Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/12/2024, 16:46 UTC

General

  • Target

    e7549ec8fa1ba0ba769e8cfe14d34790_JaffaCakes118.exe

  • Size

    142KB

  • MD5

    e7549ec8fa1ba0ba769e8cfe14d34790

  • SHA1

    8e1130a36a9f26256fd2e0e6be67d5bc980aee66

  • SHA256

    d0215d9f04581b0d6329d70ee1d501d2fa2360a9f274da0a22eca611fb882ad1

  • SHA512

    31021a284312716323579b4de6dc27c76c9c55bdb620b490c1a1defe5360684b864ee5a65f1d299df6af2ba45005072e695b745a7896625738743a92caa7cd28

  • SSDEEP

    3072:NT0/l0C5cSH6fMUAxeIE3EyMd8Z6OpA/RCpMxil+xI:NBCuRfMQFMd7gAgp0iMxI

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 32 IoCs
  • Loads dropped DLL 64 IoCs
  • Maps connected drives based on registry 3 TTPs 34 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 49 IoCs
  • Suspicious use of SetThreadContext 17 IoCs
  • UPX packed file 45 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 33 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7549ec8fa1ba0ba769e8cfe14d34790_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e7549ec8fa1ba0ba769e8cfe14d34790_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\e7549ec8fa1ba0ba769e8cfe14d34790_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\e7549ec8fa1ba0ba769e8cfe14d34790_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Maps connected drives based on registry
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Windows\SysWOW64\wmpdtn32.exe
        "C:\Windows\system32\wmpdtn32.exe" C:\Users\Admin\AppData\Local\Temp\E7549E~1.EXE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2384
        • C:\Windows\SysWOW64\wmpdtn32.exe
          "C:\Windows\system32\wmpdtn32.exe" C:\Users\Admin\AppData\Local\Temp\E7549E~1.EXE
          4⤵
          • Deletes itself
          • Executes dropped EXE
          • Loads dropped DLL
          • Maps connected drives based on registry
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2716
          • C:\Windows\SysWOW64\wmpdtn32.exe
            "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2732
            • C:\Windows\SysWOW64\wmpdtn32.exe
              "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Maps connected drives based on registry
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2600
              • C:\Windows\SysWOW64\wmpdtn32.exe
                "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2656
                • C:\Windows\SysWOW64\wmpdtn32.exe
                  "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Maps connected drives based on registry
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:2668
                  • C:\Windows\SysWOW64\wmpdtn32.exe
                    "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:1920
                    • C:\Windows\SysWOW64\wmpdtn32.exe
                      "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Maps connected drives based on registry
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of WriteProcessMemory
                      PID:1372
                      • C:\Windows\SysWOW64\wmpdtn32.exe
                        "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                        11⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of WriteProcessMemory
                        PID:2872
                        • C:\Windows\SysWOW64\wmpdtn32.exe
                          "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                          12⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Maps connected drives based on registry
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of WriteProcessMemory
                          PID:268
                          • C:\Windows\SysWOW64\wmpdtn32.exe
                            "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                            13⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:2468
                            • C:\Windows\SysWOW64\wmpdtn32.exe
                              "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                              14⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Maps connected drives based on registry
                              • Drops file in System32 directory
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2460
                              • C:\Windows\SysWOW64\wmpdtn32.exe
                                "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                                15⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                PID:888
                                • C:\Windows\SysWOW64\wmpdtn32.exe
                                  "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Maps connected drives based on registry
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:2240
                                  • C:\Windows\SysWOW64\wmpdtn32.exe
                                    "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetThreadContext
                                    • System Location Discovery: System Language Discovery
                                    PID:568
                                    • C:\Windows\SysWOW64\wmpdtn32.exe
                                      "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Maps connected drives based on registry
                                      • Drops file in System32 directory
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2060
                                      • C:\Windows\SysWOW64\wmpdtn32.exe
                                        "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of SetThreadContext
                                        • System Location Discovery: System Language Discovery
                                        PID:2252
                                        • C:\Windows\SysWOW64\wmpdtn32.exe
                                          "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Maps connected drives based on registry
                                          • Drops file in System32 directory
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:2256
                                          • C:\Windows\SysWOW64\wmpdtn32.exe
                                            "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetThreadContext
                                            • System Location Discovery: System Language Discovery
                                            PID:2840
                                            • C:\Windows\SysWOW64\wmpdtn32.exe
                                              "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Maps connected drives based on registry
                                              • Drops file in System32 directory
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:2808
                                              • C:\Windows\SysWOW64\wmpdtn32.exe
                                                "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                                                23⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetThreadContext
                                                • System Location Discovery: System Language Discovery
                                                PID:2904
                                                • C:\Windows\SysWOW64\wmpdtn32.exe
                                                  "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Maps connected drives based on registry
                                                  • Drops file in System32 directory
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:1908
                                                  • C:\Windows\SysWOW64\wmpdtn32.exe
                                                    "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                                                    25⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Suspicious use of SetThreadContext
                                                    • System Location Discovery: System Language Discovery
                                                    PID:288
                                                    • C:\Windows\SysWOW64\wmpdtn32.exe
                                                      "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                                                      26⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Maps connected drives based on registry
                                                      • Drops file in System32 directory
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:2952
                                                      • C:\Windows\SysWOW64\wmpdtn32.exe
                                                        "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                                                        27⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of SetThreadContext
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2464
                                                        • C:\Windows\SysWOW64\wmpdtn32.exe
                                                          "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Maps connected drives based on registry
                                                          • Drops file in System32 directory
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:2880
                                                          • C:\Windows\SysWOW64\wmpdtn32.exe
                                                            "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Suspicious use of SetThreadContext
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1996
                                                            • C:\Windows\SysWOW64\wmpdtn32.exe
                                                              "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                                                              30⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Maps connected drives based on registry
                                                              • Drops file in System32 directory
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:2972
                                                              • C:\Windows\SysWOW64\wmpdtn32.exe
                                                                "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                • Suspicious use of SetThreadContext
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2268
                                                                • C:\Windows\SysWOW64\wmpdtn32.exe
                                                                  "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  • Maps connected drives based on registry
                                                                  • Drops file in System32 directory
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:872
                                                                  • C:\Windows\SysWOW64\wmpdtn32.exe
                                                                    "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    • Suspicious use of SetThreadContext
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:1932
                                                                    • C:\Windows\SysWOW64\wmpdtn32.exe
                                                                      "C:\Windows\system32\wmpdtn32.exe" C:\Windows\SysWOW64\wmpdtn32.exe
                                                                      34⤵
                                                                      • Executes dropped EXE
                                                                      • Maps connected drives based on registry
                                                                      • Drops file in System32 directory
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:1508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\wmpdtn32.exe

    Filesize

    142KB

    MD5

    e7549ec8fa1ba0ba769e8cfe14d34790

    SHA1

    8e1130a36a9f26256fd2e0e6be67d5bc980aee66

    SHA256

    d0215d9f04581b0d6329d70ee1d501d2fa2360a9f274da0a22eca611fb882ad1

    SHA512

    31021a284312716323579b4de6dc27c76c9c55bdb620b490c1a1defe5360684b864ee5a65f1d299df6af2ba45005072e695b745a7896625738743a92caa7cd28

  • memory/268-114-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/268-112-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/268-121-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/872-274-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1372-93-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1372-95-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1372-94-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1372-101-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1908-221-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1908-224-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2060-179-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2060-172-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2152-3-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2152-0-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2152-8-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2152-2-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2152-22-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2152-4-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2152-7-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2152-9-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2152-6-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2240-159-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2240-153-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2256-192-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2256-198-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2460-134-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2460-140-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2600-63-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2600-57-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2668-82-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2668-75-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2668-74-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2668-76-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2716-33-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2716-41-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2716-44-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2716-34-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2716-35-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2716-36-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2808-208-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2808-211-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2880-245-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2880-250-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2952-232-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2952-237-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2972-262-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.