Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/09/2024, 23:28 UTC
Static task
static1
Behavioral task
behavioral1
Sample
d93422d90afdd0bb98893b7418963b69_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
d93422d90afdd0bb98893b7418963b69_JaffaCakes118.exe
-
Size
204KB
-
MD5
d93422d90afdd0bb98893b7418963b69
-
SHA1
27f57edcbbd9a29f8d4994b2e77402d8a30698ad
-
SHA256
ad219579cd97d410613bfd4f5ea9564d13752ccba374bc15babddad4816900d5
-
SHA512
67cf52367576b165d088abdcd8a8f01147f7dc69e1d731d076e3a9f08ba87ccf4b98f376f8e552aacb586c2dd416ab4e71320225bf633821a23c1bc44ca13cc3
-
SSDEEP
3072:OCdA92OA0glhzjGHAf52ytrNitLcCo/yKi0DAYf0H:OCdA92OABMglfMMpUYf0
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat wsmsteps.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d93422d90afdd0bb98893b7418963b69_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wsmsteps.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wsmsteps.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d93422d90afdd0bb98893b7418963b69_JaffaCakes118.exe -
Modifies data under HKEY_USERS 25 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d2-10-1f-df-d1-aa\WpadDecisionReason = "1" wsmsteps.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d2-10-1f-df-d1-aa\WpadDetectedUrl wsmsteps.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" wsmsteps.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E7CC722-C7FF-4312-808E-95646135DFC9}\WpadDecision = "0" wsmsteps.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E7CC722-C7FF-4312-808E-95646135DFC9}\d2-10-1f-df-d1-aa wsmsteps.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings wsmsteps.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wsmsteps.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d2-10-1f-df-d1-aa wsmsteps.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E7CC722-C7FF-4312-808E-95646135DFC9}\WpadNetworkName = "Network 3" wsmsteps.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wsmsteps.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d2-10-1f-df-d1-aa\WpadDecision = "0" wsmsteps.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E7CC722-C7FF-4312-808E-95646135DFC9}\WpadDecisionTime = 30894f88d903db01 wsmsteps.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad wsmsteps.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E7CC722-C7FF-4312-808E-95646135DFC9} wsmsteps.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E7CC722-C7FF-4312-808E-95646135DFC9}\WpadDecisionReason = "1" wsmsteps.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d2-10-1f-df-d1-aa\WpadDecisionTime = 30116734d903db01 wsmsteps.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections wsmsteps.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wsmsteps.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" wsmsteps.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings wsmsteps.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E7CC722-C7FF-4312-808E-95646135DFC9}\WpadDecisionTime = 30116734d903db01 wsmsteps.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d2-10-1f-df-d1-aa\WpadDecisionTime = 30894f88d903db01 wsmsteps.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" wsmsteps.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix wsmsteps.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wsmsteps.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1172 d93422d90afdd0bb98893b7418963b69_JaffaCakes118.exe 2336 d93422d90afdd0bb98893b7418963b69_JaffaCakes118.exe 3056 wsmsteps.exe 2252 wsmsteps.exe 2252 wsmsteps.exe 2252 wsmsteps.exe 2252 wsmsteps.exe 2252 wsmsteps.exe 2252 wsmsteps.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2336 d93422d90afdd0bb98893b7418963b69_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1172 wrote to memory of 2336 1172 d93422d90afdd0bb98893b7418963b69_JaffaCakes118.exe 31 PID 1172 wrote to memory of 2336 1172 d93422d90afdd0bb98893b7418963b69_JaffaCakes118.exe 31 PID 1172 wrote to memory of 2336 1172 d93422d90afdd0bb98893b7418963b69_JaffaCakes118.exe 31 PID 1172 wrote to memory of 2336 1172 d93422d90afdd0bb98893b7418963b69_JaffaCakes118.exe 31 PID 3056 wrote to memory of 2252 3056 wsmsteps.exe 33 PID 3056 wrote to memory of 2252 3056 wsmsteps.exe 33 PID 3056 wrote to memory of 2252 3056 wsmsteps.exe 33 PID 3056 wrote to memory of 2252 3056 wsmsteps.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d93422d90afdd0bb98893b7418963b69_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d93422d90afdd0bb98893b7418963b69_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\d93422d90afdd0bb98893b7418963b69_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d93422d90afdd0bb98893b7418963b69_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2336
-
-
C:\Windows\SysWOW64\wsmsteps.exe"C:\Windows\SysWOW64\wsmsteps.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\wsmsteps.exe"C:\Windows\SysWOW64\wsmsteps.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
Network
-
Remote address:186.71.61.90:80RequestPOST / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
Host: 186.71.61.90
Content-Length: 292
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 500 Internal Error
Accept-Ranges: bytes
Connection: close
X-Frame-Options: SAMEORIGIN
Cache-Control: no-cache,no-store
Content-Type: text/html
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
1.1kB 4.8kB 11 9
HTTP Request
POST http://186.71.61.90/HTTP Response
500