Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 15:27
Static task
static1
Behavioral task
behavioral1
Sample
daa6da3107d7cd06c10c71b368023eae_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
daa6da3107d7cd06c10c71b368023eae_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
daa6da3107d7cd06c10c71b368023eae_JaffaCakes118.exe
-
Size
115KB
-
MD5
daa6da3107d7cd06c10c71b368023eae
-
SHA1
2b579e2c43a85410b4b1191e649520ce7b164240
-
SHA256
febfb5b43a0d8319507ae58284664756f36741e6ff82052a083c39d0f1740d01
-
SHA512
0387a7d82cbadff1189f7215533161b601c59d3290c323264690a394897d9ff55c507d66caa9924e3f1b3dac06e6ced5589719c6592a481baf76e62174a02d9d
-
SSDEEP
3072:muLr2tEZ8XgQzxZlPI3r9XR5769JZ78hJa1:mYeNzBq4ara1
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2888 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2736 msserv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\msserv = "C:\\Windows\\msserv.exe" daa6da3107d7cd06c10c71b368023eae_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\7-Zip\ msserv.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\msserv.exe daa6da3107d7cd06c10c71b368023eae_JaffaCakes118.exe File opened for modification C:\Windows\msserv.exe daa6da3107d7cd06c10c71b368023eae_JaffaCakes118.exe File created C:\Windows\msserv.config msserv.exe File opened for modification C:\Windows\msserv.config msserv.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daa6da3107d7cd06c10c71b368023eae_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w32tm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w32tm.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2736 2444 daa6da3107d7cd06c10c71b368023eae_JaffaCakes118.exe 30 PID 2444 wrote to memory of 2736 2444 daa6da3107d7cd06c10c71b368023eae_JaffaCakes118.exe 30 PID 2444 wrote to memory of 2736 2444 daa6da3107d7cd06c10c71b368023eae_JaffaCakes118.exe 30 PID 2444 wrote to memory of 2736 2444 daa6da3107d7cd06c10c71b368023eae_JaffaCakes118.exe 30 PID 2736 wrote to memory of 2888 2736 msserv.exe 31 PID 2736 wrote to memory of 2888 2736 msserv.exe 31 PID 2736 wrote to memory of 2888 2736 msserv.exe 31 PID 2736 wrote to memory of 2888 2736 msserv.exe 31 PID 2736 wrote to memory of 2868 2736 msserv.exe 32 PID 2736 wrote to memory of 2868 2736 msserv.exe 32 PID 2736 wrote to memory of 2868 2736 msserv.exe 32 PID 2736 wrote to memory of 2868 2736 msserv.exe 32 PID 2736 wrote to memory of 2884 2736 msserv.exe 33 PID 2736 wrote to memory of 2884 2736 msserv.exe 33 PID 2736 wrote to memory of 2884 2736 msserv.exe 33 PID 2736 wrote to memory of 2884 2736 msserv.exe 33 PID 2868 wrote to memory of 2596 2868 w32tm.exe 37 PID 2868 wrote to memory of 2596 2868 w32tm.exe 37 PID 2868 wrote to memory of 2596 2868 w32tm.exe 37 PID 2868 wrote to memory of 2596 2868 w32tm.exe 37 PID 2884 wrote to memory of 2132 2884 w32tm.exe 38 PID 2884 wrote to memory of 2132 2884 w32tm.exe 38 PID 2884 wrote to memory of 2132 2884 w32tm.exe 38 PID 2884 wrote to memory of 2132 2884 w32tm.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\daa6da3107d7cd06c10c71b368023eae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\daa6da3107d7cd06c10c71b368023eae_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\msserv.exe"C:\Windows\msserv.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set allowedprogram "C:\Windows\msserv.exe" enable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2888
-
-
C:\Windows\SysWOW64\w32tm.exew32tm /config /syncfromflags:manual /manualpeerlist:time.windows.com,time.nist.gov3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\system32\w32tm.exew32tm /config /syncfromflags:manual /manualpeerlist:time.windows.com,time.nist.gov4⤵PID:2596
-
-
-
C:\Windows\SysWOW64\w32tm.exew32tm /config /update3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\system32\w32tm.exew32tm /config /update4⤵PID:2132
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5195bea0a796b19d75a14f86fd6f40d2a
SHA1f26b782426cb09b4f16bda8bab1224faae227c3f
SHA25679609a9f89580c44ed95ec2e17dbb592cfc2cdda3ead5d2c81fc49977d055898
SHA512663bbab1db4be2986a8d8e1da692c87c41ab63fe6c0301757f5568534e9c687fbf6ea768ee609ca4b85ac1b089da5829a0c2d8cd3e8d8cc30c4e19b914090b0b
-
Filesize
47KB
MD593e5631435a59e727a3eccc107ce5eb7
SHA15e1eec15e917081a028f160665cb84c104731aea
SHA256dfc24acbdfac801b53514535bd72258130ac6acff9cfaf73a8027434cc9bd7f8
SHA512c9f020d615681c4d0a6862af4c2265ae9cf67c8de89942adbff3a796134c2a6571c23f777cd35a65cdf3438292a332ade930ae6b3452a11868277fec08c1bebd
-
Filesize
115KB
MD5daa6da3107d7cd06c10c71b368023eae
SHA12b579e2c43a85410b4b1191e649520ce7b164240
SHA256febfb5b43a0d8319507ae58284664756f36741e6ff82052a083c39d0f1740d01
SHA5120387a7d82cbadff1189f7215533161b601c59d3290c323264690a394897d9ff55c507d66caa9924e3f1b3dac06e6ced5589719c6592a481baf76e62174a02d9d