Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16/09/2024, 23:36
Static task
static1
Behavioral task
behavioral1
Sample
e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe
-
Size
374KB
-
MD5
e5c45e21ebef55ec19c35c50c4703265
-
SHA1
a973875a2485c4c04e548a3706d10623724977f8
-
SHA256
147db46ec36f2d568462d019daac70fa2eb50a7534dbdf1603ecb078c16b9fd5
-
SHA512
83aa9b1dd7e8125a3cc3eb830fcd0ef3639bcc2db26f70480a1de694939a4f3c5af024846d5dd77a0a80cc88e0a4e2091dddc1e90f8dabaf2b20fffc2506476f
-
SSDEEP
6144:lDWHN0BEEbZX0Jz8RPR1iL/CW3e0dZfFgCZTdsmnElxEI8y8t7mJHbQ6rpMzgZYf:ciZX0JzSPRa1dTdxGmnOxH8TlaQww8t8
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 10 IoCs
pid Process 4972 wuauclt11.exe 4804 wuauclt11.exe 848 wuauclt11.exe 1524 wuauclt11.exe 2760 wuauclt11.exe 2812 wuauclt11.exe 2292 wuauclt11.exe 2796 wuauclt11.exe 3692 wuauclt11.exe 2688 wuauclt11.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt11.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2560 wrote to memory of 4972 2560 e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe 82 PID 2560 wrote to memory of 4972 2560 e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe 82 PID 2560 wrote to memory of 4972 2560 e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe 82 PID 4972 wrote to memory of 4804 4972 wuauclt11.exe 90 PID 4972 wrote to memory of 4804 4972 wuauclt11.exe 90 PID 4972 wrote to memory of 4804 4972 wuauclt11.exe 90 PID 4804 wrote to memory of 848 4804 wuauclt11.exe 92 PID 4804 wrote to memory of 848 4804 wuauclt11.exe 92 PID 4804 wrote to memory of 848 4804 wuauclt11.exe 92 PID 848 wrote to memory of 1524 848 wuauclt11.exe 94 PID 848 wrote to memory of 1524 848 wuauclt11.exe 94 PID 848 wrote to memory of 1524 848 wuauclt11.exe 94 PID 1524 wrote to memory of 2760 1524 wuauclt11.exe 95 PID 1524 wrote to memory of 2760 1524 wuauclt11.exe 95 PID 1524 wrote to memory of 2760 1524 wuauclt11.exe 95 PID 2760 wrote to memory of 2812 2760 wuauclt11.exe 96 PID 2760 wrote to memory of 2812 2760 wuauclt11.exe 96 PID 2760 wrote to memory of 2812 2760 wuauclt11.exe 96 PID 2812 wrote to memory of 2292 2812 wuauclt11.exe 97 PID 2812 wrote to memory of 2292 2812 wuauclt11.exe 97 PID 2812 wrote to memory of 2292 2812 wuauclt11.exe 97 PID 2292 wrote to memory of 2796 2292 wuauclt11.exe 98 PID 2292 wrote to memory of 2796 2292 wuauclt11.exe 98 PID 2292 wrote to memory of 2796 2292 wuauclt11.exe 98 PID 2796 wrote to memory of 3692 2796 wuauclt11.exe 99 PID 2796 wrote to memory of 3692 2796 wuauclt11.exe 99 PID 2796 wrote to memory of 3692 2796 wuauclt11.exe 99 PID 3692 wrote to memory of 2688 3692 wuauclt11.exe 100 PID 3692 wrote to memory of 2688 3692 wuauclt11.exe 100 PID 3692 wrote to memory of 2688 3692 wuauclt11.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 1156 "C:\Users\Admin\AppData\Local\Temp\e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 1148 "C:\Windows\SysWOW64\wuauclt11.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 1120 "C:\Windows\SysWOW64\wuauclt11.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 1112 "C:\Windows\SysWOW64\wuauclt11.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 1128 "C:\Windows\SysWOW64\wuauclt11.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 1132 "C:\Windows\SysWOW64\wuauclt11.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 1136 "C:\Windows\SysWOW64\wuauclt11.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 1140 "C:\Windows\SysWOW64\wuauclt11.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 1032 "C:\Windows\SysWOW64\wuauclt11.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 1068 "C:\Windows\SysWOW64\wuauclt11.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2688
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
374KB
MD5e5c45e21ebef55ec19c35c50c4703265
SHA1a973875a2485c4c04e548a3706d10623724977f8
SHA256147db46ec36f2d568462d019daac70fa2eb50a7534dbdf1603ecb078c16b9fd5
SHA51283aa9b1dd7e8125a3cc3eb830fcd0ef3639bcc2db26f70480a1de694939a4f3c5af024846d5dd77a0a80cc88e0a4e2091dddc1e90f8dabaf2b20fffc2506476f