Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/11/2024, 11:40
Static task
static1
Behavioral task
behavioral1
Sample
8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe
-
Size
534KB
-
MD5
8541c3e5a2fea353fab1657575993319
-
SHA1
95383648af291e339dfa628a3950686e822e93d5
-
SHA256
4897564a8c3fd201eb272b044f8c17a2518e6cc10fa6d1bbff806b4f012805ec
-
SHA512
0ce82bf2397186e93d1f5f0f66576536dd66462d940b781a8e0f0e52041d3d3ca604dbfd15a3c4ee196780ecf23d9145edb997d9927a9f2261aaecb305ab7fe4
-
SSDEEP
12288:8urQ2eY45lYMxuqLOjy9lmbCKyBXUe7S/kVpprgPs:nGlY8xheO/ke7SaR
Malware Config
Extracted
gozi
-
build
215798
Signatures
-
Gozi family
-
Executes dropped EXE 2 IoCs
pid Process 2516 cewmnect.exe 2932 cewmnect.exe -
Loads dropped DLL 2 IoCs
pid Process 2640 cmd.exe 2640 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\desksenh = "C:\\Users\\Admin\\AppData\\Roaming\\difxuser\\cewmnect.exe" 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2336 set thread context of 2688 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 34 PID 2516 set thread context of 2932 2516 cewmnect.exe 39 PID 2932 set thread context of 276 2932 cewmnect.exe 40 PID 276 set thread context of 1128 276 svchost.exe 20 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cewmnect.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cewmnect.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2932 cewmnect.exe 1128 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2932 cewmnect.exe 276 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1128 Explorer.EXE -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2392 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 31 PID 2336 wrote to memory of 2392 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 31 PID 2336 wrote to memory of 2392 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 31 PID 2336 wrote to memory of 2392 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 31 PID 2336 wrote to memory of 2220 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 32 PID 2336 wrote to memory of 2220 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 32 PID 2336 wrote to memory of 2220 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 32 PID 2336 wrote to memory of 2220 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 32 PID 2336 wrote to memory of 2788 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 33 PID 2336 wrote to memory of 2788 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 33 PID 2336 wrote to memory of 2788 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 33 PID 2336 wrote to memory of 2788 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 33 PID 2336 wrote to memory of 2688 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 34 PID 2336 wrote to memory of 2688 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 34 PID 2336 wrote to memory of 2688 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 34 PID 2336 wrote to memory of 2688 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 34 PID 2336 wrote to memory of 2688 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 34 PID 2336 wrote to memory of 2688 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 34 PID 2336 wrote to memory of 2688 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 34 PID 2336 wrote to memory of 2688 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 34 PID 2336 wrote to memory of 2688 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 34 PID 2336 wrote to memory of 2688 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 34 PID 2336 wrote to memory of 2688 2336 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 34 PID 2688 wrote to memory of 2612 2688 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 35 PID 2688 wrote to memory of 2612 2688 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 35 PID 2688 wrote to memory of 2612 2688 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 35 PID 2688 wrote to memory of 2612 2688 8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe 35 PID 2612 wrote to memory of 2640 2612 cmd.exe 37 PID 2612 wrote to memory of 2640 2612 cmd.exe 37 PID 2612 wrote to memory of 2640 2612 cmd.exe 37 PID 2612 wrote to memory of 2640 2612 cmd.exe 37 PID 2640 wrote to memory of 2516 2640 cmd.exe 38 PID 2640 wrote to memory of 2516 2640 cmd.exe 38 PID 2640 wrote to memory of 2516 2640 cmd.exe 38 PID 2640 wrote to memory of 2516 2640 cmd.exe 38 PID 2516 wrote to memory of 2932 2516 cewmnect.exe 39 PID 2516 wrote to memory of 2932 2516 cewmnect.exe 39 PID 2516 wrote to memory of 2932 2516 cewmnect.exe 39 PID 2516 wrote to memory of 2932 2516 cewmnect.exe 39 PID 2516 wrote to memory of 2932 2516 cewmnect.exe 39 PID 2516 wrote to memory of 2932 2516 cewmnect.exe 39 PID 2516 wrote to memory of 2932 2516 cewmnect.exe 39 PID 2516 wrote to memory of 2932 2516 cewmnect.exe 39 PID 2516 wrote to memory of 2932 2516 cewmnect.exe 39 PID 2516 wrote to memory of 2932 2516 cewmnect.exe 39 PID 2516 wrote to memory of 2932 2516 cewmnect.exe 39 PID 2932 wrote to memory of 276 2932 cewmnect.exe 40 PID 2932 wrote to memory of 276 2932 cewmnect.exe 40 PID 2932 wrote to memory of 276 2932 cewmnect.exe 40 PID 2932 wrote to memory of 276 2932 cewmnect.exe 40 PID 2932 wrote to memory of 276 2932 cewmnect.exe 40 PID 2932 wrote to memory of 276 2932 cewmnect.exe 40 PID 2932 wrote to memory of 276 2932 cewmnect.exe 40 PID 276 wrote to memory of 1128 276 svchost.exe 20 PID 276 wrote to memory of 1128 276 svchost.exe 20 PID 276 wrote to memory of 1128 276 svchost.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe"3⤵PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe"3⤵PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe"3⤵PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8541c3e5a2fea353fab1657575993319_JaffaCakes118.exe"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2EEE\1777.bat" "C:\Users\Admin\AppData\Roaming\difxuser\cewmnect.exe" "C:\Users\Admin\AppData\Local\Temp\8541C3~1.EXE""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\difxuser\cewmnect.exe" "C:\Users\Admin\AppData\Local\Temp\8541C3~1.EXE""5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Roaming\difxuser\cewmnect.exe"C:\Users\Admin\AppData\Roaming\difxuser\cewmnect.exe" "C:\Users\Admin\AppData\Local\Temp\8541C3~1.EXE"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Roaming\difxuser\cewmnect.exe"C:\Users\Admin\AppData\Roaming\difxuser\cewmnect.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:276
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD5c3ff02d413ce054514545f1b677b5986
SHA1c5a4da66710a1dee7a63723eca81ded600f8ea5a
SHA256051ceddc23cf31100f43d1a9db14d18c891f31c266f88a89b0d37c24217fa4e5
SHA51223115d9ef25ccfb1b38a4d5ae9ef39ac563e2cb8b437044a4c8f5c521120dcaf2dcc2977c457b52a89b4ad250117f668c6a808bdbdd1fb9ff5cb463fea17f436
-
Filesize
534KB
MD58541c3e5a2fea353fab1657575993319
SHA195383648af291e339dfa628a3950686e822e93d5
SHA2564897564a8c3fd201eb272b044f8c17a2518e6cc10fa6d1bbff806b4f012805ec
SHA5120ce82bf2397186e93d1f5f0f66576536dd66462d940b781a8e0f0e52041d3d3ca604dbfd15a3c4ee196780ecf23d9145edb997d9927a9f2261aaecb305ab7fe4