Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 10:41
Static task
static1
Behavioral task
behavioral1
Sample
c2d308657eccce04ab9e52c363df6e54_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
c2d308657eccce04ab9e52c363df6e54_JaffaCakes118.exe
-
Size
235KB
-
MD5
c2d308657eccce04ab9e52c363df6e54
-
SHA1
867bd5b11cc8829f65a84b352fad5115c445b45f
-
SHA256
cbc223f2c31975d75036610291b14193b98438d9e0629a4f9f83b5bf0f55234a
-
SHA512
3f4b7e2cccb9d5837855db651f01a1b1b480e5474fa35b99ffb4996b4148e1def7e56ede7eba25e1aeccd926442881c9f694833f049a51b72077c4c03bbe71ee
-
SSDEEP
3072:K/yG3uBacP7uE27H0zj4VA6PpKQzOvsQs1xGk+tY5IH3ZpT7l0hQ7dA2l07bB5ST:K93wur7HyVqwHUGdqiJpCG90hy
Malware Config
Extracted
netwire
91.189.180.197:727
kalakuta.ddns.net:727
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2560-4-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/2560-8-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/2560-11-0x0000000000400000-0x000000000042B000-memory.dmp netwire -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\pjgbi = "C:\\Users\\Admin\\AppData\\Roaming\\pjgbiD\\WinDriv.url" c2d308657eccce04ab9e52c363df6e54_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2572 set thread context of 2560 2572 c2d308657eccce04ab9e52c363df6e54_JaffaCakes118.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 864 2560 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2d308657eccce04ab9e52c363df6e54_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2572 c2d308657eccce04ab9e52c363df6e54_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2560 2572 c2d308657eccce04ab9e52c363df6e54_JaffaCakes118.exe 30 PID 2572 wrote to memory of 2560 2572 c2d308657eccce04ab9e52c363df6e54_JaffaCakes118.exe 30 PID 2572 wrote to memory of 2560 2572 c2d308657eccce04ab9e52c363df6e54_JaffaCakes118.exe 30 PID 2572 wrote to memory of 2560 2572 c2d308657eccce04ab9e52c363df6e54_JaffaCakes118.exe 30 PID 2572 wrote to memory of 2560 2572 c2d308657eccce04ab9e52c363df6e54_JaffaCakes118.exe 30 PID 2572 wrote to memory of 2560 2572 c2d308657eccce04ab9e52c363df6e54_JaffaCakes118.exe 30 PID 2572 wrote to memory of 2560 2572 c2d308657eccce04ab9e52c363df6e54_JaffaCakes118.exe 30 PID 2572 wrote to memory of 2560 2572 c2d308657eccce04ab9e52c363df6e54_JaffaCakes118.exe 30 PID 2560 wrote to memory of 864 2560 msiexec.exe 31 PID 2560 wrote to memory of 864 2560 msiexec.exe 31 PID 2560 wrote to memory of 864 2560 msiexec.exe 31 PID 2560 wrote to memory of 864 2560 msiexec.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2d308657eccce04ab9e52c363df6e54_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c2d308657eccce04ab9e52c363df6e54_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\\System32\\msiexec.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 2883⤵
- Program crash
PID:864
-
-