Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 03:10
Static task
static1
Behavioral task
behavioral1
Sample
e19705d0b64ed001d092b970ed319c9f_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e19705d0b64ed001d092b970ed319c9f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e19705d0b64ed001d092b970ed319c9f_JaffaCakes118.exe
-
Size
564KB
-
MD5
e19705d0b64ed001d092b970ed319c9f
-
SHA1
cf2c4f11aa25e7c970305b1847a62111dbd1e6ab
-
SHA256
aae846b1503b0bee24894cf56b07b63517d9b9b294d0361ee3e8712964bd7d43
-
SHA512
fbdf15eda4140342c5c7e6ceef0d361d0ff08c00cfbdc2a04c8fce03309ba2fdd99562a96670a0c3d81fb90581cddde116540a43c0963f0de135bcda16d061b2
-
SSDEEP
12288:qfH2pohMic8HSrKD7yyTwhVC0Ov9nGTYWxr:MWWNFHSa750e1GT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2692 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1880 winpaty.ra -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat winpaty.ra -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\winpaty.ra e19705d0b64ed001d092b970ed319c9f_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\winpaty.ra e19705d0b64ed001d092b970ed319c9f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e19705d0b64ed001d092b970ed319c9f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winpaty.ra -
Modifies data under HKEY_USERS 14 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{AB5C5600-7E6E-4B06-9197-9ECEF74D31CC} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 0100000000000000407921de1c07db01 winpaty.ra Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections winpaty.ra Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings winpaty.ra Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" winpaty.ra Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 winpaty.ra Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached winpaty.ra Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{D9144DCD-E998-4ECA-AB6A-DCD83CCBA16D} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 0100000000000000407921de1c07db01 winpaty.ra Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{2916C86E-86A6-43FE-8112-43ABE6BF8DCC} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 0100000000000000a0da23de1c07db01 winpaty.ra Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 winpaty.ra Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{920E6DB1-9907-4370-B3A0-BAFC03D81399} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 0100000000000000a0da23de1c07db01 winpaty.ra Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{99FD978C-D287-4F50-827F-B2C658EDA8E7} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 0100000000000000407921de1c07db01 winpaty.ra Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{16F3DD56-1AF5-4347-846D-7C10C4192619} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 0100000000000000a0da23de1c07db01 winpaty.ra Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{08244EE6-92F0-47F2-9FC9-929BAA2E7235} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 0100000000000000a0da23de1c07db01 winpaty.ra Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings winpaty.ra -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1880 winpaty.ra -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1880 wrote to memory of 2748 1880 winpaty.ra 32 PID 1880 wrote to memory of 2748 1880 winpaty.ra 32 PID 1880 wrote to memory of 2748 1880 winpaty.ra 32 PID 1880 wrote to memory of 2748 1880 winpaty.ra 32 PID 2732 wrote to memory of 2692 2732 e19705d0b64ed001d092b970ed319c9f_JaffaCakes118.exe 33 PID 2732 wrote to memory of 2692 2732 e19705d0b64ed001d092b970ed319c9f_JaffaCakes118.exe 33 PID 2732 wrote to memory of 2692 2732 e19705d0b64ed001d092b970ed319c9f_JaffaCakes118.exe 33 PID 2732 wrote to memory of 2692 2732 e19705d0b64ed001d092b970ed319c9f_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e19705d0b64ed001d092b970ed319c9f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e19705d0b64ed001d092b970ed319c9f_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\866.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Program Files\Common Files\winpaty.ra"C:\Program Files\Common Files\winpaty.ra"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" 12⤵PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
564KB
MD5e19705d0b64ed001d092b970ed319c9f
SHA1cf2c4f11aa25e7c970305b1847a62111dbd1e6ab
SHA256aae846b1503b0bee24894cf56b07b63517d9b9b294d0361ee3e8712964bd7d43
SHA512fbdf15eda4140342c5c7e6ceef0d361d0ff08c00cfbdc2a04c8fce03309ba2fdd99562a96670a0c3d81fb90581cddde116540a43c0963f0de135bcda16d061b2
-
Filesize
226B
MD5d903a2efd4b8a946413c3cceec11c409
SHA10bd75ed7f9f172a6205f19d803dfe5323f8503f7
SHA256cded5d3f564713b8520870aa0dc019e7461cd64981d4610789756b71f0565af8
SHA512edab40845191eff036d14f955d01581f45124f03a09c8dd762876ddb8b0ece73d297a253e8d20284e708e8dee8b8d6e75e9ea722c65e8162e94dd2c7c403c97d