Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 03:34
Behavioral task
behavioral1
Sample
16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe
-
Size
186KB
-
MD5
16006fc004311e4f0e2998b79aef3b8b
-
SHA1
01c4bac22fed4ec60fe07c964d77e4a29fe50bd8
-
SHA256
58524944709f5765b585b156f9d533b822ded799461fc72285785088f3b8fe8b
-
SHA512
7daa7043475710a1791177d05bbbfe4922718df022bd8cf98e4708bcc17fdc39f42aeca82ec070ba196fa6c3f8e7eba6d924853e0d6b8a4a183260dde864c835
-
SSDEEP
3072:woy8j7VnNdrPHaSekwi+mW+2JUoZsZloutnaWo6eSEcfNte4lyArDcoWwVK:g8jZ7rvaU3+mWrnZWloSnaWld11Q4lVG
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Extracted
latentbot
lacamora1997.zapto.org
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe -
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral1/memory/2796-39-0x0000000000400000-0x0000000000463000-memory.dmp modiloader_stage2 behavioral1/memory/2796-144-0x0000000000400000-0x0000000000463000-memory.dmp modiloader_stage2 behavioral1/memory/1600-154-0x0000000000400000-0x0000000000463000-memory.dmp modiloader_stage2 behavioral1/memory/1600-164-0x0000000000400000-0x0000000000463000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 1600 mstwain32.exe -
Executes dropped EXE 1 IoCs
pid Process 1600 mstwain32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\mstwain32 = "C:\\Windows\\mstwain32.exe" mstwain32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstwain32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened (read-only) \??\O: 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened (read-only) \??\Y: 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened (read-only) \??\H: 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened (read-only) \??\L: 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened (read-only) \??\M: 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened (read-only) \??\J: 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened (read-only) \??\I: 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened (read-only) \??\K: 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened (read-only) \??\R: 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened (read-only) \??\S: 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened (read-only) \??\T: 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened (read-only) \??\U: 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened (read-only) \??\X: 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened (read-only) \??\G: 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened (read-only) \??\Z: 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened (read-only) \??\P: 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened (read-only) \??\Q: 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened (read-only) \??\V: 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened (read-only) \??\W: 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened (read-only) \??\E: 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2796-0-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2796-1-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-2-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-4-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-5-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-6-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-19-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-22-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-20-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-24-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-21-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-23-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-32-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-33-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-34-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-35-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-36-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-38-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-39-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2796-40-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-42-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-44-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-45-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-56-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-57-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-60-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-59-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-64-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-68-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-69-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-72-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-73-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-77-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/2796-78-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/files/0x00070000000055cf-129.dat upx behavioral1/memory/2796-126-0x0000000004C70000-0x0000000004CD3000-memory.dmp upx behavioral1/memory/2796-144-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2796-145-0x0000000001F70000-0x000000000302A000-memory.dmp upx behavioral1/memory/1600-154-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1600-164-0x0000000000400000-0x0000000000463000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\f774a1a 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened for modification C:\Windows\SYSTEM.INI 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File created C:\Windows\mstwain32.exe 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File opened for modification C:\Windows\mstwain32.exe 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe File created C:\Windows\ntdtcstp.dll mstwain32.exe File created C:\Windows\cmsetac.dll mstwain32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstwain32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Token: SeDebugPrivilege 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Token: SeBackupPrivilege 2532 vssvc.exe Token: SeRestorePrivilege 2532 vssvc.exe Token: SeAuditPrivilege 2532 vssvc.exe Token: SeDebugPrivilege 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Token: SeDebugPrivilege 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Token: SeDebugPrivilege 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Token: SeDebugPrivilege 1600 mstwain32.exe Token: SeDebugPrivilege 1600 mstwain32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1600 mstwain32.exe 1600 mstwain32.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2796 wrote to memory of 1188 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 19 PID 2796 wrote to memory of 1292 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 20 PID 2796 wrote to memory of 1344 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 21 PID 2796 wrote to memory of 364 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 23 PID 2796 wrote to memory of 3004 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 30 PID 2796 wrote to memory of 1188 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 19 PID 2796 wrote to memory of 1292 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 20 PID 2796 wrote to memory of 1344 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 21 PID 2796 wrote to memory of 364 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 23 PID 2796 wrote to memory of 3004 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 30 PID 2796 wrote to memory of 1188 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 19 PID 2796 wrote to memory of 1292 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 20 PID 2796 wrote to memory of 1344 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 21 PID 2796 wrote to memory of 364 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 23 PID 2796 wrote to memory of 3004 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 30 PID 2796 wrote to memory of 1188 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 19 PID 2796 wrote to memory of 1292 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 20 PID 2796 wrote to memory of 1344 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 21 PID 2796 wrote to memory of 364 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 23 PID 2796 wrote to memory of 3004 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 30 PID 2796 wrote to memory of 1600 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 33 PID 2796 wrote to memory of 1600 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 33 PID 2796 wrote to memory of 1600 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 33 PID 2796 wrote to memory of 1600 2796 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe 33 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1188
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1292
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2796 -
C:\Windows\mstwain32.exe"C:\Windows\mstwain32.exe" \melt "C:\Users\Admin\AppData\Local\Temp\16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe"3⤵
- UAC bypass
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1600
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:364
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F32D97DF-E3E5-4CB9-9E3E-0EB5B4E49801}1⤵PID:3004
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2532
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186KB
MD516006fc004311e4f0e2998b79aef3b8b
SHA101c4bac22fed4ec60fe07c964d77e4a29fe50bd8
SHA25658524944709f5765b585b156f9d533b822ded799461fc72285785088f3b8fe8b
SHA5127daa7043475710a1791177d05bbbfe4922718df022bd8cf98e4708bcc17fdc39f42aeca82ec070ba196fa6c3f8e7eba6d924853e0d6b8a4a183260dde864c835