Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 17:38
Static task
static1
Behavioral task
behavioral1
Sample
e3095c7f50ad6559e8aa569390c1fa94_JaffaCakes118.ps1
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e3095c7f50ad6559e8aa569390c1fa94_JaffaCakes118.ps1
Resource
win10v2004-20240802-en
General
-
Target
e3095c7f50ad6559e8aa569390c1fa94_JaffaCakes118.ps1
-
Size
420KB
-
MD5
e3095c7f50ad6559e8aa569390c1fa94
-
SHA1
e79ac8e78b26dee69a424325932e33cbe41c779e
-
SHA256
30fbbb57213f860b61302762e7a6febcd16b1ce982c57be120fc92436f40eda2
-
SHA512
fcde747c26d38e196647ce2f74649459ea2c911e1fa1d9c164b5b941bf683cb90b1b9a68d9611db355fa79cc5d3b130e235dc17033271177a775d1f8d4600362
-
SSDEEP
12288:JZUvtaGX86HF/vpF8MdvXV2fm9r3EAVF57ZV13:Jlidl/vAcAe13EAZZ/3
Malware Config
Extracted
formbook
3.9
pm
pinkdolphingame.com
littlecarprice.com
zhangjinkai.com
daveycoin.com
brcomatualizacaobb.com
greenworldarg.com
constructorarabguar.com
0pe140.com
onevanillavariety.com
thedispensaryuk.com
missmomth.com
thealpha.biz
jjapanese.com
infinihybrid.com
bydcosmetics.com
jvboisoj.win
smartarchiving.com
kremesomorfias.com
akku2life.com
llbag.win
szfyfjzgc.com
missyrussellblog.com
buzzvevo.com
hammondres.net
vipipe.net
zchzchina.com
colleyexecutiveconsulting.com
coincashexchange.com
cc1346.com
aghcs.services
sdwunuo.com
news3049.reisen
gsgdev.com
iris2skin.com
antalyadogumakademisi.com
teachmeneurology.com
wannaseeyou.com
wwwyh8822.com
288c9.com
jadenailandhairsalon.com
hiteshgupta.info
thingsinberlin.com
appkeysrestore.com
popomama01.com
rocket.soccer
giurgiu.news
momosanramenwynwood.com
hainanmyjykj.com
petitnenchic.com
ikixusallc.com
ebmeu.com
jincailiangzi.com
cx-stocks.com
globalpacificcharity.com
zhifangshequ.com
antoniogatzfilms.com
quanqiugangs.com
nestbuildersconstruction.com
evoolamp.com
thehulses.com
lhtwbg.info
energofrios.com
kobatori.biz
worldterpenes.com
pursemtb.com
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/1768-10049-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/1768-10052-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Executes dropped EXE 1 IoCs
pid Process 2564 zvbh.exe -
Loads dropped DLL 2 IoCs
pid Process 2564 zvbh.exe 2564 zvbh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NBG4BPMXCNY = "C:\\Program Files (x86)\\Ajtmt9\\systray-zs.exe" colorcpl.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1768 set thread context of 1232 1768 cmd.exe 21 PID 2232 set thread context of 1232 2232 colorcpl.exe 21 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Ajtmt9\systray-zs.exe colorcpl.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\win.ini zvbh.exe -
pid Process 2668 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zvbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \Registry\User\S-1-5-21-1506706701-1246725540-2219210854-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 colorcpl.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2668 powershell.exe 2564 zvbh.exe 1768 cmd.exe 1768 cmd.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe 2232 colorcpl.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2564 zvbh.exe 1768 cmd.exe 1768 cmd.exe 1768 cmd.exe 2232 colorcpl.exe 2232 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2668 powershell.exe Token: SeDebugPrivilege 1768 cmd.exe Token: SeDebugPrivilege 2232 colorcpl.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1232 Explorer.EXE 1232 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1232 Explorer.EXE 1232 Explorer.EXE -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2564 2668 powershell.exe 32 PID 2668 wrote to memory of 2564 2668 powershell.exe 32 PID 2668 wrote to memory of 2564 2668 powershell.exe 32 PID 2668 wrote to memory of 2564 2668 powershell.exe 32 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 2564 wrote to memory of 1768 2564 zvbh.exe 33 PID 1232 wrote to memory of 2232 1232 Explorer.EXE 34 PID 1232 wrote to memory of 2232 1232 Explorer.EXE 34 PID 1232 wrote to memory of 2232 1232 Explorer.EXE 34 PID 1232 wrote to memory of 2232 1232 Explorer.EXE 34 PID 2232 wrote to memory of 2340 2232 colorcpl.exe 35 PID 2232 wrote to memory of 2340 2232 colorcpl.exe 35 PID 2232 wrote to memory of 2340 2232 colorcpl.exe 35 PID 2232 wrote to memory of 2340 2232 colorcpl.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\e3095c7f50ad6559e8aa569390c1fa94_JaffaCakes118.ps12⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Public\zvbh.exe"C:\Users\Public\zvbh.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\cmd.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5fa9626f61b86aa02cccf64bb086eef40
SHA191e663cd185a52fda340c88d85fd807c69b54f01
SHA256d5facf56cfa1914c29e5a03af901b7df1f43882ed7c50d0488182e2db72b97a1
SHA51220ce1e4fb61fd6814dff4bb298e8c80d63ed484425aa8a318df260920919d17daa30b6fb3933efd4348352f0b15a95160aabc20226d4f6fb2a05e0a5989571ca
-
Filesize
40B
MD5d63a82e5d81e02e399090af26db0b9cb
SHA191d0014c8f54743bba141fd60c9d963f869d76c9
SHA256eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae
SHA51238afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad
-
Filesize
40B
MD5ba3b6bc807d4f76794c4b81b09bb9ba5
SHA124cb89501f0212ff3095ecc0aba97dd563718fb1
SHA2566eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507
SHA512ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf
-
Filesize
299KB
MD52a561db2bbc97c16b70d2bba0b7519ce
SHA134f116f1fe59fba53d3a1974b4cb8d2abe525cbf
SHA2566bb2dcc633b72774e13fa0f0fbc938eebf4726e46d4eb7676d8ee3990878ffb6
SHA512b93677c5e2960c1e801cdb269fbf4f6ea3b3f1801c969b096c7372ddd23a65b97dcf5628af1f99c2912d71cb13f0038fc827fb523f2a075e0c1d4669bc1c7142
-
Filesize
517B
MD5893cae59ab5945a94a7da007d47a1255
SHA1d4cfd81c6647ca64022bd307c08a7fb4bbbd4c06
SHA256edfa0f2d3bea9f737e0315971c6f81d3d8e7d460b60a19351ada0316a093c938
SHA512d66e454781f54f45df814ad32d687b0f100578c2a4ffca62de81add04281fb881a550702bd2d058933d3736d14e88624af268a86ce24b0c3935242b206ffdcc9
-
Filesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
Filesize
10KB
MD5926e963b53e59a9bb30483c470f52d3a
SHA151bd24b9f5a6cc15cfa29d9e39c088fb370e7f6a
SHA25695295695b542e26c667f6c37958439448a8ba311e63d3cf9fb07e428dc77560f
SHA51243d3176f0c1fc90362fa964077eee3c4510d940cb1aaa30720ec0186d2247cb8824d4a73134026d3bf2427a02a4562eccdd9f2db074fe6723e18995f4393f9e2