Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/09/2024, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
f3c31b6b521ebc6457c7db4ebb2ff85f_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
f3c31b6b521ebc6457c7db4ebb2ff85f_JaffaCakes118.exe
-
Size
385KB
-
MD5
f3c31b6b521ebc6457c7db4ebb2ff85f
-
SHA1
d22d39dd8abf73e3ccc5b711f711e21ba178ce12
-
SHA256
0e305f4c1bc84575b8a3c2e67e8bfe4a9580435aac0de239a97d535c75a22417
-
SHA512
130b82c48fa2dec153b93c49e7e4c9a58aaba592562210dd65b9e46cc4ea7fd85558e052f0faa1e06ddd1c4a9ec7f6d1a4da02eb93ef71ce87ec43e41d5402d1
-
SSDEEP
6144:JF1JVcCGhDE3S8KssNxqqpSWsq4SupPW32yZ8YW+hJo00:nrVfGNEi8KrNxqOzfKPWfNJ1
Malware Config
Extracted
netwire
194.68.59.62:3369
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Frank456
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2924-18-0x0000000000080000-0x00000000000AC000-memory.dmp netwire behavioral1/memory/2924-15-0x0000000000080000-0x00000000000AC000-memory.dmp netwire behavioral1/memory/2924-21-0x0000000000080000-0x00000000000AC000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
pid Process 1792 taskmgr.exe 2924 taskmgr.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/2720-2-0x0000000000330000-0x0000000000350000-memory.dmp agile_net -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Application = "C:\\Users\\Admin\\AppData\\Local\\taskmgr.exe -boot" taskmgr.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1792 set thread context of 2924 1792 taskmgr.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3c31b6b521ebc6457c7db4ebb2ff85f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2720 f3c31b6b521ebc6457c7db4ebb2ff85f_JaffaCakes118.exe Token: SeDebugPrivilege 1792 taskmgr.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2316 2720 f3c31b6b521ebc6457c7db4ebb2ff85f_JaffaCakes118.exe 30 PID 2720 wrote to memory of 2316 2720 f3c31b6b521ebc6457c7db4ebb2ff85f_JaffaCakes118.exe 30 PID 2720 wrote to memory of 2316 2720 f3c31b6b521ebc6457c7db4ebb2ff85f_JaffaCakes118.exe 30 PID 2720 wrote to memory of 2316 2720 f3c31b6b521ebc6457c7db4ebb2ff85f_JaffaCakes118.exe 30 PID 2720 wrote to memory of 2476 2720 f3c31b6b521ebc6457c7db4ebb2ff85f_JaffaCakes118.exe 33 PID 2720 wrote to memory of 2476 2720 f3c31b6b521ebc6457c7db4ebb2ff85f_JaffaCakes118.exe 33 PID 2720 wrote to memory of 2476 2720 f3c31b6b521ebc6457c7db4ebb2ff85f_JaffaCakes118.exe 33 PID 2720 wrote to memory of 2476 2720 f3c31b6b521ebc6457c7db4ebb2ff85f_JaffaCakes118.exe 33 PID 1884 wrote to memory of 1792 1884 explorer.exe 35 PID 1884 wrote to memory of 1792 1884 explorer.exe 35 PID 1884 wrote to memory of 1792 1884 explorer.exe 35 PID 1884 wrote to memory of 1792 1884 explorer.exe 35 PID 1792 wrote to memory of 2924 1792 taskmgr.exe 36 PID 1792 wrote to memory of 2924 1792 taskmgr.exe 36 PID 1792 wrote to memory of 2924 1792 taskmgr.exe 36 PID 1792 wrote to memory of 2924 1792 taskmgr.exe 36 PID 1792 wrote to memory of 2924 1792 taskmgr.exe 36 PID 1792 wrote to memory of 2924 1792 taskmgr.exe 36 PID 1792 wrote to memory of 2924 1792 taskmgr.exe 36 PID 1792 wrote to memory of 2924 1792 taskmgr.exe 36 PID 1792 wrote to memory of 2924 1792 taskmgr.exe 36 PID 1792 wrote to memory of 2924 1792 taskmgr.exe 36 PID 1792 wrote to memory of 2924 1792 taskmgr.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3c31b6b521ebc6457c7db4ebb2ff85f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3c31b6b521ebc6457c7db4ebb2ff85f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\f3c31b6b521ebc6457c7db4ebb2ff85f_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\taskmgr.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" /c, "C:\Users\Admin\AppData\Local\taskmgr.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2476
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\taskmgr.exe"C:\Users\Admin\AppData\Local\taskmgr.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\taskmgr.exe"C:\Users\Admin\AppData\Local\taskmgr.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5f3c31b6b521ebc6457c7db4ebb2ff85f
SHA1d22d39dd8abf73e3ccc5b711f711e21ba178ce12
SHA2560e305f4c1bc84575b8a3c2e67e8bfe4a9580435aac0de239a97d535c75a22417
SHA512130b82c48fa2dec153b93c49e7e4c9a58aaba592562210dd65b9e46cc4ea7fd85558e052f0faa1e06ddd1c4a9ec7f6d1a4da02eb93ef71ce87ec43e41d5402d1