Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2024, 14:07
Static task
static1
Behavioral task
behavioral1
Sample
79fbaeb0179ede82ef64517bb767cb22_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
79fbaeb0179ede82ef64517bb767cb22_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
79fbaeb0179ede82ef64517bb767cb22_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
79fbaeb0179ede82ef64517bb767cb22
-
SHA1
4d7f8d7c5e7e068d12fd7825331fae47523a5669
-
SHA256
9464744616b18af752a573ee701b6cb66b5f6a9b4283c0979eafb9eed700ea9e
-
SHA512
32ec095bed57e0ae2f3b5a972894474ccf309f525420a19fba8cc5d80ffe0e855acf06909f9ff61423a930dc288c96fe9d6b4b3fd17e830a0bda621e8190a066
-
SSDEEP
12288:F2n8iaYegKbzRUM7iXmuOL9t5CdPQIWdBtgM+unGyloYhe/7ey+KrSpZdFY1UaQt:FkdaeOJte0GNYheyy+KSpZdFY1Ud
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
resource yara_rule behavioral2/files/0x000d000000023b6a-5.dat dcrat behavioral2/memory/1100-8-0x0000000000630000-0x00000000006FE000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation WinNetCommonFiles.exe -
Executes dropped EXE 2 IoCs
pid Process 1100 WinNetCommonFiles.exe 3688 sppsvc.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\System32\winsrvext\WaaSMedicAgent.exe WinNetCommonFiles.exe File created C:\Windows\System32\winsrvext\c82b8037eab33d1fe33ed5c436875fcafdbefbee WinNetCommonFiles.exe File created C:\Windows\System32\dxdiag\RuntimeBroker.exe WinNetCommonFiles.exe File created C:\Windows\System32\dxdiag\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d WinNetCommonFiles.exe File created C:\Windows\System32\CXHProvisioningServer\RuntimeBroker.exe WinNetCommonFiles.exe File created C:\Windows\System32\CXHProvisioningServer\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d WinNetCommonFiles.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\dotnet\host\fxr\8.0.2\spoolsv.exe WinNetCommonFiles.exe File created C:\Program Files\dotnet\host\fxr\8.0.2\f3b6ecef712a24f33798f5d2fb3790c3d9b894c4 WinNetCommonFiles.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\DtcInstall\121e5b5079f7c0e46d90f99b3864022518bbbda9 WinNetCommonFiles.exe File created C:\Windows\de-DE\sppsvc.exe WinNetCommonFiles.exe File opened for modification C:\Windows\de-DE\sppsvc.exe WinNetCommonFiles.exe File created C:\Windows\de-DE\0a1fd5f707cd16ea89afd3d6db52b2da58214a6c WinNetCommonFiles.exe File created C:\Windows\DtcInstall\sysmon.exe WinNetCommonFiles.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1064 schtasks.exe 1428 schtasks.exe 3916 schtasks.exe 4208 schtasks.exe 828 schtasks.exe 2384 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1100 WinNetCommonFiles.exe 1100 WinNetCommonFiles.exe 1100 WinNetCommonFiles.exe 3688 sppsvc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1100 WinNetCommonFiles.exe Token: SeDebugPrivilege 3688 sppsvc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4036 wrote to memory of 1100 4036 79fbaeb0179ede82ef64517bb767cb22_JaffaCakes118.exe 87 PID 4036 wrote to memory of 1100 4036 79fbaeb0179ede82ef64517bb767cb22_JaffaCakes118.exe 87 PID 1100 wrote to memory of 828 1100 WinNetCommonFiles.exe 92 PID 1100 wrote to memory of 828 1100 WinNetCommonFiles.exe 92 PID 1100 wrote to memory of 2384 1100 WinNetCommonFiles.exe 94 PID 1100 wrote to memory of 2384 1100 WinNetCommonFiles.exe 94 PID 1100 wrote to memory of 1064 1100 WinNetCommonFiles.exe 96 PID 1100 wrote to memory of 1064 1100 WinNetCommonFiles.exe 96 PID 1100 wrote to memory of 1428 1100 WinNetCommonFiles.exe 98 PID 1100 wrote to memory of 1428 1100 WinNetCommonFiles.exe 98 PID 1100 wrote to memory of 3916 1100 WinNetCommonFiles.exe 100 PID 1100 wrote to memory of 3916 1100 WinNetCommonFiles.exe 100 PID 1100 wrote to memory of 4208 1100 WinNetCommonFiles.exe 102 PID 1100 wrote to memory of 4208 1100 WinNetCommonFiles.exe 102 PID 1100 wrote to memory of 3688 1100 WinNetCommonFiles.exe 104 PID 1100 wrote to memory of 3688 1100 WinNetCommonFiles.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\79fbaeb0179ede82ef64517bb767cb22_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\79fbaeb0179ede82ef64517bb767cb22_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Roaming\WinNetCommonFiles\WinNetCommonFiles.exe"C:\Users\Admin\AppData\Roaming\WinNetCommonFiles\WinNetCommonFiles.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\de-DE\sppsvc.exe'" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:828
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "WaaSMedicAgent" /sc ONLOGON /tr "'C:\Windows\System32\winsrvext\WaaSMedicAgent.exe'" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2384
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\DtcInstall\sysmon.exe'" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1064
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\dxdiag\RuntimeBroker.exe'" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1428
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\dotnet\host\fxr\8.0.2\spoolsv.exe'" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3916
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\CXHProvisioningServer\RuntimeBroker.exe'" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4208
-
-
C:\Windows\de-DE\sppsvc.exe"C:\Windows\de-DE\sppsvc.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
801KB
MD544994de5c6182968cdeb022deeb25536
SHA10f347814c45c30dd76becbf3acc3381a3af8a972
SHA256f807a67ed9567fcd8003beb9c0e7064de1c0eff5c282ddc502084b3475db0e4a
SHA5120f883b85fef9f5fd32ad9f9eb7003afc44542ca3bf5e19f8836e32f6b69ed77821ba04fcba77dfad90b13827a5bad7d129f033190bd54d5cf23b454b2e402d08