Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/12/2024, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
c56dc5ef9db2e5c9ffce880b86885635_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c56dc5ef9db2e5c9ffce880b86885635_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c56dc5ef9db2e5c9ffce880b86885635_JaffaCakes118.exe
-
Size
614KB
-
MD5
c56dc5ef9db2e5c9ffce880b86885635
-
SHA1
61c7583ca191c0dc69a99d95f403c7071d10981c
-
SHA256
9f4f13431118ce4c4cbf0449526b4fdd2508dade1c3e89a2c4f71c3dbede3989
-
SHA512
66c2f77ca2761134bf5a592076b28d46dbba23f047a596f74cd5f44a6cb64821aaa3748a60fae2258efbc679751f5e4b42de8971cf1e0aedfc916f465bd9aa73
-
SSDEEP
12288:9BpbqB/sZL24qFPESlQ/YSb5y4j3CiikgwKkkANPgK0CxYPIrLowcPBtUfu/X2LU:9BpG/sx24quSl4Vb5XjSiDgRXANPgK3n
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
10.10.100.55:4444
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Loads dropped DLL 1 IoCs
pid Process 2124 wscript.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c56dc5ef9db2e5c9ffce880b86885635_JaffaCakes118.exe -
Modifies registry class 27 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Wow6432Node\CLSID wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\DynamicWrapper\ wscript.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\DynamicWrapper\CLSID wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Wow6432Node\Interface\{202774D1-D479-11D1-ACD1-00A024BBB05E}\ProxyStubClsid = "{00020420-0000-0000-C000-000000000046}" wscript.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Wow6432Node\Interface\{202774D1-D479-11D1-ACD1-00A024BBB05E}\TypeLib wscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\TypeLib\{3DB30B50-06B1-4F5E-9412-7CE5579094AC}\1.0\FLAGS = "0" wscript.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Wow6432Node\CLSID\{202774D1-D479-11D1-ACD1-00A024BBB05E} wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\DynamicWrapper\CLSID\ = "{202774D1-D479-11D1-ACD1-00A024BBB05E}" wscript.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Wow6432Node\Interface\{202774D1-D479-11D1-ACD1-00A024BBB05E} wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Wow6432Node\Interface\{202774D1-D479-11D1-ACD1-00A024BBB05E}\TypeLib\Version = "1.0" wscript.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\TypeLib\{3DB30B50-06B1-4F5E-9412-7CE5579094AC}\\1.0 wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Wow6432Node\Interface\{202774D1-D479-11D1-ACD1-00A024BBB05E} = "CDynamicWrapper" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Wow6432Node\Interface\{202774D1-D479-11D1-ACD1-00A024BBB05E}\ProxyStubClsid32 = "{00020420-0000-0000-C000-000000000046}" wscript.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\TypeLib\{3DB30B50-06B1-4F5E-9412-7CE5579094AC} wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\TypeLib\{3DB30B50-06B1-4F5E-9412-7CE5579094AC}\1.0\0\win32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DynaWrap.dll" wscript.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Wow6432Node wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Wow6432Node\Interface\{202774D1-D479-11D1-ACD1-00A024BBB05E}\TypeLib = "{3DB30B50-06B1-4F5E-9412-7CE5579094AC}" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Wow6432Node\CLSID\{202774D1-D479-11D1-ACD1-00A024BBB05E}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DynaWrap.dll" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\TypeLib\{3DB30B50-06B1-4F5E-9412-7CE5579094AC}\1.0 = "DynaWrap" wscript.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\TypeLib\{3DB30B50-06B1-4F5E-9412-7CE5579094AC}\\1.0\\0 wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Wow6432Node\CLSID\{202774D1-D479-11D1-ACD1-00A024BBB05E}\ wscript.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Wow6432Node\CLSID\{202774D1-D479-11D1-ACD1-00A024BBB05E}\InProcServer32 wscript.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\TypeLib wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\TypeLib\{3DB30B50-06B1-4F5E-9412-7CE5579094AC} wscript.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\DynamicWrapper wscript.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Wow6432Node\Interface wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\TypeLib\{3DB30B50-06B1-4F5E-9412-7CE5579094AC}\1.0\0 wscript.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2124 1672 c56dc5ef9db2e5c9ffce880b86885635_JaffaCakes118.exe 28 PID 1672 wrote to memory of 2124 1672 c56dc5ef9db2e5c9ffce880b86885635_JaffaCakes118.exe 28 PID 1672 wrote to memory of 2124 1672 c56dc5ef9db2e5c9ffce880b86885635_JaffaCakes118.exe 28 PID 1672 wrote to memory of 2124 1672 c56dc5ef9db2e5c9ffce880b86885635_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c56dc5ef9db2e5c9ffce880b86885635_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c56dc5ef9db2e5c9ffce880b86885635_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\revshell.vbs"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
509KB
MD51c7cc32cc58fdc887b77cfee6f53e9f6
SHA1e393ba48b94bc2493ae56523399e4f106faddc60
SHA2567ed6e33e50efce8f8458ee672912961d5af21b5f24406f7129c752d36834d15b
SHA5127468c90b63dbd5c6047db7d985332471c64c1252fdc997cc8bbe7426bd28e1927bb13c7b52ca3d65bf34ccda5ab99516b870fafd70c3a81e3d8a0590c7e3273e
-
Filesize
15KB
MD50a9542085c0b6f8fff20fdff8c813117
SHA12db1ff2de9457163fb1a3b00293780a9775b2cb4
SHA2566455942d67b95cefac77daf290a5ab690582637148d00e1381a51b6bf152a931
SHA512f4373e382e26c81ba6773ec57d51059edf7822efc6a3610f94f5e0ab0b71e07d5bd27f51711202648d8faff47697e4b4a4b68e16d5be1ca287bb974bdd8f9e23