Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe
-
Size
336KB
-
MD5
b3b683885596a5b798d8c7303042be5d
-
SHA1
398c6d57daa6d710ec380b5c22284aabc7dcf489
-
SHA256
d9f9108b95f8a0309904b0257d05c74a6c5a93898fc60007c19e3f0c88fa59bc
-
SHA512
3a0ab3a761e6b021b73cdd06cf7bbaaa812990b389cf554034beb060b8ab90dd99968356ba51616cfbeb5f289c4eae46080451c0667b3f6894fc726bfb55b651
-
SSDEEP
6144:8Z9ISZXtMC0bck9VXomSVcJLsENLIaQ2G4pu3xPu6tdxDhfaGcd6yUWppsKnSxUE:U9ISt2C0FbSVgLT57hpu3xG6Lx1faTdi
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\4a9ddc87\\X" Explorer.EXE -
Deletes itself 1 IoCs
pid Process 2680 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 336 csrss.exe 2808 X -
Loads dropped DLL 2 IoCs
pid Process 2692 b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe 2692 b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2692 set thread context of 2680 2692 b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \registry\machine\Software\Classes\Interface\{445ba004-8cc0-aae0-7705-79316f946d33} b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{445ba004-8cc0-aae0-7705-79316f946d33}\u = "189" b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{445ba004-8cc0-aae0-7705-79316f946d33}\cid = "2942234315504985480" b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2692 b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe 2692 b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe 2692 b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe 2808 X -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2692 b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe Token: SeDebugPrivilege 2692 b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 336 csrss.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2692 wrote to memory of 336 2692 b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe 2 PID 336 wrote to memory of 1164 336 csrss.exe 30 PID 336 wrote to memory of 1164 336 csrss.exe 30 PID 2692 wrote to memory of 2808 2692 b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2808 2692 b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2808 2692 b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2808 2692 b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe 31 PID 2808 wrote to memory of 1228 2808 X 21 PID 2692 wrote to memory of 2680 2692 b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe 32 PID 2692 wrote to memory of 2680 2692 b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe 32 PID 2692 wrote to memory of 2680 2692 b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe 32 PID 2692 wrote to memory of 2680 2692 b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe 32 PID 2692 wrote to memory of 2680 2692 b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe 32
Processes
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:336
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies WinLogon for persistence
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b3b683885596a5b798d8c7303042be5d_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\4a9ddc87\X193.105.154.210:803⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2680
-
-
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56a0ae4db3e54c23e387a0511fe1571d8
SHA1659dc08d39e85893ea664fe022faebbaaf046e97
SHA256efae051c3fcd80ce09afb5cb2e7ce16e1017f9208bf947fa045c4282f840cc95
SHA5125217ee81f1ddce0182c536b6dc1533265f8e5c7b424c89cdf7bc8a4f3ec66d6d39a7f99a7944460a7891964d2e2fcf1978841837ab6ce8b55f06262f1af361d2
-
Filesize
41KB
MD5686b479b0ee164cf1744a8be359ebb7d
SHA18615e8f967276a85110b198d575982a958581a07
SHA256fcfbb4c648649f4825b66504b261f912227ba32cbaabcadf4689020a83fb201b
SHA5127ed8022e2b09f232150b77fc3a25269365b624f19f0b50c46a4fdf744eeb23294c09c051452c4c9dbb34a274f1a0bfc54b3ff1987ec16ae2e54848e22a97ed64
-
Filesize
31KB
MD5dafc4a53954b76c5db1d857e955f3805
SHA1a18fa0d38c6656b4398953e77e87eec3b0209ef3
SHA256c6c82dde145a2dd9d70b1b539b17571befb663fc4a9ca834ff2a140cc4ebaa0b
SHA512745e27a4f952e2492dbd12ced396be2c7dc78344ba415ad64b45920f95d7a282e30c7ad2da9266dc195c71e38019809e8183a705f9276c7d178de2f5ef34b633
-
Filesize
2KB
MD5cb108d2c7fa33339188c4c5c85772629
SHA1e824b79f7a5217d0186d3a99793b6aad42d6e8a8
SHA256d73ac005006a1e09ee4138a4bcd62df977a6133b4d52c04edcf61edc209ddddf
SHA5120c194e7fbb95938ed74badf870b5b72095ed746e6151d15b031f0ca37f04b41a2fe83d13f8e0391e45df38822f7c338d60c1deb562c5b5f29ae426f22cae1b29