Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 17:38
Static task
static1
Behavioral task
behavioral1
Sample
e3095c7f50ad6559e8aa569390c1fa94_JaffaCakes118.ps1
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e3095c7f50ad6559e8aa569390c1fa94_JaffaCakes118.ps1
Resource
win10v2004-20240802-en
General
-
Target
e3095c7f50ad6559e8aa569390c1fa94_JaffaCakes118.ps1
-
Size
420KB
-
MD5
e3095c7f50ad6559e8aa569390c1fa94
-
SHA1
e79ac8e78b26dee69a424325932e33cbe41c779e
-
SHA256
30fbbb57213f860b61302762e7a6febcd16b1ce982c57be120fc92436f40eda2
-
SHA512
fcde747c26d38e196647ce2f74649459ea2c911e1fa1d9c164b5b941bf683cb90b1b9a68d9611db355fa79cc5d3b130e235dc17033271177a775d1f8d4600362
-
SSDEEP
12288:JZUvtaGX86HF/vpF8MdvXV2fm9r3EAVF57ZV13:Jlidl/vAcAe13EAZZ/3
Malware Config
Extracted
formbook
3.9
pm
pinkdolphingame.com
littlecarprice.com
zhangjinkai.com
daveycoin.com
brcomatualizacaobb.com
greenworldarg.com
constructorarabguar.com
0pe140.com
onevanillavariety.com
thedispensaryuk.com
missmomth.com
thealpha.biz
jjapanese.com
infinihybrid.com
bydcosmetics.com
jvboisoj.win
smartarchiving.com
kremesomorfias.com
akku2life.com
llbag.win
szfyfjzgc.com
missyrussellblog.com
buzzvevo.com
hammondres.net
vipipe.net
zchzchina.com
colleyexecutiveconsulting.com
coincashexchange.com
cc1346.com
aghcs.services
sdwunuo.com
news3049.reisen
gsgdev.com
iris2skin.com
antalyadogumakademisi.com
teachmeneurology.com
wannaseeyou.com
wwwyh8822.com
288c9.com
jadenailandhairsalon.com
hiteshgupta.info
thingsinberlin.com
appkeysrestore.com
popomama01.com
rocket.soccer
giurgiu.news
momosanramenwynwood.com
hainanmyjykj.com
petitnenchic.com
ikixusallc.com
ebmeu.com
jincailiangzi.com
cx-stocks.com
globalpacificcharity.com
zhifangshequ.com
antoniogatzfilms.com
quanqiugangs.com
nestbuildersconstruction.com
evoolamp.com
thehulses.com
lhtwbg.info
energofrios.com
kobatori.biz
worldterpenes.com
pursemtb.com
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/6440-10051-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/6440-10053-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cmmon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ND9L_RCX6V5 = "C:\\Program Files (x86)\\Vtx4\\serviceskppxfv-.exe" cmmon32.exe -
Executes dropped EXE 1 IoCs
pid Process 5036 idw.exe -
Loads dropped DLL 2 IoCs
pid Process 5036 idw.exe 5036 idw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 6440 set thread context of 3432 6440 cmd.exe 56 PID 6996 set thread context of 3432 6996 cmmon32.exe 56 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Vtx4\serviceskppxfv-.exe cmmon32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\win.ini idw.exe -
pid Process 1896 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language idw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmmon32.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 1896 powershell.exe 1896 powershell.exe 5036 idw.exe 6440 cmd.exe 6440 cmd.exe 6440 cmd.exe 6440 cmd.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe 6996 cmmon32.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 5036 idw.exe 6440 cmd.exe 6440 cmd.exe 6440 cmd.exe 6996 cmmon32.exe 6996 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1896 powershell.exe Token: SeDebugPrivilege 6440 cmd.exe Token: SeDebugPrivilege 6996 cmmon32.exe Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1896 wrote to memory of 5036 1896 powershell.exe 87 PID 1896 wrote to memory of 5036 1896 powershell.exe 87 PID 1896 wrote to memory of 5036 1896 powershell.exe 87 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88 PID 5036 wrote to memory of 6440 5036 idw.exe 88
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3432 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\e3095c7f50ad6559e8aa569390c1fa94_JaffaCakes118.ps12⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Public\idw.exe"C:\Users\Public\idw.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:6440
-
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:6996 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\cmd.exe"3⤵
- System Location Discovery: System Language Discovery
PID:8168
-
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵
- System Location Discovery: System Language Discovery
PID:7548
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
10KB
MD5926e963b53e59a9bb30483c470f52d3a
SHA151bd24b9f5a6cc15cfa29d9e39c088fb370e7f6a
SHA25695295695b542e26c667f6c37958439448a8ba311e63d3cf9fb07e428dc77560f
SHA51243d3176f0c1fc90362fa964077eee3c4510d940cb1aaa30720ec0186d2247cb8824d4a73134026d3bf2427a02a4562eccdd9f2db074fe6723e18995f4393f9e2
-
Filesize
81KB
MD50bd098a2745c912ca32e37827c10c885
SHA164fea9b617f982a8d66477d577efd36828e0cede
SHA256be9b6a01180bb1e5d347542300aad36162ed589bc44674791edfd29bd4a73a2a
SHA5125bb9a2e70849f9342285ae9a137209ccdabb4fe4ece10b2b539b33876fafc53e7e1a218e5238ad26fec31d770051de8062074fa905b4316093385e8ef9052acf
-
Filesize
38B
MD54aadf49fed30e4c9b3fe4a3dd6445ebe
SHA11e332822167c6f351b99615eada2c30a538ff037
SHA25675034beb7bded9aeab5748f4592b9e1419256caec474065d43e531ec5cc21c56
SHA512eb5b3908d5e7b43ba02165e092f05578f45f15a148b4c3769036aa542c23a0f7cd2bc2770cf4119a7e437de3f681d9e398511f69f66824c516d9b451bb95f945
-
Filesize
40B
MD5d63a82e5d81e02e399090af26db0b9cb
SHA191d0014c8f54743bba141fd60c9d963f869d76c9
SHA256eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae
SHA51238afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad
-
Filesize
872B
MD5bbc41c78bae6c71e63cb544a6a284d94
SHA133f2c1d9fa0e9c99b80bc2500621e95af38b1f9a
SHA256ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb
SHA5120aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4
-
Filesize
299KB
MD52a561db2bbc97c16b70d2bba0b7519ce
SHA134f116f1fe59fba53d3a1974b4cb8d2abe525cbf
SHA2566bb2dcc633b72774e13fa0f0fbc938eebf4726e46d4eb7676d8ee3990878ffb6
SHA512b93677c5e2960c1e801cdb269fbf4f6ea3b3f1801c969b096c7372ddd23a65b97dcf5628af1f99c2912d71cb13f0038fc827fb523f2a075e0c1d4669bc1c7142
-
Filesize
131B
MD59848e4efb0abd437d65e6d3d1d973adb
SHA1f427ac7c50b19f66658ae7f92cbaf21110b49a47
SHA256c8b84add37da849977a84fe62badb6cb908be99769edb70d60bcd04c0aec2a3f
SHA512f90f1f65b6b824a526469b8d739f733a54a7f485d8b5f680de7a35fac90786bf6ba5a0b1d62e139663c5ee73b8d687cf32d4ccf188e18c53084ec12d8c216b17