4e6188244e52d613c18590a94462a200ac4fb50d40e7256aedaec36ae3d08ed530c11c7657e82b66e5d508f6efff18a3