Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/09/2024, 07:10
Static task
static1
Behavioral task
behavioral1
Sample
e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe
-
Size
290KB
-
MD5
e64c67b5d78a53909bfadfbf781162e9
-
SHA1
aa5582e0420bd0e5905537233b94f145e039a2c6
-
SHA256
2443cfea2a2de60fe321282643231993f8c3960066509d004da95c901566757a
-
SHA512
8ede7ecbaa13b99276ee46fa2beeb1fa06ee2f3a5a86b3a4b8ff16f99d4e2904f035914a4b091fbe87beab72645c35cd0ae76a65757045e87f27122e2e633a77
-
SSDEEP
6144:+z+92mhAMJ/cPl3ix0LHoVzkLhQusXS3CCtr3S7ogs2X69A83v:+K2mhAMJ/cPlFQkCuPvr3woX2X6+8f
Malware Config
Signatures
-
Detects PlugX payload 14 IoCs
resource yara_rule behavioral1/memory/2804-23-0x0000000000410000-0x000000000044F000-memory.dmp family_plugx behavioral1/memory/2604-42-0x0000000000300000-0x000000000033F000-memory.dmp family_plugx behavioral1/memory/2588-49-0x0000000000420000-0x000000000045F000-memory.dmp family_plugx behavioral1/memory/2604-51-0x0000000000300000-0x000000000033F000-memory.dmp family_plugx behavioral1/memory/2804-52-0x0000000000410000-0x000000000044F000-memory.dmp family_plugx behavioral1/memory/2588-53-0x0000000000420000-0x000000000045F000-memory.dmp family_plugx behavioral1/memory/2588-64-0x0000000000420000-0x000000000045F000-memory.dmp family_plugx behavioral1/memory/2588-68-0x0000000000420000-0x000000000045F000-memory.dmp family_plugx behavioral1/memory/2588-67-0x0000000000420000-0x000000000045F000-memory.dmp family_plugx behavioral1/memory/2588-66-0x0000000000420000-0x000000000045F000-memory.dmp family_plugx behavioral1/memory/2588-65-0x0000000000420000-0x000000000045F000-memory.dmp family_plugx behavioral1/memory/844-77-0x00000000002C0000-0x00000000002FF000-memory.dmp family_plugx behavioral1/memory/844-80-0x00000000002C0000-0x00000000002FF000-memory.dmp family_plugx behavioral1/memory/844-79-0x00000000002C0000-0x00000000002FF000-memory.dmp family_plugx -
Deletes itself 1 IoCs
pid Process 2588 svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 2804 TPLCDCLR.EXE 2604 TPLCDCLR.EXE -
Loads dropped DLL 6 IoCs
pid Process 2668 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 2668 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 2668 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 2668 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 2804 TPLCDCLR.EXE 2604 TPLCDCLR.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TPLCDCLR.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TPLCDCLR.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 41004500430042003000440042003600390041003800410043004500440033000000 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2588 svchost.exe 2588 svchost.exe 2588 svchost.exe 2588 svchost.exe 2588 svchost.exe 2588 svchost.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 2588 svchost.exe 2588 svchost.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 2588 svchost.exe 2588 svchost.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 2588 svchost.exe 2588 svchost.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 2588 svchost.exe 2588 svchost.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe 844 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2588 svchost.exe 844 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2804 TPLCDCLR.EXE Token: SeTcbPrivilege 2804 TPLCDCLR.EXE Token: SeDebugPrivilege 2604 TPLCDCLR.EXE Token: SeTcbPrivilege 2604 TPLCDCLR.EXE Token: SeDebugPrivilege 2588 svchost.exe Token: SeTcbPrivilege 2588 svchost.exe Token: SeDebugPrivilege 844 msiexec.exe Token: SeTcbPrivilege 844 msiexec.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2804 2668 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2804 2668 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2804 2668 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2804 2668 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2804 2668 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2804 2668 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2804 2668 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 30 PID 2604 wrote to memory of 2588 2604 TPLCDCLR.EXE 32 PID 2604 wrote to memory of 2588 2604 TPLCDCLR.EXE 32 PID 2604 wrote to memory of 2588 2604 TPLCDCLR.EXE 32 PID 2604 wrote to memory of 2588 2604 TPLCDCLR.EXE 32 PID 2604 wrote to memory of 2588 2604 TPLCDCLR.EXE 32 PID 2604 wrote to memory of 2588 2604 TPLCDCLR.EXE 32 PID 2604 wrote to memory of 2588 2604 TPLCDCLR.EXE 32 PID 2604 wrote to memory of 2588 2604 TPLCDCLR.EXE 32 PID 2604 wrote to memory of 2588 2604 TPLCDCLR.EXE 32 PID 2588 wrote to memory of 844 2588 svchost.exe 33 PID 2588 wrote to memory of 844 2588 svchost.exe 33 PID 2588 wrote to memory of 844 2588 svchost.exe 33 PID 2588 wrote to memory of 844 2588 svchost.exe 33 PID 2588 wrote to memory of 844 2588 svchost.exe 33 PID 2588 wrote to memory of 844 2588 svchost.exe 33 PID 2588 wrote to memory of 844 2588 svchost.exe 33 PID 2588 wrote to memory of 844 2588 svchost.exe 33 PID 2588 wrote to memory of 844 2588 svchost.exe 33 PID 2588 wrote to memory of 844 2588 svchost.exe 33 PID 2588 wrote to memory of 844 2588 svchost.exe 33 PID 2588 wrote to memory of 844 2588 svchost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\TPLCDCLR.EXE"C:\Users\Admin\AppData\Local\Temp\RarSFX0\TPLCDCLR.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\ProgramData\Intel(R) Capability Licensing Service Interface CPUMonitor\TPLCDCLR.EXE"C:\ProgramData\Intel(R) Capability Licensing Service Interface CPUMonitor\TPLCDCLR.EXE"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 209 25883⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147KB
MD55ce1c050fb6370e5cf997313abba9947
SHA16751978299e9b956da914a5110438b6b262dcb75
SHA256ab927653e27e3374aa97eb9bfdacb011a7664d930e6f356512c5ae9582c2cfe5
SHA512e6ce9bf2392fb9610efdfa0abb460b8031cef020ffed2b4cae9b609631f0fba5ae18ea311dc8f94aa5f46a4dbac9064186b5a0648459504256a7fb17ad8c3061
-
Filesize
78KB
MD5be59ff05b96b7bb251dd77932b71bbc1
SHA128a4a3be8606aea4f46761238d99fa4d7a96354e
SHA256c8dd154950db3401b2e91c6a535b2f0f8853bc188e31f9d91c96bf31cebd1251
SHA5122e06ad4dac78bd08d8c0b9925455662900bc6cf71df70ce478d18bc4cb273ab6fd15eedaa563c646001765a1a8878b752748abc1ea6c43a1acdf32a76c524050
-
Filesize
37KB
MD5d9978f95ce30e85943efb52c9c7d731b
SHA1a64bb28c87c4e41be56a9bb3b887c53051eb1db5
SHA25669c2c1733dd95f16a1e89869ec05a618c27df1e7e86a51884abcdeb709eb3d45
SHA512766a222e9f6fc9acafd2bbf72fdf44bb486d394cbd8751d487d47e828760240b1b945775efd17e77ca6b163e9e1f140f4612715b63b390cdf86e20325112124c