Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/09/2024, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe
-
Size
330KB
-
MD5
d7b7879e0c28036feeb864c103a95a72
-
SHA1
d69e28e3786eb960eea26ffaee46f67ec5f978cb
-
SHA256
557f14fbb46192d0d95134d84963c70f22f81757f41200c2dc9cafcbaa7435fe
-
SHA512
573b1eeee8fd2d03fe9f6ccab4868f9941a537cb3d09fe588106f7daf3d839aa38160f6314bf99071bac288795f4e1d6831118c0ea8e31d6e9cd4612096188b7
-
SSDEEP
6144:NNXIq0JjQba44/qmsuBS1UURwdBPUVw3ejO+gGrRnOs6:rXzxbjmJBS1oPJOS+gGr2
Malware Config
Extracted
emotet
Epoch2
173.91.11.142:80
47.6.15.79:80
47.6.15.79:443
37.59.24.177:8080
66.34.201.20:7080
108.179.206.219:8080
45.56.88.91:443
101.187.134.207:443
1.33.230.137:80
110.143.57.109:80
108.191.2.72:80
47.156.70.145:80
167.71.10.37:8080
190.226.44.20:21
74.105.102.97:8080
190.147.215.53:22
24.45.193.161:7080
70.175.171.251:80
138.59.177.106:443
12.176.19.218:80
190.56.255.118:80
190.211.207.11:443
182.176.132.213:8090
31.131.182.30:80
31.31.77.83:443
181.57.193.14:80
149.202.153.252:8080
189.209.217.49:80
169.239.182.217:8080
98.24.231.64:80
176.106.183.253:8080
159.65.25.128:8080
211.63.71.72:8080
45.51.40.140:80
104.131.44.150:8080
85.72.180.68:80
100.14.117.137:80
110.143.84.202:80
188.152.7.140:80
167.99.105.223:7080
186.75.241.230:80
45.33.49.124:443
50.116.86.205:8080
62.75.187.192:8080
210.6.85.121:80
91.205.215.66:8080
128.65.154.183:443
209.141.54.221:8080
107.170.24.125:8080
178.210.51.222:8080
197.254.221.174:80
66.76.63.99:80
201.184.105.242:443
101.187.247.29:80
217.160.182.191:8080
107.2.2.28:80
190.12.119.180:443
212.186.191.177:80
218.44.21.114:80
61.197.110.214:80
165.227.156.155:443
12.229.155.122:80
67.225.179.64:8080
46.105.131.87:80
178.209.71.63:8080
192.241.255.77:8080
59.103.164.174:80
185.159.102.74:80
64.53.242.181:8080
2.38.99.79:80
5.88.182.250:80
110.142.38.16:80
75.80.148.244:80
206.189.112.148:8080
183.102.238.69:465
78.24.219.147:8080
200.7.243.108:443
209.97.168.52:8080
201.173.217.124:443
190.53.135.159:21
73.11.153.178:8080
73.176.241.255:80
104.237.155.168:443
87.106.136.232:8080
83.136.245.190:8080
212.129.24.79:8080
5.196.74.210:8080
116.48.142.21:443
167.114.242.226:8080
103.86.49.11:8080
212.64.171.206:80
139.130.241.252:443
206.81.10.215:8080
95.128.43.213:8080
87.106.139.101:8080
37.157.194.134:443
91.73.197.90:80
80.21.182.46:80
58.171.42.66:8080
93.147.141.5:80
176.31.200.130:8080
87.230.19.21:8080
104.236.246.93:8080
144.139.247.220:80
195.244.215.206:80
181.31.213.158:8080
104.131.11.150:8080
120.150.246.241:80
181.143.194.138:443
165.228.24.197:80
92.222.216.44:8080
31.172.240.91:8080
86.98.156.239:443
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat deploytexas.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deploytexas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deploytexas.exe -
Modifies data under HKEY_USERS 21 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" deploytexas.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00ce000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 deploytexas.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E8D3A99-D70A-4C07-9E10-A481F371B7C3} deploytexas.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E8D3A99-D70A-4C07-9E10-A481F371B7C3}\WpadDecisionReason = "1" deploytexas.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-bc-6d-92-53-7b\WpadDecisionReason = "1" deploytexas.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-bc-6d-92-53-7b\WpadDecision = "0" deploytexas.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections deploytexas.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E8D3A99-D70A-4C07-9E10-A481F371B7C3}\WpadNetworkName = "Network 3" deploytexas.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-bc-6d-92-53-7b deploytexas.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E8D3A99-D70A-4C07-9E10-A481F371B7C3}\fe-bc-6d-92-53-7b deploytexas.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" deploytexas.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 deploytexas.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings deploytexas.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" deploytexas.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad deploytexas.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings deploytexas.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 deploytexas.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E8D3A99-D70A-4C07-9E10-A481F371B7C3}\WpadDecisionTime = 8015cc0e4b03db01 deploytexas.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E8D3A99-D70A-4C07-9E10-A481F371B7C3}\WpadDecision = "0" deploytexas.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-bc-6d-92-53-7b\WpadDecisionTime = 8015cc0e4b03db01 deploytexas.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix deploytexas.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2888 deploytexas.exe 2888 deploytexas.exe 2888 deploytexas.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2604 d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3056 d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe 3056 d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe 2604 d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe 2604 d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe 2052 deploytexas.exe 2052 deploytexas.exe 2888 deploytexas.exe 2888 deploytexas.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2604 3056 d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe 29 PID 3056 wrote to memory of 2604 3056 d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe 29 PID 3056 wrote to memory of 2604 3056 d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe 29 PID 3056 wrote to memory of 2604 3056 d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe 29 PID 2052 wrote to memory of 2888 2052 deploytexas.exe 31 PID 2052 wrote to memory of 2888 2052 deploytexas.exe 31 PID 2052 wrote to memory of 2888 2052 deploytexas.exe 31 PID 2052 wrote to memory of 2888 2052 deploytexas.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe--8484646f2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2604
-
-
C:\Windows\SysWOW64\deploytexas.exe"C:\Windows\SysWOW64\deploytexas.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\deploytexas.exe--54056482⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2888
-