Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe
-
Size
68KB
-
MD5
e1f0a2e1c617969716c5c109b63058f4
-
SHA1
367da8f104e0ae6a2618c1bbb5936ce9b762730e
-
SHA256
c7fd39ff2b936104766c64c0b0b5c1d233b8630b0df757007a3e74f5b11344f0
-
SHA512
18d74f50f8bfda50b4d9bc936a03eaab69aacb6123697dfefe3401eeb915fb3bd75d7cc4cb095ce0fa155d67d550eba3af73e297fbac1b70ce6d343546b00a8b
-
SSDEEP
1536:uKupvclwH04kTEwAzAHPOo0mN1s0EakBQ:4iwRkTElAH2oLs0RkO
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2648 syshost.exe 2916 winini.exe 2680 audiohd2.exe 2492 WUDHost2.exe -
Loads dropped DLL 8 IoCs
pid Process 2380 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 2380 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 2648 syshost.exe 2648 syshost.exe 2916 winini.exe 2916 winini.exe 2916 winini.exe 2916 winini.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Users\\Admin\\AppData\\Local\\Temp\\syshost.exe" syshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows HD Audio Driver = "\"C:\\Windows\\system32\\audiohd2.exe\"" winini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows HD Audio Driver = "\"C:\\Windows\\system32\\audiohd2.exe\"" audiohd2.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\audiohd2.exe winini.exe File opened for modification C:\Windows\SysWOW64\audiohd2.exe winini.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\WUDHost2.exe winini.exe File opened for modification C:\Program Files (x86)\Common Files\WUDHost2.exe winini.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\syshost.exe:ZONE.identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syshost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winini.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language audiohd2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WUDHost2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 audiohd2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier audiohd2.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 WUDHost2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WUDHost2.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 winini.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier winini.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\syshost.exe:ZONE.identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2916 winini.exe 2916 winini.exe 2916 winini.exe 2916 winini.exe 2916 winini.exe 2916 winini.exe 2916 winini.exe 2916 winini.exe 2680 audiohd2.exe 2680 audiohd2.exe 2680 audiohd2.exe 2680 audiohd2.exe 2680 audiohd2.exe 2680 audiohd2.exe 2680 audiohd2.exe 2680 audiohd2.exe 2492 WUDHost2.exe 2492 WUDHost2.exe 2492 WUDHost2.exe 2492 WUDHost2.exe 2492 WUDHost2.exe 2492 WUDHost2.exe 2492 WUDHost2.exe 2492 WUDHost2.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2916 winini.exe Token: SeDebugPrivilege 2680 audiohd2.exe Token: SeDebugPrivilege 2492 WUDHost2.exe Token: 33 2680 audiohd2.exe Token: SeIncBasePriorityPrivilege 2680 audiohd2.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2152 2380 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 29 PID 2380 wrote to memory of 2152 2380 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 29 PID 2380 wrote to memory of 2152 2380 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 29 PID 2380 wrote to memory of 2152 2380 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 29 PID 2152 wrote to memory of 2732 2152 vbc.exe 31 PID 2152 wrote to memory of 2732 2152 vbc.exe 31 PID 2152 wrote to memory of 2732 2152 vbc.exe 31 PID 2152 wrote to memory of 2732 2152 vbc.exe 31 PID 2380 wrote to memory of 2768 2380 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 32 PID 2380 wrote to memory of 2768 2380 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 32 PID 2380 wrote to memory of 2768 2380 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 32 PID 2380 wrote to memory of 2768 2380 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 32 PID 2380 wrote to memory of 2648 2380 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 34 PID 2380 wrote to memory of 2648 2380 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 34 PID 2380 wrote to memory of 2648 2380 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 34 PID 2380 wrote to memory of 2648 2380 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 34 PID 2648 wrote to memory of 2916 2648 syshost.exe 35 PID 2648 wrote to memory of 2916 2648 syshost.exe 35 PID 2648 wrote to memory of 2916 2648 syshost.exe 35 PID 2648 wrote to memory of 2916 2648 syshost.exe 35 PID 2916 wrote to memory of 2680 2916 winini.exe 37 PID 2916 wrote to memory of 2680 2916 winini.exe 37 PID 2916 wrote to memory of 2680 2916 winini.exe 37 PID 2916 wrote to memory of 2680 2916 winini.exe 37 PID 2916 wrote to memory of 2492 2916 winini.exe 38 PID 2916 wrote to memory of 2492 2916 winini.exe 38 PID 2916 wrote to memory of 2492 2916 winini.exe 38 PID 2916 wrote to memory of 2492 2916 winini.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\s2yarijn.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESED4D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcED4C.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\syshost.exe"C:\Users\Admin\AppData\Local\Temp\syshost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\winini.exeC:\Users\Admin\AppData\Local\Temp\winini.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\audiohd2.exe"C:\Windows\system32\audiohd2.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Program Files (x86)\Common Files\WUDHost2.exe"C:\Program Files (x86)\Common Files\WUDHost2.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Scripting
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2
-
Filesize
1KB
MD5b830338c0e22b7b9d04fe74516fc9781
SHA198cfa5e65886e648cfd78a57d654b799c619ec96
SHA256db799efb9181f25aea22a017c954a1baa3218e17ee08594e029433e8b41e49aa
SHA512caade9398c0244d2ce59b6e6ed3e15ca57908a9f112b456141b760246bcc8e6a14ecb504e30e798c0200097d4984e723775084e5a0e4dac4414f3b84ad51c7f2
-
Filesize
408B
MD50fee7582e34d629e6ad570a2505310c3
SHA185287dd32fce2dddacde7c36d9f71c7494efef57
SHA25650a2fbd617437a9d84e0af61912a1eae1356f0764fee512bd1dd3ec18a27f33d
SHA51222eb48eee3a5d82cbb595a28b187f221e44de44b40482939ab339e6c49cad51f5fd4af5e7ea429d15e7b9ec2039819bff73df180ec56e1c563f0a1ac6927e155
-
Filesize
282B
MD5a951566485a02c486e12d2c6011423f8
SHA1547fa619bb7415b5dbe9bdb9a36ce9eeb15247ea
SHA25669902de39424e478072830713e8b69a55a1c2edac716d107fe0d6368b9b02379
SHA5129df3051d64a73034a7d6d4151ea745ae1a8c3ae839dcff1046e3c035967d7193b231e54972e9921a394e8bf4c51b315de136c1a7985750a12abcdbb8e9513b97
-
Filesize
6KB
MD58a6677ffe04a1fbdc1826db9afad300c
SHA103a8f3d5b124a35ba0e80548d03d8615bc7195d6
SHA25634e41fca168fc79ac95d9e6fe837f0498baa46a1b866386010ae0a6dfb116daa
SHA512e503bf82f713557c357ac75c474a6fa052ba884a71f84c8dda18999adb37df50e5d2d624ebcf740f06156dbc504768967693f9a5695fadd777c3f8d031c10dd7
-
Filesize
27B
MD5130a75a932a2fe57bfea6a65b88da8f6
SHA1b66d7530d150d45c0a390bb3c2cd4ca4fc404d1c
SHA256f2b79cae559d6772afc1c2ed9468988178f8b6833d5028a15dea73ce47d0196e
SHA5126cd147c6f3af95803b7b0898e97ec2ed374c1f56a487b50e3d22003a67cec26a6fa12a3920b1b5624bde156f9601469ae3c7b7354fa8cf37be76c84121767eed
-
Filesize
644B
MD54f8bcd6bbee4ce68c276a906343677a9
SHA17e9ba9d96ee307ab231a25e8bd2544ecbbf0715b
SHA2560b967aac9c131c4b91153a427ba445474b3947619c4ec2783d81db3fed646e65
SHA5126688d05e38ef58c3e14fbb332464de42a75f618ee4cefe30a0e0c3cbbf6077390a3846254645b5edacaac1b6560d57e151b60680f162b4a7f7faa4fdc792ab9b
-
Filesize
68KB
MD5e1f0a2e1c617969716c5c109b63058f4
SHA1367da8f104e0ae6a2618c1bbb5936ce9b762730e
SHA256c7fd39ff2b936104766c64c0b0b5c1d233b8630b0df757007a3e74f5b11344f0
SHA51218d74f50f8bfda50b4d9bc936a03eaab69aacb6123697dfefe3401eeb915fb3bd75d7cc4cb095ce0fa155d67d550eba3af73e297fbac1b70ce6d343546b00a8b