Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 01:47
Static task
static1
Behavioral task
behavioral1
Sample
d9647807efd2fbdecfc3c164587fa401_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
d9647807efd2fbdecfc3c164587fa401_JaffaCakes118.exe
-
Size
360KB
-
MD5
d9647807efd2fbdecfc3c164587fa401
-
SHA1
5039e959189cc5157e3eee400f50c06b9e0e59d8
-
SHA256
36c60f479d584f8d83e15203986dd14653e214be0c68d33e6ddfa6ad3cbd1157
-
SHA512
1252b5747fbaa28c7b9dfe2e8a237c4737ababd5c4a0f36818e47a222b9aad9ad0a62bb96869f9de22cff6b44901130361fc66421ede8059258972d13cf29724
-
SSDEEP
6144:179fwBzJ9IT+jHRwWsc3EEqkv2OOqsJMBmPd:1Bw9J0+j6WRA0VOqsUsd
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat iowasystem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9647807efd2fbdecfc3c164587fa401_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9647807efd2fbdecfc3c164587fa401_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iowasystem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iowasystem.exe -
Modifies data under HKEY_USERS 19 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E9142D03-0038-4CDA-B336-80AD49D20057}\WpadDecisionReason = "1" iowasystem.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E9142D03-0038-4CDA-B336-80AD49D20057}\WpadDecisionTime = 80218a8eec03db01 iowasystem.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-70-35-03-fb-6c\WpadDecision = "0" iowasystem.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections iowasystem.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" iowasystem.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 iowasystem.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad iowasystem.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings iowasystem.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-70-35-03-fb-6c\WpadDetectedUrl iowasystem.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings iowasystem.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E9142D03-0038-4CDA-B336-80AD49D20057} iowasystem.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-70-35-03-fb-6c iowasystem.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E9142D03-0038-4CDA-B336-80AD49D20057}\46-70-35-03-fb-6c iowasystem.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-70-35-03-fb-6c\WpadDecisionReason = "1" iowasystem.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-70-35-03-fb-6c\WpadDecisionTime = 80218a8eec03db01 iowasystem.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 iowasystem.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f012e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 iowasystem.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E9142D03-0038-4CDA-B336-80AD49D20057}\WpadDecision = "0" iowasystem.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E9142D03-0038-4CDA-B336-80AD49D20057}\WpadNetworkName = "Network 3" iowasystem.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2540 d9647807efd2fbdecfc3c164587fa401_JaffaCakes118.exe 1644 d9647807efd2fbdecfc3c164587fa401_JaffaCakes118.exe 2820 iowasystem.exe 2880 iowasystem.exe 2880 iowasystem.exe 2880 iowasystem.exe 2880 iowasystem.exe 2880 iowasystem.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1644 d9647807efd2fbdecfc3c164587fa401_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1644 2540 d9647807efd2fbdecfc3c164587fa401_JaffaCakes118.exe 29 PID 2540 wrote to memory of 1644 2540 d9647807efd2fbdecfc3c164587fa401_JaffaCakes118.exe 29 PID 2540 wrote to memory of 1644 2540 d9647807efd2fbdecfc3c164587fa401_JaffaCakes118.exe 29 PID 2540 wrote to memory of 1644 2540 d9647807efd2fbdecfc3c164587fa401_JaffaCakes118.exe 29 PID 2820 wrote to memory of 2880 2820 iowasystem.exe 31 PID 2820 wrote to memory of 2880 2820 iowasystem.exe 31 PID 2820 wrote to memory of 2880 2820 iowasystem.exe 31 PID 2820 wrote to memory of 2880 2820 iowasystem.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9647807efd2fbdecfc3c164587fa401_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d9647807efd2fbdecfc3c164587fa401_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\d9647807efd2fbdecfc3c164587fa401_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d9647807efd2fbdecfc3c164587fa401_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1644
-
-
C:\Windows\SysWOW64\iowasystem.exe"C:\Windows\SysWOW64\iowasystem.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\iowasystem.exe"C:\Windows\SysWOW64\iowasystem.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2880
-