Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 01:15
Behavioral task
behavioral1
Sample
159ad3eea650bf848817594c3a4d63d1_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
159ad3eea650bf848817594c3a4d63d1_JaffaCakes118.exe
-
Size
54KB
-
MD5
159ad3eea650bf848817594c3a4d63d1
-
SHA1
2e170ca60f9730c9cd0ffc1bb5e9635bcdc40c65
-
SHA256
a23e7d2b9a4f199251b3980ea3b62a3b0a171cba47ecfbcbbff8c73dd5cd7508
-
SHA512
3c3fc268538d14a4ada042e16302d5ec099f3fa3ca90637688d82a947fd8317eff4465366028e5630fb6e43f41a8918b939acc0a8793bf1c13f2f0e1e092890a
-
SSDEEP
1536:ojgB7WCypwgidCHQEcUMyIVu7F+cARVC29D:oqcBidV5Vu7F+H79
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1356 mswfzfgx.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\mswfzfgx.exe 159ad3eea650bf848817594c3a4d63d1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mswfzfgx.exe 159ad3eea650bf848817594c3a4d63d1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mswfzfgx.exe -
Hide Artifacts: Hidden Users 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\TermUser = "0" reg.exe -
resource yara_rule behavioral1/memory/584-0-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/files/0x000c000000014b4f-4.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 159ad3eea650bf848817594c3a4d63d1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mswfzfgx.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mswfzfgx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mswfzfgx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mswfzfgx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9F41FD76-6F99-418F-A090-A4A21BA10265}\WpadDecisionReason = "1" mswfzfgx.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9F41FD76-6F99-418F-A090-A4A21BA10265}\WpadDecisionTime = e0066461c416db01 mswfzfgx.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9F41FD76-6F99-418F-A090-A4A21BA10265}\WpadNetworkName = "Network 3" mswfzfgx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mswfzfgx.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mswfzfgx.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mswfzfgx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mswfzfgx.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mswfzfgx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mswfzfgx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9F41FD76-6F99-418F-A090-A4A21BA10265}\WpadDecision = "0" mswfzfgx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9F41FD76-6F99-418F-A090-A4A21BA10265}\a2-c4-09-7a-68-84 mswfzfgx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-c4-09-7a-68-84\WpadDecisionReason = "1" mswfzfgx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mswfzfgx.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mswfzfgx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9F41FD76-6F99-418F-A090-A4A21BA10265} mswfzfgx.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-c4-09-7a-68-84\WpadDecisionTime = e0066461c416db01 mswfzfgx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-c4-09-7a-68-84\WpadDecision = "0" mswfzfgx.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mswfzfgx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mswfzfgx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mswfzfgx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-c4-09-7a-68-84 mswfzfgx.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1356 wrote to memory of 736 1356 mswfzfgx.exe 33 PID 1356 wrote to memory of 736 1356 mswfzfgx.exe 33 PID 1356 wrote to memory of 736 1356 mswfzfgx.exe 33 PID 1356 wrote to memory of 736 1356 mswfzfgx.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\159ad3eea650bf848817594c3a4d63d1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\159ad3eea650bf848817594c3a4d63d1_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:584
-
C:\Windows\SysWOW64\mswfzfgx.exeC:\Windows\SysWOW64\mswfzfgx.exe /service1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\system32\reg.exeC:\Windows\Sysnative\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v TermUser /t REG_DWORD /d 02⤵
- Hide Artifacts: Hidden Users
PID:736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5159ad3eea650bf848817594c3a4d63d1
SHA12e170ca60f9730c9cd0ffc1bb5e9635bcdc40c65
SHA256a23e7d2b9a4f199251b3980ea3b62a3b0a171cba47ecfbcbbff8c73dd5cd7508
SHA5123c3fc268538d14a4ada042e16302d5ec099f3fa3ca90637688d82a947fd8317eff4465366028e5630fb6e43f41a8918b939acc0a8793bf1c13f2f0e1e092890a