Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 02:22 UTC
Static task
static1
Behavioral task
behavioral1
Sample
086cdcecfba4044398f361ff7fae0321_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
086cdcecfba4044398f361ff7fae0321_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
086cdcecfba4044398f361ff7fae0321_JaffaCakes118.exe
-
Size
98KB
-
MD5
086cdcecfba4044398f361ff7fae0321
-
SHA1
adfc5437b1e240f6ae8a6e3b1b495e095d857207
-
SHA256
a49f11e354c0edc509faea7b99a116a1ad402c72faa17a9354f7daaea6e03adb
-
SHA512
fad5fce88ff8e7285998ad0fdd87048b5723ea338e84214e0fcd0a20ab8f065ca916c36badef17df69c8c388de19a994075d00d12ab6523144846f4cfd14c232
-
SSDEEP
1536:fCJVWpuVbSn1BlTiQDaKts99iMfg3UzQkOv:fCJXOn7speUzQv
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2760 svchost.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\Q: svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat svchost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\RLT6990\services.exe 086cdcecfba4044398f361ff7fae0321_JaffaCakes118.exe File created C:\Windows\Drv15\svchost.exe 086cdcecfba4044398f361ff7fae0321_JaffaCakes118.exe File created C:\Windows\TDTMP svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2760 2504 taskeng.exe 32 PID 2504 wrote to memory of 2760 2504 taskeng.exe 32 PID 2504 wrote to memory of 2760 2504 taskeng.exe 32 PID 2504 wrote to memory of 2760 2504 taskeng.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\086cdcecfba4044398f361ff7fae0321_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\086cdcecfba4044398f361ff7fae0321_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
PID:1708
-
C:\Windows\system32\taskeng.exetaskeng.exe {1216C678-1EE7-4E41-95C9-AE280CCAC6FE} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\Drv15\svchost.exeC:\Windows\Drv15\svchost.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2760
-
Network
-
Remote address:8.8.8.8:53Requestftp.tripod.comIN AResponseftp.tripod.comIN A209.202.252.54
-
Remote address:8.8.8.8:53Requestgripto.freehostia.comIN AResponse
-
Remote address:8.8.8.8:53Requestgripto.freehostia.comIN A
-
300 B 367 B 6 6
-
190 B 124 B 4 3
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5460ce14d060cdedf74322faad7a02e8c
SHA1fdc2e928718698c1be35f2f1b3218749a009d6d7
SHA256a961740ca9fce24fbfe5122570e72dca89eef6028755b18267bfaa364a8db86d
SHA5123ddfe4ad7ae1aa6805a2ae46481efa52bbfcefd69fe4e4e3f8a92edc713b8e05ccb2a2d70816be6ac60bbf58b1bab3872b02da2cf61e296a319b908d84fc0add
-
Filesize
98KB
MD5086cdcecfba4044398f361ff7fae0321
SHA1adfc5437b1e240f6ae8a6e3b1b495e095d857207
SHA256a49f11e354c0edc509faea7b99a116a1ad402c72faa17a9354f7daaea6e03adb
SHA512fad5fce88ff8e7285998ad0fdd87048b5723ea338e84214e0fcd0a20ab8f065ca916c36badef17df69c8c388de19a994075d00d12ab6523144846f4cfd14c232