Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 11:10
Static task
static1
Behavioral task
behavioral1
Sample
be77ed73f92a82aebb8a7375522ae7ef_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be77ed73f92a82aebb8a7375522ae7ef_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
be77ed73f92a82aebb8a7375522ae7ef_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
be77ed73f92a82aebb8a7375522ae7ef
-
SHA1
5717106981ef5c2f2a79cdf6775355ed1271f004
-
SHA256
1190030956e93adc590dd91237a8af743c6bb911923e2e0d199f3397aea8b9e3
-
SHA512
2cab2a4631d2c02d58561721547e0404ef0f0d0210f6f7db9c0bb9885ff97347052bbafca78f99e48f6afc0f26bd94ae282e8a08d2528cecb3841d677ba8d2ac
-
SSDEEP
98304:TDqPoBhz1aRxcSUb6SAEdhvxWa9P593R8yAVp2H:TDqPe1CxchZAEUadzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3231) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1476 mssecsvc.exe 2796 mssecsvc.exe 2844 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f01a4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{33D616F7-3C99-47F9-92ED-62E5A43607E9}\WpadDecisionTime = f035144616f6da01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{33D616F7-3C99-47F9-92ED-62E5A43607E9}\WpadDecision = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{33D616F7-3C99-47F9-92ED-62E5A43607E9} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-8f-98-30-d1-45\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-8f-98-30-d1-45 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-8f-98-30-d1-45\WpadDecisionTime = f035144616f6da01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{33D616F7-3C99-47F9-92ED-62E5A43607E9}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{33D616F7-3C99-47F9-92ED-62E5A43607E9}\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{33D616F7-3C99-47F9-92ED-62E5A43607E9}\32-8f-98-30-d1-45 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-8f-98-30-d1-45\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2204 2740 rundll32.exe 30 PID 2740 wrote to memory of 2204 2740 rundll32.exe 30 PID 2740 wrote to memory of 2204 2740 rundll32.exe 30 PID 2740 wrote to memory of 2204 2740 rundll32.exe 30 PID 2740 wrote to memory of 2204 2740 rundll32.exe 30 PID 2740 wrote to memory of 2204 2740 rundll32.exe 30 PID 2740 wrote to memory of 2204 2740 rundll32.exe 30 PID 2204 wrote to memory of 1476 2204 rundll32.exe 31 PID 2204 wrote to memory of 1476 2204 rundll32.exe 31 PID 2204 wrote to memory of 1476 2204 rundll32.exe 31 PID 2204 wrote to memory of 1476 2204 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be77ed73f92a82aebb8a7375522ae7ef_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be77ed73f92a82aebb8a7375522ae7ef_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1476 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2844
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD55e9414c90567db407d17b23b6e500065
SHA1025b72c478f17edba2e4356cc5c83f5998150395
SHA256c22824f62bb56bdecca9c3dbe160847c73a58693684bc62cf8b200e32f3fdf99
SHA5127c8b197563edfb5b055bd3b762efd574e24ee4614e22298ea75d5e9607419ea6a7b78d8dad0fae559ecbeda20e086314ac4a5b06ae522dd24d3bdfda1dc5648b
-
Filesize
3.4MB
MD5a41b9018417afaa98c366d74449da431
SHA1d06e7929a6f60dce4084a0f21a4c10b627097c21
SHA256d6106a603f1aa96a80cf3e5592b8247b1b6318cc2602917de67f12427a72a8dd
SHA512959fe90914fffc2865ae063dc4caa8713c0ba168b6c43dc065ac92398e8e68249054d909a8390c76d36b6b8cf2734e00c39ab33b274473e0e35eabe1fc552299