Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/12/2024, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
ea460c4a2450ec14303121428373edde_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
ea460c4a2450ec14303121428373edde_JaffaCakes118.dll
-
Size
120KB
-
MD5
ea460c4a2450ec14303121428373edde
-
SHA1
47f567b5828584b50d312fcaf9361605359a187d
-
SHA256
58f1a7cc1e5eb288c17d9964c3022f43863cac9ccf4b7374aedc90884fdd5636
-
SHA512
29fbede23abd82210ec6fe15493d2141b1f614ea86debe2349e1a5584f55031e41677d51cd7810babaf58558816a2d33e5df5bba831d31f7aed4b17ce96cb1ff
-
SSDEEP
3072:5toYSkw47n4GxHN17PZLoWdcYvw+ExYfz5Sh:5tHn4wHNVVld8+E+z0h
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76b04c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76b04c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76951e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76951e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76951e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76b04c.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76951e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76b04c.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76951e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76951e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76951e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76b04c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76b04c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76b04c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76b04c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76951e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76951e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76951e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76b04c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76b04c.exe -
Executes dropped EXE 3 IoCs
pid Process 2152 f76951e.exe 2208 f7696d3.exe 2332 f76b04c.exe -
Loads dropped DLL 6 IoCs
pid Process 2192 rundll32.exe 2192 rundll32.exe 2192 rundll32.exe 2192 rundll32.exe 2192 rundll32.exe 2192 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76b04c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76951e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76951e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76b04c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76951e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76b04c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76b04c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76b04c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76951e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76951e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76951e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76951e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76b04c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76b04c.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76951e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76b04c.exe -
Enumerates connected drives 3 TTPs 17 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: f76951e.exe File opened (read-only) \??\I: f76951e.exe File opened (read-only) \??\J: f76951e.exe File opened (read-only) \??\R: f76951e.exe File opened (read-only) \??\T: f76951e.exe File opened (read-only) \??\E: f76951e.exe File opened (read-only) \??\E: f76b04c.exe File opened (read-only) \??\M: f76951e.exe File opened (read-only) \??\O: f76951e.exe File opened (read-only) \??\Q: f76951e.exe File opened (read-only) \??\G: f76b04c.exe File opened (read-only) \??\H: f76951e.exe File opened (read-only) \??\K: f76951e.exe File opened (read-only) \??\L: f76951e.exe File opened (read-only) \??\N: f76951e.exe File opened (read-only) \??\P: f76951e.exe File opened (read-only) \??\S: f76951e.exe -
resource yara_rule behavioral1/memory/2152-18-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2152-21-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2152-24-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2152-26-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2152-17-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2152-19-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2152-23-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2152-22-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2152-20-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2152-25-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2152-66-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2152-65-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2152-67-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2152-68-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2152-69-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2152-71-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2152-72-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2152-89-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2152-92-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2152-93-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2152-159-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2332-171-0x0000000000910000-0x00000000019CA000-memory.dmp upx behavioral1/memory/2332-211-0x0000000000910000-0x00000000019CA000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI f76951e.exe File created C:\Windows\f76e560 f76b04c.exe File created C:\Windows\f76957c f76951e.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76951e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76b04c.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2152 f76951e.exe 2152 f76951e.exe 2332 f76b04c.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2152 f76951e.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe Token: SeDebugPrivilege 2332 f76b04c.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2192 1804 rundll32.exe 30 PID 1804 wrote to memory of 2192 1804 rundll32.exe 30 PID 1804 wrote to memory of 2192 1804 rundll32.exe 30 PID 1804 wrote to memory of 2192 1804 rundll32.exe 30 PID 1804 wrote to memory of 2192 1804 rundll32.exe 30 PID 1804 wrote to memory of 2192 1804 rundll32.exe 30 PID 1804 wrote to memory of 2192 1804 rundll32.exe 30 PID 2192 wrote to memory of 2152 2192 rundll32.exe 31 PID 2192 wrote to memory of 2152 2192 rundll32.exe 31 PID 2192 wrote to memory of 2152 2192 rundll32.exe 31 PID 2192 wrote to memory of 2152 2192 rundll32.exe 31 PID 2152 wrote to memory of 1112 2152 f76951e.exe 19 PID 2152 wrote to memory of 1168 2152 f76951e.exe 20 PID 2152 wrote to memory of 1208 2152 f76951e.exe 21 PID 2152 wrote to memory of 1268 2152 f76951e.exe 23 PID 2152 wrote to memory of 1804 2152 f76951e.exe 29 PID 2152 wrote to memory of 2192 2152 f76951e.exe 30 PID 2152 wrote to memory of 2192 2152 f76951e.exe 30 PID 2192 wrote to memory of 2208 2192 rundll32.exe 32 PID 2192 wrote to memory of 2208 2192 rundll32.exe 32 PID 2192 wrote to memory of 2208 2192 rundll32.exe 32 PID 2192 wrote to memory of 2208 2192 rundll32.exe 32 PID 2192 wrote to memory of 2332 2192 rundll32.exe 33 PID 2192 wrote to memory of 2332 2192 rundll32.exe 33 PID 2192 wrote to memory of 2332 2192 rundll32.exe 33 PID 2192 wrote to memory of 2332 2192 rundll32.exe 33 PID 2152 wrote to memory of 1112 2152 f76951e.exe 19 PID 2152 wrote to memory of 1168 2152 f76951e.exe 20 PID 2152 wrote to memory of 1208 2152 f76951e.exe 21 PID 2152 wrote to memory of 1268 2152 f76951e.exe 23 PID 2152 wrote to memory of 2208 2152 f76951e.exe 32 PID 2152 wrote to memory of 2208 2152 f76951e.exe 32 PID 2152 wrote to memory of 2332 2152 f76951e.exe 33 PID 2152 wrote to memory of 2332 2152 f76951e.exe 33 PID 2332 wrote to memory of 1112 2332 f76b04c.exe 19 PID 2332 wrote to memory of 1168 2332 f76b04c.exe 20 PID 2332 wrote to memory of 1208 2332 f76b04c.exe 21 PID 2332 wrote to memory of 1268 2332 f76b04c.exe 23 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76951e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76b04c.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea460c4a2450ec14303121428373edde_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea460c4a2450ec14303121428373edde_JaffaCakes118.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\f76951e.exeC:\Users\Admin\AppData\Local\Temp\f76951e.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\f7696d3.exeC:\Users\Admin\AppData\Local\Temp\f7696d3.exe4⤵
- Executes dropped EXE
PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\f76b04c.exeC:\Users\Admin\AppData\Local\Temp\f76b04c.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2332
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1268
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD5e677627c2134ea7be4a2681a5ddfed32
SHA1c1bc045ff9685ff2568e79b798a4ff45e1b6867d
SHA2561c2c57bbb8dd8c45203790a25b7aabc00e4c4b06ab3c39ea388539b667103a92
SHA512d389114b15d34b5a232bc43c7e47b3e2dcbadee9aed487653342c13792e80a13902966c37c680a9601e4b5522fd82200edab57ab6e57dfd8383eba3a87d63fd4
-
Filesize
97KB
MD5d436dfd3b2a8ba38bebdc15d6f37b417
SHA1cdeb8266bca8392882db4414c3bedf63a927a199
SHA2560723591e06e3ed6ef199cdab378ea63dad26e2144ddf27b03a4073906a625219
SHA5125a20f0dacca85f6c4dfb9486e7fe81085015d37a195a8350bd598df6ae578f5e1fecd92a53cd6a3d96f19dad3b38adfc7935bb0b0db7eb65ec6894cfce1161ef