Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 10:07
Static task
static1
Behavioral task
behavioral1
Sample
3f3cf1daafd7fd83c2d1805645194e69_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f3cf1daafd7fd83c2d1805645194e69_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3f3cf1daafd7fd83c2d1805645194e69_JaffaCakes118.exe
-
Size
78KB
-
MD5
3f3cf1daafd7fd83c2d1805645194e69
-
SHA1
73ace58bc17161762d5a573cfcd08c03e11e2183
-
SHA256
2b63a16f35062c14e35d9de5865ca84a06f9621481a62e761669439e0f0ebcd2
-
SHA512
e3a00444779c531469e9cc2de2eb297853089a055b5348a45efb1beb47ef82a04fb67195df1af00cfab79b184272505b9c04d704fa9678a881efaa9f5645dbc0
-
SSDEEP
1536:fuHY6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQte399/X1G6:fuHY53Ln7N041Qqhge399/D
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Deletes itself 1 IoCs
pid Process 280 tmpBBB1.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 280 tmpBBB1.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 1828 3f3cf1daafd7fd83c2d1805645194e69_JaffaCakes118.exe 1828 3f3cf1daafd7fd83c2d1805645194e69_JaffaCakes118.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmpBBB1.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpBBB1.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f3cf1daafd7fd83c2d1805645194e69_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1828 3f3cf1daafd7fd83c2d1805645194e69_JaffaCakes118.exe Token: SeDebugPrivilege 280 tmpBBB1.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1828 wrote to memory of 1700 1828 3f3cf1daafd7fd83c2d1805645194e69_JaffaCakes118.exe 30 PID 1828 wrote to memory of 1700 1828 3f3cf1daafd7fd83c2d1805645194e69_JaffaCakes118.exe 30 PID 1828 wrote to memory of 1700 1828 3f3cf1daafd7fd83c2d1805645194e69_JaffaCakes118.exe 30 PID 1828 wrote to memory of 1700 1828 3f3cf1daafd7fd83c2d1805645194e69_JaffaCakes118.exe 30 PID 1700 wrote to memory of 2332 1700 vbc.exe 32 PID 1700 wrote to memory of 2332 1700 vbc.exe 32 PID 1700 wrote to memory of 2332 1700 vbc.exe 32 PID 1700 wrote to memory of 2332 1700 vbc.exe 32 PID 1828 wrote to memory of 280 1828 3f3cf1daafd7fd83c2d1805645194e69_JaffaCakes118.exe 33 PID 1828 wrote to memory of 280 1828 3f3cf1daafd7fd83c2d1805645194e69_JaffaCakes118.exe 33 PID 1828 wrote to memory of 280 1828 3f3cf1daafd7fd83c2d1805645194e69_JaffaCakes118.exe 33 PID 1828 wrote to memory of 280 1828 3f3cf1daafd7fd83c2d1805645194e69_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f3cf1daafd7fd83c2d1805645194e69_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3f3cf1daafd7fd83c2d1805645194e69_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\t58mojjs.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBDA5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcBDA4.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2332
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpBBB1.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpBBB1.tmp.exe" C:\Users\Admin\AppData\Local\Temp\3f3cf1daafd7fd83c2d1805645194e69_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cb895ae6b0b76b752b4c2033fa47c2df
SHA1b8e09ef140610bd721745731250e1cb664e74c9d
SHA2569a06e7d11c99f69df02e5b522139f162ead3f5beaaf7331dc545fe4b1c1ef0f3
SHA51272d35ae45cc23124f0aded8c8e0bcdfd139f1a93079efc4a92e73d1fff0f5f0251e048415e4737d7ed1d8752ecf18e34699d319d52d89bb565ef796723cc5998
-
Filesize
15KB
MD5652ca43088610db8ea8de10457ba6be9
SHA184c4de71284cb657c3225d44ff466695d931735c
SHA25689698fd8b56a6cd9f8fb20a72eafa8cb05a31d2879e5f2ea23023e6a4d02a894
SHA512ec9b679c7e3746b49b7ce44fcedde9219a667fa8cf5c05c777f58bee6d1436aafd3cecb3382b17025cd693703cbb7cdc7b1d3f430c05ccb3fc9f238f4650bd6b
-
Filesize
266B
MD5455af9e17c9dbb9719a0e899197baede
SHA1b13fa9b305deea3edaa1f14ae821eef830288b05
SHA2560f82a901a62b603a8ebecfd39b4e697ee4284a9ff89570ade85ee1b528530331
SHA512b6ea7275222ca350de104c7d20102d13447c0b32cc4b2d6b6387ab5a91cc12d0c28e3576f2cef95854a0787006f6c8d3f1af8644bf2f060781f002a4340f7451
-
Filesize
78KB
MD54ce5fa3716cd542a17d5ab56448f53d7
SHA10bcb2c109787b7ebbba69a18dba535d6594cfee6
SHA256e3577c417a940ccfc76c843b5a7684cbc640d257a5693e2143252895a082a7cf
SHA512f0a3a96ad7a5cc8c27b88bc13f6bce61f3dd2d02e7c52e7eea340961260e9d726713f72b9558809057f28f395f903d567d965082d11fb52da14442d722e1c193
-
Filesize
660B
MD5cf8f7dd48d23ead3dadbc1251fbf45f2
SHA12ac3d3b0f7e9442ea85915f4035a675eab71e290
SHA2564719b2a5208b7023c989329a8f8d02fbb4b111187b50ffffe3475b8ae8edd555
SHA512074376f361fcfb8680d744ac0fea8327eec2ffc5033bf6d2d2ba2254b8991125363976e9c61b04e246152e8199d23d4770952a873d610dac0591b721af762807
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65