Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
d693ca1ee2563988ed8f2bf122ce9a01_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d693ca1ee2563988ed8f2bf122ce9a01_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d693ca1ee2563988ed8f2bf122ce9a01_JaffaCakes118.exe
-
Size
617KB
-
MD5
d693ca1ee2563988ed8f2bf122ce9a01
-
SHA1
2607c509fa750eb7202796b7c9a846d58f16c8dd
-
SHA256
919e0afd668cb7d3cec17fedacb7737aeab68f710939c00a5619d7d550bda308
-
SHA512
0b0badb938e821f0ef1ce3583684b9c63339e511b025ea32e330c3f683570275a9d855f0b5e689334bb01675b7116668cfccaabbd00e5e44c0c67e699b44022f
-
SSDEEP
12288:BU/xRawGmS2FCj8j9aa4gLEUyULF3Z4mxxh1scKb4jYyWBEWxmWmb6s:6/xAjmSdiAa4g4UnQmXhksUs1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2356 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2452 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Services\svchost.exe d693ca1ee2563988ed8f2bf122ce9a01_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\Services\svchost.exe d693ca1ee2563988ed8f2bf122ce9a01_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\DELME.BAT d693ca1ee2563988ed8f2bf122ce9a01_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d693ca1ee2563988ed8f2bf122ce9a01_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 28 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37C8DEF1-A5C5-4BA7-95B6-CE3360EDE875}\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-23-67-6c-eb-77\WpadDecisionTime = 700e8c0ecb02db01 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37C8DEF1-A5C5-4BA7-95B6-CE3360EDE875}\WpadDecisionTime = 90fb4934cb02db01 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37C8DEF1-A5C5-4BA7-95B6-CE3360EDE875} svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-23-67-6c-eb-77\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00ee000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-23-67-6c-eb-77\WpadDecisionTime = 90fb4934cb02db01 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-23-67-6c-eb-77 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-23-67-6c-eb-77\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00ee000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37C8DEF1-A5C5-4BA7-95B6-CE3360EDE875}\WpadDecisionTime = 700e8c0ecb02db01 svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-23-67-6c-eb-77\WpadDetectedUrl svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37C8DEF1-A5C5-4BA7-95B6-CE3360EDE875}\WpadDecision = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37C8DEF1-A5C5-4BA7-95B6-CE3360EDE875}\WpadNetworkName = "Network 3" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37C8DEF1-A5C5-4BA7-95B6-CE3360EDE875}\9a-23-67-6c-eb-77 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2472 d693ca1ee2563988ed8f2bf122ce9a01_JaffaCakes118.exe Token: SeDebugPrivilege 2452 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2452 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2452 wrote to memory of 3028 2452 svchost.exe 31 PID 2452 wrote to memory of 3028 2452 svchost.exe 31 PID 2452 wrote to memory of 3028 2452 svchost.exe 31 PID 2452 wrote to memory of 3028 2452 svchost.exe 31 PID 2472 wrote to memory of 2356 2472 d693ca1ee2563988ed8f2bf122ce9a01_JaffaCakes118.exe 32 PID 2472 wrote to memory of 2356 2472 d693ca1ee2563988ed8f2bf122ce9a01_JaffaCakes118.exe 32 PID 2472 wrote to memory of 2356 2472 d693ca1ee2563988ed8f2bf122ce9a01_JaffaCakes118.exe 32 PID 2472 wrote to memory of 2356 2472 d693ca1ee2563988ed8f2bf122ce9a01_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d693ca1ee2563988ed8f2bf122ce9a01_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d693ca1ee2563988ed8f2bf122ce9a01_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\DELME.BAT2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2356
-
-
C:\Program Files (x86)\Common Files\Services\svchost.exe"C:\Program Files (x86)\Common Files\Services\svchost.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
617KB
MD5d693ca1ee2563988ed8f2bf122ce9a01
SHA12607c509fa750eb7202796b7c9a846d58f16c8dd
SHA256919e0afd668cb7d3cec17fedacb7737aeab68f710939c00a5619d7d550bda308
SHA5120b0badb938e821f0ef1ce3583684b9c63339e511b025ea32e330c3f683570275a9d855f0b5e689334bb01675b7116668cfccaabbd00e5e44c0c67e699b44022f
-
Filesize
218B
MD5f30adeaa7b4a1186e5b8eee2507ab6bf
SHA14e6397936a4a1c8560dc66f2c6e5c349c7b8ad3d
SHA256f64b01168001f18785452882480a62bbae1b03891ed1b86825493b55e2c731c5
SHA512f719e4cfaf6b1c224ab43493703edecf4818588469a7228e48e0fa8f9367c3a747fc86d68fdf577ad6a931cd47872aaf730a7f4d04190749a8a3c1a4e3a2cee0