Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
06/12/2024, 19:35
Static task
static1
Behavioral task
behavioral1
Sample
ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe
-
Size
714KB
-
MD5
ceaaeb1712019d430836876402e557e0
-
SHA1
2ab07d22fd77078e77aa3a635ad9d16f7b6a7fb1
-
SHA256
7ab006f651a322f3e0a931b4c996ab6a0376848fcf2b105aa60ad1f0509cf11e
-
SHA512
4923abc558f63f1c995592c08071fafbc7d6bdc9d45ad6ab1039bf929a5a4cb1396aaff1d334ecf8f27b1f6bdb313bf7f40996acb3bd6b2d86a9ca91d8bc7b4c
-
SSDEEP
12288:bE21sNQUTjzo7nFcC6V0Wu+vvg7yXru6O55IENgC2QUT0uDYyuXdNfkd9R4au:JsNnD6evI7yb7MIabC0uh4dJQe
Malware Config
Extracted
C:\ProgramData\ilimarf.html
http://43qzvceo6ondd6wt.onion.cab
http://43qzvceo6ondd6wt.tor2web.org
http://43qzvceo6ondd6wt.onion
Signatures
-
CTB-Locker
Ransomware family which uses Tor to hide its C2 communications.
-
Ctblocker family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\Geo\Nation amfztod.exe -
Executes dropped EXE 4 IoCs
pid Process 2508 amfztod.exe 2440 amfztod.exe 752 amfztod.exe 2152 amfztod.exe -
Loads dropped DLL 1 IoCs
pid Process 2508 amfztod.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat amfztod.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Documents\\!Decrypt-All-Files-dlsiyuc.bmp" Explorer.EXE -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2676 set thread context of 904 2676 ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe 30 PID 2508 set thread context of 2440 2508 amfztod.exe 33 PID 752 set thread context of 2152 752 amfztod.exe 39 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-dlsiyuc.txt svchost.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-dlsiyuc.bmp svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amfztod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amfztod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amfztod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amfztod.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1164 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main amfztod.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch amfztod.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" amfztod.exe -
Modifies data under HKEY_USERS 23 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{1afa8381-86e6-11ef-803d-f2bd923ec178} svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\ = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Full = "%SystemRoot%\\System32\\imageres.dll,-54" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{1afa8381-86e6-11ef-803d-f2bd923ec178}\NukeOnDelete = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\LastEnum = 30002c007b00390066006300630034003300360034002d0038003700310064002d0031003100650066002d0061003400630031002d003800300036006500360066003600650036003900360033007d00000030002c007b00310061006600610038003300380031002d0038003600650036002d0031003100650066002d0038003000330064002d006600320062006400390032003300650063003100370038007d0000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallpaperStyle = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{9fcc4364-871d-11ef-a4c1-806e6f6e6963} svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{9fcc4364-871d-11ef-a4c1-806e6f6e6963}\NukeOnDelete = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Empty = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{9fcc4364-871d-11ef-a4c1-806e6f6e6963}\MaxCapacity = "14116" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{1afa8381-86e6-11ef-803d-f2bd923ec178}\MaxCapacity = "2047" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\TileWallpaper = "0" svchost.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2676 ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe 904 ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe 2508 amfztod.exe 2440 amfztod.exe 2440 amfztod.exe 2440 amfztod.exe 2440 amfztod.exe 752 amfztod.exe 2152 amfztod.exe 2152 amfztod.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2440 amfztod.exe Token: SeDebugPrivilege 2440 amfztod.exe Token: SeShutdownPrivilege 1196 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2152 amfztod.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2152 amfztod.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2676 ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe 2676 ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe 2508 amfztod.exe 2508 amfztod.exe 752 amfztod.exe 752 amfztod.exe 2152 amfztod.exe 2152 amfztod.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1196 Explorer.EXE -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2676 wrote to memory of 904 2676 ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe 30 PID 2676 wrote to memory of 904 2676 ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe 30 PID 2676 wrote to memory of 904 2676 ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe 30 PID 2676 wrote to memory of 904 2676 ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe 30 PID 2676 wrote to memory of 904 2676 ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe 30 PID 2676 wrote to memory of 904 2676 ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe 30 PID 2676 wrote to memory of 904 2676 ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe 30 PID 2676 wrote to memory of 904 2676 ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe 30 PID 1800 wrote to memory of 2508 1800 taskeng.exe 32 PID 1800 wrote to memory of 2508 1800 taskeng.exe 32 PID 1800 wrote to memory of 2508 1800 taskeng.exe 32 PID 1800 wrote to memory of 2508 1800 taskeng.exe 32 PID 2508 wrote to memory of 2440 2508 amfztod.exe 33 PID 2508 wrote to memory of 2440 2508 amfztod.exe 33 PID 2508 wrote to memory of 2440 2508 amfztod.exe 33 PID 2508 wrote to memory of 2440 2508 amfztod.exe 33 PID 2508 wrote to memory of 2440 2508 amfztod.exe 33 PID 2508 wrote to memory of 2440 2508 amfztod.exe 33 PID 2508 wrote to memory of 2440 2508 amfztod.exe 33 PID 2508 wrote to memory of 2440 2508 amfztod.exe 33 PID 2440 wrote to memory of 596 2440 amfztod.exe 9 PID 596 wrote to memory of 1712 596 svchost.exe 34 PID 596 wrote to memory of 1712 596 svchost.exe 34 PID 596 wrote to memory of 1712 596 svchost.exe 34 PID 2440 wrote to memory of 1196 2440 amfztod.exe 21 PID 2440 wrote to memory of 1164 2440 amfztod.exe 36 PID 2440 wrote to memory of 1164 2440 amfztod.exe 36 PID 2440 wrote to memory of 1164 2440 amfztod.exe 36 PID 2440 wrote to memory of 1164 2440 amfztod.exe 36 PID 2440 wrote to memory of 752 2440 amfztod.exe 38 PID 2440 wrote to memory of 752 2440 amfztod.exe 38 PID 2440 wrote to memory of 752 2440 amfztod.exe 38 PID 2440 wrote to memory of 752 2440 amfztod.exe 38 PID 752 wrote to memory of 2152 752 amfztod.exe 39 PID 752 wrote to memory of 2152 752 amfztod.exe 39 PID 752 wrote to memory of 2152 752 amfztod.exe 39 PID 752 wrote to memory of 2152 752 amfztod.exe 39 PID 752 wrote to memory of 2152 752 amfztod.exe 39 PID 752 wrote to memory of 2152 752 amfztod.exe 39 PID 752 wrote to memory of 2152 752 amfztod.exe 39 PID 752 wrote to memory of 2152 752 amfztod.exe 39
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:1712
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\ceaaeb1712019d430836876402e557e0_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:904
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {63A5A893-28B7-4CBA-9BDE-D1F2AE14B191} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\amfztod.exeC:\Users\Admin\AppData\Local\Temp\amfztod.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\amfztod.exeC:\Users\Admin\AppData\Local\Temp\amfztod.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows all4⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:1164
-
-
C:\Users\Admin\AppData\Local\Temp\amfztod.exe"C:\Users\Admin\AppData\Local\Temp\amfztod.exe" -u4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\amfztod.exeC:\Users\Admin\AppData\Local\Temp\amfztod.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2152
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD5feac0cee6f7c07439b1d4876b352c09b
SHA1c3649267a091e950f0b7a944e8ff7125b29b8ee1
SHA2563bf5bcb945be36f8dee653a15039043e0a1407a4d17fbed5189ed30993494d05
SHA51221dba9f2a3cab758f726a8c382e5ff46fbaab8873a32ae79021b08df9e68654ebb65c0d5d2665f63bacbb1cb099528f9e033c71b34c949d16f7cf739f1fc6a2f
-
Filesize
654B
MD535d1a9457c9260b206905d0a6e75a9fe
SHA123d7e7f824adfb390504ceaa0e4304eea450dcf3
SHA256bb86774a8c0d2f85358a548971a5fd132ee42cab94cc045c82885f0be5db52c0
SHA512e9afd10a6a3d55d14015181846bc90caa51f8e0ce0d78e351a3de17213b4d30670102ca16dfdcbb3fe94fe7380f5d29cbe62033ee52fcad729a070c3eeb33b28
-
Filesize
63KB
MD52befab9fbbd712d6467806718946b886
SHA1dc38ea4ac208c1b49ac8539561279a26178e0b06
SHA2568e13f9fb46655601a634e8451dd59dcfbb9858c0894b9329e787b313f0298f4f
SHA5124ddcd79046a9a96df45c262d1376022f2ea12267550d1d8a4e53e5dcc975ecc57d2c11fa2e315232afda70a991af1de070fb64a191f235c7b2bef9776c33f074
-
Filesize
714KB
MD5ceaaeb1712019d430836876402e557e0
SHA12ab07d22fd77078e77aa3a635ad9d16f7b6a7fb1
SHA2567ab006f651a322f3e0a931b4c996ab6a0376848fcf2b105aa60ad1f0509cf11e
SHA5124923abc558f63f1c995592c08071fafbc7d6bdc9d45ad6ab1039bf929a5a4cb1396aaff1d334ecf8f27b1f6bdb313bf7f40996acb3bd6b2d86a9ca91d8bc7b4c
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88