Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
97s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23/12/2024, 18:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067.exe
-
Size
859KB
-
MD5
51b22f5b5b42e1dfa1e5a9f1609b2b87
-
SHA1
8a3c99b065200eac460470fbd68b5950bac450cf
-
SHA256
89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067
-
SHA512
7e7817d5953f3046566695126dad0cb6d82503341004103c10620834d9146af9e052af1f084a7db1ad1e8870098d80325fb168d92d7cf85b74968343203daefa
-
SSDEEP
12288:IlYnvRUWLJ4rPZerZTvpxUm1EPfACfiR3+Er1+1uaXAcbRNT3cYHiS+/i:IcRTl9DpxUmqmvPaQcdNTsLS+/
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 1768 JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067Srv.exe 2888 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 568 JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067.exe 1768 JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067Srv.exe -
resource yara_rule behavioral1/files/0x000b00000001225e-1.dat upx behavioral1/memory/1768-6-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1768-10-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1768-9-0x0000000000230000-0x000000000023F000-memory.dmp upx behavioral1/memory/2888-22-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2888-21-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2888-19-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px6059.tmp JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9EA51321-C158-11EF-9DBD-525C7857EE89} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441139080" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2888 DesktopLayer.exe 2888 DesktopLayer.exe 2888 DesktopLayer.exe 2888 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 568 wrote to memory of 1768 568 JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067.exe 30 PID 568 wrote to memory of 1768 568 JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067.exe 30 PID 568 wrote to memory of 1768 568 JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067.exe 30 PID 568 wrote to memory of 1768 568 JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067.exe 30 PID 1768 wrote to memory of 2888 1768 JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067Srv.exe 31 PID 1768 wrote to memory of 2888 1768 JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067Srv.exe 31 PID 1768 wrote to memory of 2888 1768 JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067Srv.exe 31 PID 1768 wrote to memory of 2888 1768 JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067Srv.exe 31 PID 2888 wrote to memory of 2052 2888 DesktopLayer.exe 32 PID 2888 wrote to memory of 2052 2888 DesktopLayer.exe 32 PID 2888 wrote to memory of 2052 2888 DesktopLayer.exe 32 PID 2888 wrote to memory of 2052 2888 DesktopLayer.exe 32 PID 2052 wrote to memory of 2744 2052 iexplore.exe 33 PID 2052 wrote to memory of 2744 2052 iexplore.exe 33 PID 2052 wrote to memory of 2744 2052 iexplore.exe 33 PID 2052 wrote to memory of 2744 2052 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067Srv.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067Srv.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ae415c7ebffb4720b562016bc9fa063
SHA1a8bd6eb42bf428af20c071ab436304154b71fe44
SHA25660eebbbb9a43b8662a1ea36debac4bfeff64379fe4d981f21a6c2cb00bc3f3bc
SHA512cb36e799dadb77e3b40daea93f496ed2dd45004db0bb75e4e4247d4dbf779892ace6fef5f968f87cf4b4c302040710ab7db778c9949070c3c623e8dc813e50a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9dbea63f1a856ab90c8a231f9f6b91b
SHA13216d621e586d28c710afc7cfe7ee800140e2095
SHA2560a12b43c6862155694fb093c4509683c7c134a0e5276df431aff240592b03ca1
SHA512c174f1695fb3a27d9f473c99b11adaaddf385205bb32ae136f0c5cd58edb5f3ebf134a3a6599f430c6b2ebaefe3aca00037c2b31769cfc72075def519b1a1b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f573d18f679b3d45e2c17a91766ae452
SHA1dc88916eb605267990afe16d96209a46b66465ff
SHA256f298a5b3f1a474bdb8fbbe39d3fbf52dc739f5be1ebac463c2b64c08eeba70b9
SHA512ded51b24b0df6d80acc203975f5ec66f01c852bba21edb32be205e27968798fb9fa4f21490d321d6a3c5feff10954e89f44dd3baa5af799ac88c8a74f8dedfaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0276bcbfc8a1f1d607a107103e99c73
SHA114a09cca2738daed9679904213593d4902c8f56d
SHA256777166c6528866c5efcd97fa214d69675cb154ce7afed06df05fa97b1b012198
SHA5123a2c1d4a1b6ea3ea026e152083f01c43e7e4021f32fead61aac1ad3ecd6cfbb81dc510616a6922ddc1cfed3cd4f3e7eb2aeeaae3162b975a3d5cb58353fb9941
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
\Users\Admin\AppData\Local\Temp\JaffaCakes118_89267a5e99da92c3241c300a79db06059f0910e0031fe98140d6be3086c00067Srv.exe
Filesize55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a