Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 11:12
Static task
static1
Behavioral task
behavioral1
Sample
be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe
-
Size
372KB
-
MD5
be78648987cc8d8877fa28d0b436e680
-
SHA1
73f9667db9813f6ce815674cfc0538afc177eb24
-
SHA256
912c43b3def870c3b938842ac2e427bb1ba3b4739d98b9a98cec599d5b16f0f5
-
SHA512
eea1bb4a15454dda9c9e1c7633607ce6e5972855dfe8c0c978cc6c4355977c264ca9419949fbed6ff724985a4f38a0733f580dccea49380b953ca60c7020ed01
-
SSDEEP
6144:ipAM3kJo1QbtG8VQ3Rf9KDLgrtMQFD3DZSoAyA/GbEV6IPNkVwR+kyL0pPtP:gAM3ksl9RYcSQFDTZSe7Iv+J0
Malware Config
Extracted
nanocore
1.2.2.0
185.84.181.89:6090
a05fa7d1-a97c-4558-8581-157369e20df6
-
activate_away_mode
true
-
backup_connection_host
185.84.181.89
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2018-09-10T10:17:40.066554436Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
6090
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
a05fa7d1-a97c-4558-8581-157369e20df6
-
mutex_timeout
5000
-
prevent_system_sleep
false
- primary_connection_host
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2356 tmp.exe -
Loads dropped DLL 3 IoCs
pid Process 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DSL Service = "C:\\Program Files (x86)\\DSL Service\\dslsv.exe" tmp.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tmp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2660 set thread context of 2748 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 34 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\DSL Service\dslsv.exe tmp.exe File opened for modification C:\Program Files (x86)\DSL Service\dslsv.exe tmp.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\AppData\Roaming\FolderN\name.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2616 timeout.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\FolderN\name.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 2356 tmp.exe 2356 tmp.exe 2356 tmp.exe 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2356 tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe Token: SeDebugPrivilege 2356 tmp.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2716 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 30 PID 2660 wrote to memory of 2716 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 30 PID 2660 wrote to memory of 2716 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 30 PID 2660 wrote to memory of 2716 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 30 PID 2716 wrote to memory of 2760 2716 cmd.exe 32 PID 2716 wrote to memory of 2760 2716 cmd.exe 32 PID 2716 wrote to memory of 2760 2716 cmd.exe 32 PID 2716 wrote to memory of 2760 2716 cmd.exe 32 PID 2660 wrote to memory of 2356 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 33 PID 2660 wrote to memory of 2356 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 33 PID 2660 wrote to memory of 2356 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 33 PID 2660 wrote to memory of 2356 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 33 PID 2660 wrote to memory of 2748 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 34 PID 2660 wrote to memory of 2748 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 34 PID 2660 wrote to memory of 2748 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 34 PID 2660 wrote to memory of 2748 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 34 PID 2660 wrote to memory of 2748 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 34 PID 2660 wrote to memory of 2748 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 34 PID 2660 wrote to memory of 2748 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 34 PID 2660 wrote to memory of 2748 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 34 PID 2660 wrote to memory of 2748 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 34 PID 2660 wrote to memory of 2640 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 35 PID 2660 wrote to memory of 2640 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 35 PID 2660 wrote to memory of 2640 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 35 PID 2660 wrote to memory of 2640 2660 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 35 PID 2640 wrote to memory of 2616 2640 cmd.exe 37 PID 2640 wrote to memory of 2616 2640 cmd.exe 37 PID 2640 wrote to memory of 2616 2640 cmd.exe 37 PID 2640 wrote to memory of 2616 2640 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderN\name.exe.lnk" /f3⤵
- System Location Discovery: System Language Discovery
PID:2760
-
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\FolderN\name.exe.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\timeout.exetimeout /t 3003⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2616
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD5be78648987cc8d8877fa28d0b436e680
SHA173f9667db9813f6ce815674cfc0538afc177eb24
SHA256912c43b3def870c3b938842ac2e427bb1ba3b4739d98b9a98cec599d5b16f0f5
SHA512eea1bb4a15454dda9c9e1c7633607ce6e5972855dfe8c0c978cc6c4355977c264ca9419949fbed6ff724985a4f38a0733f580dccea49380b953ca60c7020ed01
-
Filesize
189B
MD5dca86f6bec779bba1b58d992319e88db
SHA1844e656d3603d15ae56f36298f8031ad52935829
SHA256413b4ee68f5400fcd30ae5df957d723989b400637dbc7f5d158fa050bdc20743
SHA5124b9d532a777921543b3243020ea4b655a8b956c400b237ce714b5bd8e9a3ad7fdbcb11410e84e2e0ecc45e87dcd107385a487f5bb5b359aabd1322314ef2d24c
-
Filesize
202KB
MD5ef61ddda989f2e052586f759a252a95e
SHA1fbe444902f753c69f125cfb18a584df1aa40c97c
SHA256b40d3bf34d364853c63bb1caef39f9eb2915c41fee9aed0c6a8c1703823834a2
SHA512b5bb7a013fc574648fbc76f4f42c26080844824eb0e32a09e6cc6cfc544ad80e07807377bc1fbfa78f64bce72af363f46eaeacafe629015650112a38273a74d7