Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 20:02
Static task
static1
Behavioral task
behavioral1
Sample
fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe
-
Size
672KB
-
MD5
fd0bba3758d1222617a1ac9107ab96ee
-
SHA1
7663e0a51ecd65b7d5285f889f653d7d1b6a683c
-
SHA256
a274682f37bd79983e7020ee2da677f74520c31f81dd390790e68c440427cff9
-
SHA512
ebc4738c962c7765345f827dd8275117a4e8350e769d3969b2b3dc7e052e170cc4a3dc1e6fce133019b57506c88eb546cc8468eb379f40b80a844868b3eb6f1a
-
SSDEEP
3072:5A3kRAyKVHAz6o130Sbr7qH7e+TRDDW5n4iAGZupbLbkJOSxhb1cGmx2m:ukRAl4JrGXD+nbAGZul9ehx1
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\win\ImagePath = "C:\\WINDOWS\\SYSTEM32\\WIN.EXE" Regedit.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\win\ImagePath = "C:\\WINDOWS\\SYSTEM32\\WIN.EXE" Regedit.exe -
Deletes itself 1 IoCs
pid Process 2664 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\WINDOWS\\SYSTEM32\\WIN.EXE" Regedit.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\windows\SysWOW64\win.exe fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe File opened for modification C:\windows\SysWOW64\win.exe fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe File opened for modification C:\windows\SysWOW64\oemlinkicon.ico fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\shdoclc.dll fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2664 cmd.exe 2560 PING.EXE -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{6096E38F-5AC1-4391-8EC4-75DFA92FB32F}\Default Visible = "Yes" Regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{6096E38F-5AC1-4391-8EC4-75DFA92FB32F}\ButtonText = "电脑首页" Regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{6096E38F-5AC1-4391-8EC4-75DFA92FB32F}\Exec = "http://www.hao123.cn/?hao" Regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{6096E38F-5AC1-4391-8EC4-75DFA92FB32F}\HotIcon = "%windir%\\system32\\oemlinkicon.ico" Regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{6096E38F-5AC1-4391-8EC4-75DFA92FB32F}\Icon = "%windir%\\system32\\oemlinkicon.ico" Regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{6096E38F-5AC1-4391-8EC4-75DFA92FB32F} Regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{6096E38F-5AC1-4391-8EC4-75DFA92FB32F}\CLSID = "{1FBA04EE-3024-11D2-8F1F-0000F87ABD16}" Regedit.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.123456.cn" fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\DefaultIcon Regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\DefaultIcon\ = "oemlinkicon.ico" Regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\Instance\InitPropertyBag Regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\Instance Regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\Instance\InitPropertyBag\Param1 = "http://ghost.123456.cn" Regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\ = "电脑首页" Regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\InfoTip = "电脑首页" Regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID Regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\Instance\InitPropertyBag\Command = "电脑首页" Regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0} Regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node Regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2812 Regedit.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2560 PING.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2628 fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2628 wrote to memory of 2812 2628 fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe 30 PID 2628 wrote to memory of 2812 2628 fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe 30 PID 2628 wrote to memory of 2812 2628 fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe 30 PID 2628 wrote to memory of 2812 2628 fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe 30 PID 2628 wrote to memory of 2664 2628 fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe 31 PID 2628 wrote to memory of 2664 2628 fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe 31 PID 2628 wrote to memory of 2664 2628 fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe 31 PID 2628 wrote to memory of 2664 2628 fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2560 2664 cmd.exe 33 PID 2664 wrote to memory of 2560 2664 cmd.exe 33 PID 2664 wrote to memory of 2560 2664 cmd.exe 33 PID 2664 wrote to memory of 2560 2664 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\Regedit.exeRegedit.exe /s C:\jnnj.reg2⤵
- Sets service image path in registry
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Runs .reg file with regedit
PID:2812
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 1 && del "C:\Users\Admin\AppData\Local\Temp\fd0bba3758d1222617a1ac9107ab96ee_JaffaCakes118.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2560
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD51728f9a2f4cb2635a964b71c7a2d2f49
SHA13f2f122cde78753144bd0207523a9e8b44388182
SHA2565f30bb41ec79bd9c58133e1c57fc25d63d9d16aabe40b8e90748450f4b3f3a45
SHA512a153cf2506ae2b9ccabaebcd51a800d132b6a0fc4192c1ddb65279a6a864131477646a2ac2e9b96142206c4ead6aa3dbb748f06e004da42c6841bc91fb60a0f9