Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    95s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2024, 03:28

General

  • Target

    JaffaCakes118_029fde9403ed6a8445e674646c4104c0.exe

  • Size

    231KB

  • MD5

    029fde9403ed6a8445e674646c4104c0

  • SHA1

    2a6a3c327b11d30e00dbef3370275cf4fc60586f

  • SHA256

    c351b4878a034ce7d31673ceeab281922585b1b26a9f520c2cf69f5f900d87a0

  • SHA512

    48141c1c4b25e2a49a5e3ab0b6ee00cc038233c99c38634adde5169b67e3f44d88247eb6b54a2fa7a5af7144b3045de40626fa5a92724381435aad4262dec95e

  • SSDEEP

    6144:Z+2YqOYG9j0CUEI2hd5twlULasDns6uYozF5OwVkS6E:kJEWj5Fhd5sUesDns6BAee

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Signatures

  • Modifies firewall policy service 3 TTPs 6 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • Sality family
  • UAC bypass 3 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 12 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables Task Manager via registry modification
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Windows security modification 2 TTPs 14 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\fontdrvhost.exe
    "fontdrvhost.exe"
    1⤵
      PID:792
    • C:\Windows\system32\fontdrvhost.exe
      "fontdrvhost.exe"
      1⤵
        PID:796
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        1⤵
          PID:316
        • C:\Windows\system32\sihost.exe
          sihost.exe
          1⤵
            PID:2652
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
            1⤵
              PID:2664
            • C:\Windows\system32\taskhostw.exe
              taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
              1⤵
                PID:2912
              • C:\Windows\Explorer.EXE
                C:\Windows\Explorer.EXE
                1⤵
                  PID:3424
                  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_029fde9403ed6a8445e674646c4104c0.exe
                    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_029fde9403ed6a8445e674646c4104c0.exe"
                    2⤵
                    • Modifies firewall policy service
                    • UAC bypass
                    • Windows security bypass
                    • Disables RegEdit via registry modification
                    • Windows security modification
                    • Checks whether UAC is enabled
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    • System policy modification
                    PID:2368
                    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
                      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
                      3⤵
                      • Modifies firewall policy service
                      • UAC bypass
                      • Windows security bypass
                      • Disables RegEdit via registry modification
                      • Deletes itself
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Windows security modification
                      • Checks whether UAC is enabled
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of WriteProcessMemory
                      • System policy modification
                      PID:3480
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                  1⤵
                    PID:3548
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                    1⤵
                      PID:3732
                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                      1⤵
                        PID:3824
                      • C:\Windows\System32\RuntimeBroker.exe
                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                        1⤵
                          PID:3896
                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                          1⤵
                            PID:3984
                          • C:\Windows\System32\RuntimeBroker.exe
                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                            1⤵
                              PID:3864
                            • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
                              "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca
                              1⤵
                                PID:4092
                              • C:\Windows\System32\RuntimeBroker.exe
                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                1⤵
                                  PID:3144

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Temp\0E57BD26_Rar\Au_.exe

                                  Filesize

                                  163KB

                                  MD5

                                  07599bc344a4c7bbcedc75a69334b187

                                  SHA1

                                  7ab3af63e151332c1804b7879f02938fec7ffb9f

                                  SHA256

                                  3865670396bbc0576ef72eb26833dd02d6843a72a405c56bdb5b9baad1d948a3

                                  SHA512

                                  0e51aa376d5cea54659b395495329fd8de8a84ad5483cffb7680e57edd4f9ca6db4728d76839fae878e212495a95d150c90dd3abbee25017d8eb6de9141b3ade

                                • C:\Users\Admin\AppData\Local\Temp\nsrBD46.tmp\NSISGameExplorerPlugin.dll

                                  Filesize

                                  100KB

                                  MD5

                                  0c2020b9cebdefe01d1ab1bf079ead52

                                  SHA1

                                  17bdbefce3f24c7b8817bb0499ef407f4bf0df2d

                                  SHA256

                                  32fa6bae573848b5123734672039e808c9ce93e781f01e619b959c6c4e8fde72

                                  SHA512

                                  fea74de5eca2d90fe6b35d3ad40ad2b7527448a5cd9f75eb2d549d4aa5e8cbb410a3d9a3b1f3a861689c5f45b949c87090f0349ad57f5918dd1b27e7b26b61fc

                                • C:\Users\Admin\AppData\Local\Temp\nsrBD46.tmp\System.dll

                                  Filesize

                                  9KB

                                  MD5

                                  0e4c4e4eb158e3f250ca9161156e74a5

                                  SHA1

                                  78d055856312c2b9f313877f7f72ca936554095a

                                  SHA256

                                  60e6e287828dd882447a79018b505bb3be67b0f04fc8e022a57442e249588ed1

                                  SHA512

                                  eba47ef4d16532df26f50e42bb5650733844ffc94b6f0e9037c2a2854326e9bcf1d6c967f541a655a91452c9357eb4ba1aedf85a2757a560ad4527a8f6b63ebc

                                • C:\Users\Admin\AppData\Local\Temp\nsrBD46.tmp\UserInfo.dll

                                  Filesize

                                  3KB

                                  MD5

                                  1923c3ce705616293c721d5dfc46b7a3

                                  SHA1

                                  beec6bba81cc80e100243e6b26554e0c585f7734

                                  SHA256

                                  921d31307a7e93270caa35093893b1799b055ffde2db3298fb9aa495ede7f9a2

                                  SHA512

                                  b8d584db8fac7a8395e3e5e1fdf12c4d3e5d1bdd78ac00e7467b5c4d279c670834211076ada391b6f11fb833fc8b54f2b3b24d9ecd85727000b1c0138aac8b77

                                • C:\Users\Admin\AppData\Local\Temp\nsrBD46.tmp\WT_Plugin.dll

                                  Filesize

                                  164KB

                                  MD5

                                  9f392fdef8b0681254ad916cf0cf6961

                                  SHA1

                                  ef903a0652696e5c0aad1b271916a1c212bdcee1

                                  SHA256

                                  0e6a43834e7124c784f958756330dbdcba32bc397bc96fd8ce1672c8c173be27

                                  SHA512

                                  5835042e78caea5ac25b2ce7c0490643c37890dd83424bf521ed67a97e2faaf95e2f8d9e7626b71f78c1d40e93dd61d3a175d149cf932042101d39fc09c2a77c

                                • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

                                  Filesize

                                  231KB

                                  MD5

                                  029fde9403ed6a8445e674646c4104c0

                                  SHA1

                                  2a6a3c327b11d30e00dbef3370275cf4fc60586f

                                  SHA256

                                  c351b4878a034ce7d31673ceeab281922585b1b26a9f520c2cf69f5f900d87a0

                                  SHA512

                                  48141c1c4b25e2a49a5e3ab0b6ee00cc038233c99c38634adde5169b67e3f44d88247eb6b54a2fa7a5af7144b3045de40626fa5a92724381435aad4262dec95e

                                • C:\Windows\SYSTEM.INI

                                  Filesize

                                  257B

                                  MD5

                                  fccffe8f74b2f9b56da0362721feb725

                                  SHA1

                                  3aed87ba74c5c5437b0ff174a0f0394b58cc020b

                                  SHA256

                                  e951cac02557c5e9febc16234bd0fc9f3d1f8bb93fcb4b49f374b42fc22ba572

                                  SHA512

                                  46769b07ede15babf75e5711943df55204364d38b4e9587deede5ea5dc0227674471863cba8b086bc26b816988998a0e525780aa116413bd15c2b2f6255a4c0b

                                • memory/2368-21-0x00000000022B0000-0x00000000022B2000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/2368-7-0x00000000022B0000-0x00000000022B2000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/2368-3-0x00000000023D0000-0x000000000345E000-memory.dmp

                                  Filesize

                                  16.6MB

                                • memory/2368-0-0x0000000000400000-0x0000000000440000-memory.dmp

                                  Filesize

                                  256KB

                                • memory/2368-1-0x00000000023D0000-0x000000000345E000-memory.dmp

                                  Filesize

                                  16.6MB

                                • memory/2368-8-0x0000000003FE0000-0x0000000003FE1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2368-10-0x00000000022B0000-0x00000000022B2000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/2368-30-0x0000000000400000-0x0000000000440000-memory.dmp

                                  Filesize

                                  256KB

                                • memory/2368-9-0x00000000023D0000-0x000000000345E000-memory.dmp

                                  Filesize

                                  16.6MB

                                • memory/2368-28-0x00000000023D0000-0x000000000345E000-memory.dmp

                                  Filesize

                                  16.6MB

                                • memory/2368-11-0x00000000022B0000-0x00000000022B2000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/2368-6-0x00000000023D0000-0x000000000345E000-memory.dmp

                                  Filesize

                                  16.6MB

                                • memory/2368-4-0x00000000023D0000-0x000000000345E000-memory.dmp

                                  Filesize

                                  16.6MB

                                • memory/2368-5-0x00000000023D0000-0x000000000345E000-memory.dmp

                                  Filesize

                                  16.6MB

                                • memory/3480-73-0x0000000006DD0000-0x0000000007E5E000-memory.dmp

                                  Filesize

                                  16.6MB

                                • memory/3480-80-0x0000000006DD0000-0x0000000007E5E000-memory.dmp

                                  Filesize

                                  16.6MB

                                • memory/3480-81-0x0000000006DD0000-0x0000000007E5E000-memory.dmp

                                  Filesize

                                  16.6MB

                                • memory/3480-60-0x00000000027A0000-0x00000000027BB000-memory.dmp

                                  Filesize

                                  108KB

                                • memory/3480-82-0x0000000006DD0000-0x0000000007E5E000-memory.dmp

                                  Filesize

                                  16.6MB

                                • memory/3480-85-0x0000000006DD0000-0x0000000007E5E000-memory.dmp

                                  Filesize

                                  16.6MB

                                • memory/3480-84-0x0000000006DD0000-0x0000000007E5E000-memory.dmp

                                  Filesize

                                  16.6MB

                                • memory/3480-86-0x0000000002780000-0x0000000002782000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/3480-76-0x0000000006DD0000-0x0000000007E5E000-memory.dmp

                                  Filesize

                                  16.6MB

                                • memory/3480-83-0x0000000006DD0000-0x0000000007E5E000-memory.dmp

                                  Filesize

                                  16.6MB

                                • memory/3480-75-0x0000000006DD0000-0x0000000007E5E000-memory.dmp

                                  Filesize

                                  16.6MB

                                • memory/3480-79-0x0000000002780000-0x0000000002782000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/3480-78-0x0000000002C80000-0x0000000002C81000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3480-31-0x0000000000400000-0x0000000000440000-memory.dmp

                                  Filesize

                                  256KB

                                • memory/3480-88-0x0000000006DD0000-0x0000000007E5E000-memory.dmp

                                  Filesize

                                  16.6MB

                                • memory/3480-87-0x0000000006DD0000-0x0000000007E5E000-memory.dmp

                                  Filesize

                                  16.6MB

                                • memory/3480-89-0x0000000006DD0000-0x0000000007E5E000-memory.dmp

                                  Filesize

                                  16.6MB

                                • memory/3480-108-0x0000000000400000-0x0000000000440000-memory.dmp

                                  Filesize

                                  256KB

                                • memory/3480-94-0x0000000006DD0000-0x0000000007E5E000-memory.dmp

                                  Filesize

                                  16.6MB