Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
15s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 10:41
Static task
static1
Behavioral task
behavioral1
Sample
eb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exe
-
Size
989KB
-
MD5
eb29c382d8a70b5d78802d04ec5623e4
-
SHA1
0e74128bb6f4c5a75596cfe87a6df9e09f35d1b8
-
SHA256
28c5ed49a415babc182c3c990ec24e5a860fe7b51b0fc768cccae59a08f8a26f
-
SHA512
498f2b08468ef18cbb10a070cce05969f84ccfbe800eea1523e5bae37dba5a8d2fde515cc16bb47187311f779b1a84964940f4d8b0cbf8aeb95aa54bec7fede3
-
SSDEEP
24576:Mtb20pkaCqT5TBWgNQ7aIkX04z6ZQrhk6A:1Vg5tQ7aIktzCQC5
Malware Config
Extracted
formbook
3.8
war
baoeasy.net
elblogdelagenteinmobiliario.com
jxnklx.com
styleweit.com
usmivki.net
gxxmybkw.com
thrifty.tools
oslomatch.com
housten.help
zhituwangluo.com
cagili.info
fanniesandbums.com
metalpay.exchange
swissden.com
padreisla2.com
flysat-stream.com
kadabradelivery.com
mumoswolrd.com
nti.ltd
shiretokoserai.com
yodiggafixmycredit.com
wombat.media
realtorsquadlife.com
askescharling.com
sugarfreeslush.com
barunnetwork.com
fragile.ltd
e-instituteindia.com
recouer-acc.com
momentsteed.com
vinnyvieh.com
kindle-manga.info
houseofthedev.com
sirwatermanagement.com
longdistancecharger.com
morningcn.com
vlove.info
nezdw.net
grazedandconfused.com
willashtravel.com
featherlightadventures.net
take-an-idea.com
melius.cloud
way-to-health.com
vrensestudios.info
tuservimotor.com
classtoronto.com
gardeningngak.party
monalisamaryland.com
artoftattoo.info
lianglinyiyou.com
switchpilot.com
andreacagnacci.com
libmeet.com
migueleguzman.com
rainitravel.com
chuanx321.com
cancanconsultants.com
coloniasantjordi.com
mehdikhalid.com
sharpen.site
domainwhoispc.com
offense.ltd
elnabooking.com
clemosiq.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2304-10-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/2304-13-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1120 set thread context of 2304 1120 eb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exe 29 PID 2776 set thread context of 1376 2776 mstsc.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe 2776 mstsc.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2776 mstsc.exe 2776 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2776 mstsc.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1120 eb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exe 1120 eb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exe 1120 eb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1120 eb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exe 1120 eb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exe 1120 eb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2304 1120 eb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exe 29 PID 1120 wrote to memory of 2304 1120 eb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exe 29 PID 1120 wrote to memory of 2304 1120 eb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exe 29 PID 1120 wrote to memory of 2304 1120 eb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exe 29 PID 1120 wrote to memory of 2304 1120 eb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exe 29 PID 1120 wrote to memory of 2304 1120 eb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exe 29 PID 1120 wrote to memory of 2304 1120 eb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exe 29 PID 2776 wrote to memory of 2832 2776 mstsc.exe 31 PID 2776 wrote to memory of 2832 2776 mstsc.exe 31 PID 2776 wrote to memory of 2832 2776 mstsc.exe 31 PID 2776 wrote to memory of 2832 2776 mstsc.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\eb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\WerFault.exe"C:\Windows\SysWOW64\WerFault.exe"3⤵PID:2304
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\WerFault.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
167KB
MD5809dd59315e8ddc7b8620dcbf40e600f
SHA1bbdd679ef59ada9b40c7c648e8401596e480b962
SHA256801e944ab6513594fffb38572788b6db73e087f4b83555916aec34b2d9ec8971
SHA51206aba4ede1856b652cb85f022a0b29f008c09969d9979aa0fbd1349cce584041b280f339030d096e7877e0e15339e3812dd6aa2a7242302896aac66985e8a11b