Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 06:59
Static task
static1
Behavioral task
behavioral1
Sample
e1f0394e7a92e7a6882874c87fa10821_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1f0394e7a92e7a6882874c87fa10821_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1f0394e7a92e7a6882874c87fa10821_JaffaCakes118.exe
-
Size
497KB
-
MD5
e1f0394e7a92e7a6882874c87fa10821
-
SHA1
e14df8aa6899ada28756d88976fb1e485fbfaad6
-
SHA256
57adf57219631876c6264c2f2dcd18f83537b80525bed3217db28c9e56613acf
-
SHA512
af5d3a4c7117f74c541493e03c2f10a81ab13606e91df8bab8b2a0f8a30b2fb99680d6a0592d0bc551ab0c7c62544240875126258276f179a6870ec7838ba156
-
SSDEEP
12288:31Ra1rN4wopVauKAxZkhwryPNtTirdorX:3Drp4XAx+hwrynTEdo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2832 EntSver.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 e1f0394e7a92e7a6882874c87fa10821_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 EntSver.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat EntSver.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\EntSver.exe e1f0394e7a92e7a6882874c87fa10821_JaffaCakes118.exe File opened for modification C:\Windows\EntSver.exe e1f0394e7a92e7a6882874c87fa10821_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1f0394e7a92e7a6882874c87fa10821_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EntSver.exe -
Modifies data under HKEY_USERS 28 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings EntSver.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{924193F2-E9D8-41B8-A8B8-95BD0A990CE1}\WpadDecisionReason = "1" EntSver.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix EntSver.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad EntSver.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" EntSver.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{924193F2-E9D8-41B8-A8B8-95BD0A990CE1}\WpadDecision = "0" EntSver.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00a1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 EntSver.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\6e-ce-24-8a-49-7e\WpadDecisionTime = a09315043d07db01 EntSver.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{924193F2-E9D8-41B8-A8B8-95BD0A990CE1}\6e-ce-24-8a-49-7e EntSver.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" EntSver.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings EntSver.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ EntSver.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{924193F2-E9D8-41B8-A8B8-95BD0A990CE1}\WpadNetworkName = "Network 3" EntSver.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 EntSver.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" EntSver.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{924193F2-E9D8-41B8-A8B8-95BD0A990CE1}\WpadDecisionTime = a09315043d07db01 EntSver.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\6e-ce-24-8a-49-7e\WpadDetectedUrl EntSver.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00a1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 EntSver.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 EntSver.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\6e-ce-24-8a-49-7e\WpadDecisionReason = "1" EntSver.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\6e-ce-24-8a-49-7e\WpadDecision = "0" EntSver.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections EntSver.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" EntSver.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\6e-ce-24-8a-49-7e\WpadDecisionTime = 201e7dce3c07db01 EntSver.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" EntSver.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{924193F2-E9D8-41B8-A8B8-95BD0A990CE1} EntSver.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{924193F2-E9D8-41B8-A8B8-95BD0A990CE1}\WpadDecisionTime = 201e7dce3c07db01 EntSver.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\6e-ce-24-8a-49-7e EntSver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2644 e1f0394e7a92e7a6882874c87fa10821_JaffaCakes118.exe Token: SeDebugPrivilege 2832 EntSver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2832 EntSver.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2184 2832 EntSver.exe 31 PID 2832 wrote to memory of 2184 2832 EntSver.exe 31 PID 2832 wrote to memory of 2184 2832 EntSver.exe 31 PID 2832 wrote to memory of 2184 2832 EntSver.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1f0394e7a92e7a6882874c87fa10821_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1f0394e7a92e7a6882874c87fa10821_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
C:\Windows\EntSver.exeC:\Windows\EntSver.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
497KB
MD5e1f0394e7a92e7a6882874c87fa10821
SHA1e14df8aa6899ada28756d88976fb1e485fbfaad6
SHA25657adf57219631876c6264c2f2dcd18f83537b80525bed3217db28c9e56613acf
SHA512af5d3a4c7117f74c541493e03c2f10a81ab13606e91df8bab8b2a0f8a30b2fb99680d6a0592d0bc551ab0c7c62544240875126258276f179a6870ec7838ba156