Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/09/2024, 23:36
Static task
static1
Behavioral task
behavioral1
Sample
e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe
-
Size
374KB
-
MD5
e5c45e21ebef55ec19c35c50c4703265
-
SHA1
a973875a2485c4c04e548a3706d10623724977f8
-
SHA256
147db46ec36f2d568462d019daac70fa2eb50a7534dbdf1603ecb078c16b9fd5
-
SHA512
83aa9b1dd7e8125a3cc3eb830fcd0ef3639bcc2db26f70480a1de694939a4f3c5af024846d5dd77a0a80cc88e0a4e2091dddc1e90f8dabaf2b20fffc2506476f
-
SSDEEP
6144:lDWHN0BEEbZX0Jz8RPR1iL/CW3e0dZfFgCZTdsmnElxEI8y8t7mJHbQ6rpMzgZYf:ciZX0JzSPRa1dTdxGmnOxH8TlaQww8t8
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 10 IoCs
pid Process 2988 wuauclt11.exe 2616 wuauclt11.exe 3068 wuauclt11.exe 2524 wuauclt11.exe 2624 wuauclt11.exe 1140 wuauclt11.exe 2488 wuauclt11.exe 2136 wuauclt11.exe 3016 wuauclt11.exe 2408 wuauclt11.exe -
Loads dropped DLL 20 IoCs
pid Process 2068 e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe 2068 e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe 2988 wuauclt11.exe 2988 wuauclt11.exe 2616 wuauclt11.exe 2616 wuauclt11.exe 3068 wuauclt11.exe 3068 wuauclt11.exe 2524 wuauclt11.exe 2524 wuauclt11.exe 2624 wuauclt11.exe 2624 wuauclt11.exe 1140 wuauclt11.exe 1140 wuauclt11.exe 2488 wuauclt11.exe 2488 wuauclt11.exe 2136 wuauclt11.exe 2136 wuauclt11.exe 3016 wuauclt11.exe 3016 wuauclt11.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt11.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2988 2068 e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe 29 PID 2068 wrote to memory of 2988 2068 e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe 29 PID 2068 wrote to memory of 2988 2068 e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe 29 PID 2068 wrote to memory of 2988 2068 e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe 29 PID 2988 wrote to memory of 2616 2988 wuauclt11.exe 30 PID 2988 wrote to memory of 2616 2988 wuauclt11.exe 30 PID 2988 wrote to memory of 2616 2988 wuauclt11.exe 30 PID 2988 wrote to memory of 2616 2988 wuauclt11.exe 30 PID 2616 wrote to memory of 3068 2616 wuauclt11.exe 31 PID 2616 wrote to memory of 3068 2616 wuauclt11.exe 31 PID 2616 wrote to memory of 3068 2616 wuauclt11.exe 31 PID 2616 wrote to memory of 3068 2616 wuauclt11.exe 31 PID 3068 wrote to memory of 2524 3068 wuauclt11.exe 32 PID 3068 wrote to memory of 2524 3068 wuauclt11.exe 32 PID 3068 wrote to memory of 2524 3068 wuauclt11.exe 32 PID 3068 wrote to memory of 2524 3068 wuauclt11.exe 32 PID 2524 wrote to memory of 2624 2524 wuauclt11.exe 33 PID 2524 wrote to memory of 2624 2524 wuauclt11.exe 33 PID 2524 wrote to memory of 2624 2524 wuauclt11.exe 33 PID 2524 wrote to memory of 2624 2524 wuauclt11.exe 33 PID 2624 wrote to memory of 1140 2624 wuauclt11.exe 34 PID 2624 wrote to memory of 1140 2624 wuauclt11.exe 34 PID 2624 wrote to memory of 1140 2624 wuauclt11.exe 34 PID 2624 wrote to memory of 1140 2624 wuauclt11.exe 34 PID 1140 wrote to memory of 2488 1140 wuauclt11.exe 35 PID 1140 wrote to memory of 2488 1140 wuauclt11.exe 35 PID 1140 wrote to memory of 2488 1140 wuauclt11.exe 35 PID 1140 wrote to memory of 2488 1140 wuauclt11.exe 35 PID 2488 wrote to memory of 2136 2488 wuauclt11.exe 36 PID 2488 wrote to memory of 2136 2488 wuauclt11.exe 36 PID 2488 wrote to memory of 2136 2488 wuauclt11.exe 36 PID 2488 wrote to memory of 2136 2488 wuauclt11.exe 36 PID 2136 wrote to memory of 3016 2136 wuauclt11.exe 37 PID 2136 wrote to memory of 3016 2136 wuauclt11.exe 37 PID 2136 wrote to memory of 3016 2136 wuauclt11.exe 37 PID 2136 wrote to memory of 3016 2136 wuauclt11.exe 37 PID 3016 wrote to memory of 2408 3016 wuauclt11.exe 38 PID 3016 wrote to memory of 2408 3016 wuauclt11.exe 38 PID 3016 wrote to memory of 2408 3016 wuauclt11.exe 38 PID 3016 wrote to memory of 2408 3016 wuauclt11.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 468 "C:\Users\Admin\AppData\Local\Temp\e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 524 "C:\Windows\SysWOW64\wuauclt11.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 536 "C:\Windows\SysWOW64\wuauclt11.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 540 "C:\Windows\SysWOW64\wuauclt11.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 528 "C:\Windows\SysWOW64\wuauclt11.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 544 "C:\Windows\SysWOW64\wuauclt11.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 548 "C:\Windows\SysWOW64\wuauclt11.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 532 "C:\Windows\SysWOW64\wuauclt11.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 556 "C:\Windows\SysWOW64\wuauclt11.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 552 "C:\Windows\SysWOW64\wuauclt11.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2408
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
374KB
MD5e5c45e21ebef55ec19c35c50c4703265
SHA1a973875a2485c4c04e548a3706d10623724977f8
SHA256147db46ec36f2d568462d019daac70fa2eb50a7534dbdf1603ecb078c16b9fd5
SHA51283aa9b1dd7e8125a3cc3eb830fcd0ef3639bcc2db26f70480a1de694939a4f3c5af024846d5dd77a0a80cc88e0a4e2091dddc1e90f8dabaf2b20fffc2506476f