Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2024, 07:38
Static task
static1
Behavioral task
behavioral1
Sample
9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe
-
Size
62KB
-
MD5
9a1c7c843c37b88717ee639df5164115
-
SHA1
50016c9c1a0827e5dac4918d8f979b78cc91df48
-
SHA256
0abe6844d2a514d040d7a7bccb8fe272042dc8229119f6860a7460f6bf29cbd8
-
SHA512
929b23489970058aa9cdf9c0a40c2ed723f572d8b2f9d04ff55d2cc505f69f08dc94b88cc87992253ca8be0e560d159e29ca8e0355b8d25e23483b1fb618037c
-
SSDEEP
1536:LnJdFerhX2T7sOyZsVhkMGnifkWhVMU7wwvm:LnJIhXyYOMsVmiNX
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\mslsrv32.exe" 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2348 mslsrv32.exe 1176 mslsrv32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\mslsrv32.exe" 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2124 set thread context of 4676 2124 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 82 PID 2348 set thread context of 1176 2348 mslsrv32.exe 84 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\logfile32.txt mslsrv32.exe File created C:\Windows\mslsrv32.exe 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe File opened for modification C:\Windows\mslsrv32.exe 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mslsrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mslsrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4676 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 4676 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 4676 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 4676 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2124 wrote to memory of 4676 2124 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 82 PID 2124 wrote to memory of 4676 2124 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 82 PID 2124 wrote to memory of 4676 2124 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 82 PID 2124 wrote to memory of 4676 2124 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 82 PID 2124 wrote to memory of 4676 2124 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 82 PID 2124 wrote to memory of 4676 2124 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 82 PID 2124 wrote to memory of 4676 2124 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 82 PID 2124 wrote to memory of 4676 2124 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 82 PID 4676 wrote to memory of 2348 4676 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 83 PID 4676 wrote to memory of 2348 4676 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 83 PID 4676 wrote to memory of 2348 4676 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 83 PID 2348 wrote to memory of 1176 2348 mslsrv32.exe 84 PID 2348 wrote to memory of 1176 2348 mslsrv32.exe 84 PID 2348 wrote to memory of 1176 2348 mslsrv32.exe 84 PID 2348 wrote to memory of 1176 2348 mslsrv32.exe 84 PID 2348 wrote to memory of 1176 2348 mslsrv32.exe 84 PID 2348 wrote to memory of 1176 2348 mslsrv32.exe 84 PID 2348 wrote to memory of 1176 2348 mslsrv32.exe 84 PID 2348 wrote to memory of 1176 2348 mslsrv32.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\mslsrv32.exe"C:\Windows\mslsrv32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\mslsrv32.exe"C:\Windows\mslsrv32.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1176
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD59a1c7c843c37b88717ee639df5164115
SHA150016c9c1a0827e5dac4918d8f979b78cc91df48
SHA2560abe6844d2a514d040d7a7bccb8fe272042dc8229119f6860a7460f6bf29cbd8
SHA512929b23489970058aa9cdf9c0a40c2ed723f572d8b2f9d04ff55d2cc505f69f08dc94b88cc87992253ca8be0e560d159e29ca8e0355b8d25e23483b1fb618037c