Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 22:39
Static task
static1
Behavioral task
behavioral1
Sample
d5370a01303e0afce725c9834e632233_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
d5370a01303e0afce725c9834e632233_JaffaCakes118.exe
-
Size
315KB
-
MD5
d5370a01303e0afce725c9834e632233
-
SHA1
1e7ed2fb9dacf927cc2f5228ec3268398b56cbf7
-
SHA256
e9f8c9f2e06ec57ba035788b663be0d6f4daa84fcdaae6f7404ec32018a3dbb6
-
SHA512
55435ae0d5f83abb9ff4fc1ae2f97d1d5b67ba5a4b8e27338219d0e84a8146d9746903ddf5b9c2e1c36d6ea3c506d4e19775dd29b1c0ea27f636d22b4ae0abe8
-
SSDEEP
6144:GBXrokILZ3azkm07MfhJo+kzo0PKTN7vb2wJdR/:GXw3axaMfPP0PKTBviil
Malware Config
Extracted
cybergate
v1.07.5
remote
acebomber.no-ip.info:100
acebomber.no-ip.info:8080
QD13I0IE20373F
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\svchost.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\svchost.exe" vbc.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{52H57FY5-1751-M040-OW46-N2177HNQFOG7}\StubPath = "C:\\Windows\\system32\\install\\svchost.exe Restart" vbc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{52H57FY5-1751-M040-OW46-N2177HNQFOG7} vbc.exe -
Executes dropped EXE 3 IoCs
pid Process 2160 vbc.exe 2812 vbc.exe 2720 svchost.exe -
Loads dropped DLL 3 IoCs
pid Process 2520 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 2160 vbc.exe 2812 vbc.exe -
resource yara_rule behavioral1/memory/2160-32-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/2160-37-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\svchost.exe" vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\svchost.exe" vbc.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\install\ vbc.exe File created C:\Windows\SysWOW64\install\svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\install\svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\install\svchost.exe vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2520 set thread context of 2160 2520 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5370a01303e0afce725c9834e632233_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2160 vbc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2812 vbc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 2812 vbc.exe Token: SeRestorePrivilege 2812 vbc.exe Token: SeDebugPrivilege 2812 vbc.exe Token: SeDebugPrivilege 2812 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2160 2520 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2160 2520 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2160 2520 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2160 2520 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2160 2520 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2160 2520 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2160 2520 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2160 2520 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2160 2520 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2160 2520 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2160 2520 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2160 2520 d5370a01303e0afce725c9834e632233_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31 PID 2160 wrote to memory of 2316 2160 vbc.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5370a01303e0afce725c9834e632233_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5370a01303e0afce725c9834e632233_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2812 -
C:\Windows\SysWOW64\install\svchost.exe"C:\Windows\system32\install\svchost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2720
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD54ad8fa33ef9412e122d585d603eace5a
SHA1fdc8ea181390e90da0125389edaa96f95ab653d8
SHA256c92f16b24915720788b178dde4451e337c4b590e2e499af24e34a87c9dace088
SHA51226dc6ecdeb87e2646d1556ccdd875151dbf7588b14f7213843dff7f04f77ab591c363c2d8ad520a3b60f3fc1799e7aa703065adf03df817f6eef9cb8ef42bdca
-
Filesize
8B
MD58ecf5643e198246337377508b13eb9b0
SHA1aec3d4626f9e24700249559e67ddd2a42a87472b
SHA2568c533257d13683130bf4d06b87f5b742f61c53e3f534c7ad96f6c6bc17067df2
SHA512f25504412d0b91cd303343d5727a19848673f724169debcff67acf58d69bd10bef1782ea11f4a22cbbec9b17c7d64067c1fef185f039c3afc4c9efb08929bd66
-
Filesize
8B
MD5e6b4573a07f8c8d2cfb83662bf3aab67
SHA1a6579f60e17d594918d38e12011b1fcd1b1e8362
SHA256a2917adf0ee9ced5c497fcd3f1fa21934a24924d4f6f2ed1610488f395632bba
SHA5124907d5aec8f8001600b5b30f740f51d1aeb693c28c523d851cd12f2d37c4c0882eea175ae8b4acfd4b621f5f7021f0f67d4ef1f0bd4a9ea035e955a528f9fa14
-
Filesize
8B
MD52987ce8f4c9d35e10541f3c8e5e93fe8
SHA13b4796feb35e47e3b84c7f4baf2acb88cb26740c
SHA256b77e4101f4d47142277dd0df33a8d80084cec7c4cd67f4b94ebed819936f5bb5
SHA512224770b4b830ed27fac257c9cbcefeae52befb94cb1b49f8329ae63104911897ef66fd04887d6c5842cd83ec8b687bb6b7cd30465e6db3303d56434b26fe33b3
-
Filesize
8B
MD57cc8654337260869aea3f5a451c76f41
SHA11d2b4df67815d2f4fc05581869300eefdb704f4c
SHA256805e7ac2444dec9eacdd94c516abf243cc71edb56697c5c949afbb01cc258762
SHA5126139b0cfa408fa3759528d89a1b0f1742004dfc4be6dc703470543b3d70707fd3c6f6e95c7455a1a7eed1e3e2eecbf42096208aa727347c055a41bd850a5f7a7
-
Filesize
8B
MD5a76ab98beca27344431053e7e579786d
SHA1ef61edc420b3d3136ee8233420cfacddae938981
SHA25617537f665f00dc4a82a3f21373a67702e4be838e0c4d63767549753d7519f08a
SHA51258fd569f95a547ca115ad821ed38ec89d7c62d4cc78bbd75a3c6f62ac034e77d9e57bc379684d99d36292120ea91b8ed9060ce368992c9f57469e51f11237f61
-
Filesize
8B
MD51749a63008dfb099bbdb7723b31da6dd
SHA1e279fb662bca26071553c21d39705c75cc8ab3c9
SHA2564e05bb839bd30d105f26cff6531b6eabb1866a39a198f11fcc7b62bf3518b1d7
SHA512554275b22dea39ca25df0fceecf81ec4d1e70be4bcec7c4cfe20989f268aafc2dc150f2dd2364405c41c6e1b30e692d800248146ae216dc4594fe49e69e320a1
-
Filesize
8B
MD509a685f06a57ad3909a426675f3ab66d
SHA12f8722fa86379bf020ca4d4cc013b0bb37c035d6
SHA256f10c76ed10eb7b16276ee8088359a8018ae1041252a513425447aa60e8d40e62
SHA512a7c6d7435800e66cff79c00108511167ffe258fd62e596508ba9c11669f08b07e73f214a6d6fbc3a61ebcea95a4bd1e02f16dc58293b6f005747ba8c793307c8
-
Filesize
8B
MD57387a06d95d12dc35030337a680ef140
SHA15299e03b6d869f6da07af12eb4eb6f7d02cf8b21
SHA256c8ab9326e39847041511d5d5274b528fa28bd39f4183da11c60f27c2722d6759
SHA512b64bd2fbcf694d72b4a4691d6de3e1e35994d29ff10fe298092272a5f4bc3db7009c704f7951d41e2504f5ea50aa63e5279ce25bf3c8cc35d9aee06c9ee12fc5
-
Filesize
8B
MD5ba51d969b5b3645d8aea59e492658efe
SHA1ce52d2cf2243dfbf5a6603618b73ca4e44c18b60
SHA2568dc0bb155e771fb86168c4b307f629fc57a7ba633b37fb7e4babf8ca46219b06
SHA512567ab983eaac8a5a99fb11fbfbc5e51b51a0aeb9b19d9f48b1ce02b5ebf289273d1bfe92b5d00ebe969be12f1b7ac32c55b7bcf0f6d57663853adce430e03737
-
Filesize
8B
MD5f6710b198f400272885b3bbb572d610d
SHA194fe6099381694b8398d37eb98cd33d78b176cad
SHA256e5f6e6a1a2804bc29fd63d3cda512c11959b6880f861a72c42114ffcbf59c18d
SHA512621dc1a7b944f75488d030cd0d50427beabfd66c0258fe8e344104536001d34b9509dcdb52adde20d59b27471671ea2a7777187af5b2079e58ec719b3a1e9133
-
Filesize
8B
MD56c1763df77694201001a1db5b5b633d7
SHA126f3a8657c8dacc0571bd3d2f663a3529ba82fe1
SHA25638a29a1623d0f73d494dad1dbaf5fe1a78a7db409e0f2fab5d252bf4ec985378
SHA5128cbb26afef2d3181046b7af5d300cb2955c7c9dd9efae8a4d28d63d7321ce5174be476957d2c3a73135d243358b6486d46e4bd575b8f7d0d6c5319a3d5920410
-
Filesize
8B
MD51b77491b531785cc4906f6a11cdcc15a
SHA15b6a4ad5e5372fd3051ced5f0693f956b802874f
SHA2561cc178036a881149395356694b3a398659386aef39bf9f5c52714e0750e8663b
SHA512a055121258076f39cc4d9c4c8d5a8b5b323666eccddd2521f19a8563983fbfe6124f46d9ca7c57ddf1771b7b2e82a9a788e9eb8fb86fd80a7c85f121a98dff51
-
Filesize
8B
MD590223706be0e74657bf2c11d547e6ca2
SHA12c17644bbda5d3d8b9894ab26703039398d1289e
SHA256104c5cd843afd8780babe6a2666b8b997eeedd7d86b6790f8c8c239e9bf1157f
SHA512122f9d34d01493c1ad6ee367df51855135ac7fb001ff6344cccd3e8648557f686cc69583e2f8e19b5e29ceacbccba889c40c3b3f63019ff94ad7b5067a83e46c
-
Filesize
8B
MD5502b0c689a13bfddb32d086f1a902003
SHA175a06d71bc1b6f3c5ffc2bc68bf6ded66ddb0014
SHA256417f47243e4aa81233b3a3c0865acfa72b40e0253c5737cfa2f2cd6ff7b90209
SHA5122115542dc612131e8f177cccd24ab38f6cbe79e37d0cef4665eb88aea3b5c0d6887ca494d590fae689316bbf704b08fc7d8b5a05a4899536e310dbac143b8764
-
Filesize
8B
MD5485647b21ab314e8662f64dee9e415cf
SHA1dd161d7bccfc9cb209158666b8b2a4002abcc7c6
SHA256abf01141053b25c71f60ca64ec84529602ee0e1607cbb3be2a0549e79431b9f5
SHA512ecdb00adc8834e2b9c07af7efd6b9ed1971f21dab8e2471bf514a831a161ccaa3aa44bf4f29e3760cd05eb85c19e281938b8faeb634108d3f666529bea3914cf
-
Filesize
8B
MD501adea81cf6f49992255dc13292b8af2
SHA1fb0fa0e0f609cc57ecc7f654aa9143a4f52181c3
SHA256e2789edd50f101bc9cce146788863c804552893cd33b82a0f704c14eb3346d69
SHA512b441cd39c2f6942b5a3a9d5af0e1f64ac355d90977f69e888603b477cda4bc0764c9f1884a8b39717f4ebbb47879baf9dafdc67bb9b864d02710f7d46d1a1abe
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98