Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02/01/2025, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe
-
Size
754KB
-
MD5
620745eb357249f9a22e2fd3ae78e180
-
SHA1
4ef382dbdc997e84abcccb4e84c1ba9f72f1a7f1
-
SHA256
f1d06b078b4ba01577ac77d51b5b817cf0dc5aaf1f42f9a900315d1321a7c95b
-
SHA512
48b65ee65dda9a3490b3c8f9ce96c5738113e856b9d680a9b214e74522cad507df6ee03ba0ee3b66476a3ba351f84c3e8c621269f4c118865dd849c7d1801588
-
SSDEEP
12288:WyJ5A3o8pLWg8+RTEQUHJrtrloElGDBqj/5VCGPGkHdez:vsZf8+RQpJrZldlGDBqj/jCQGkHi
Malware Config
Extracted
darkcomet
hackedjuajua
lolandtroll.zapto.org:1
DC_MUTEX-5S19488
-
InstallPath
MSdDCSC\msdcfsc.exe
-
gencode
oRQoqohwZ100
-
install
true
-
offline_keylogger
true
-
password
mortinato
-
persistence
true
-
reg_key
MicroUpdates
Extracted
latentbot
lolandtroll.zapto.org
Signatures
-
Darkcomet family
-
Latentbot family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\MSdDCSC\\msdcfsc.exe" JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe -
Executes dropped EXE 2 IoCs
pid Process 2964 msdcfsc.exe 2800 msdcfsc.exe -
Loads dropped DLL 2 IoCs
pid Process 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdates = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\MSdDCSC\\msdcfsc.exe" JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdates = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\MSdDCSC\\msdcfsc.exe" msdcfsc.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: msdcfsc.exe File opened (read-only) \??\O: msdcfsc.exe File opened (read-only) \??\A: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\G: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\B: msdcfsc.exe File opened (read-only) \??\I: msdcfsc.exe File opened (read-only) \??\L: msdcfsc.exe File opened (read-only) \??\A: msdcfsc.exe File opened (read-only) \??\J: msdcfsc.exe File opened (read-only) \??\U: msdcfsc.exe File opened (read-only) \??\J: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\T: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\V: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\Y: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\Z: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\Y: msdcfsc.exe File opened (read-only) \??\H: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\U: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\P: msdcfsc.exe File opened (read-only) \??\Q: msdcfsc.exe File opened (read-only) \??\X: msdcfsc.exe File opened (read-only) \??\L: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\N: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\R: msdcfsc.exe File opened (read-only) \??\K: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\S: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\S: msdcfsc.exe File opened (read-only) \??\W: msdcfsc.exe File opened (read-only) \??\O: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\Q: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\H: msdcfsc.exe File opened (read-only) \??\K: msdcfsc.exe File opened (read-only) \??\Z: msdcfsc.exe File opened (read-only) \??\I: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\T: msdcfsc.exe File opened (read-only) \??\V: msdcfsc.exe File opened (read-only) \??\W: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\X: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\E: msdcfsc.exe File opened (read-only) \??\B: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\E: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\M: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\P: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\R: JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe File opened (read-only) \??\G: msdcfsc.exe File opened (read-only) \??\M: msdcfsc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2380 set thread context of 2260 2380 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe 30 PID 2964 set thread context of 2800 2964 msdcfsc.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcfsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcfsc.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: SeSecurityPrivilege 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: SeTakeOwnershipPrivilege 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: SeLoadDriverPrivilege 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: SeSystemProfilePrivilege 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: SeSystemtimePrivilege 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: SeProfSingleProcessPrivilege 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: SeIncBasePriorityPrivilege 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: SeCreatePagefilePrivilege 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: SeBackupPrivilege 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: SeRestorePrivilege 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: SeShutdownPrivilege 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: SeDebugPrivilege 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: SeSystemEnvironmentPrivilege 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: SeChangeNotifyPrivilege 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: SeRemoteShutdownPrivilege 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: SeUndockPrivilege 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: SeManageVolumePrivilege 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: SeImpersonatePrivilege 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: SeCreateGlobalPrivilege 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: 33 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: 34 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: 35 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe Token: SeIncreaseQuotaPrivilege 2800 msdcfsc.exe Token: SeSecurityPrivilege 2800 msdcfsc.exe Token: SeTakeOwnershipPrivilege 2800 msdcfsc.exe Token: SeLoadDriverPrivilege 2800 msdcfsc.exe Token: SeSystemProfilePrivilege 2800 msdcfsc.exe Token: SeSystemtimePrivilege 2800 msdcfsc.exe Token: SeProfSingleProcessPrivilege 2800 msdcfsc.exe Token: SeIncBasePriorityPrivilege 2800 msdcfsc.exe Token: SeCreatePagefilePrivilege 2800 msdcfsc.exe Token: SeBackupPrivilege 2800 msdcfsc.exe Token: SeRestorePrivilege 2800 msdcfsc.exe Token: SeShutdownPrivilege 2800 msdcfsc.exe Token: SeDebugPrivilege 2800 msdcfsc.exe Token: SeSystemEnvironmentPrivilege 2800 msdcfsc.exe Token: SeChangeNotifyPrivilege 2800 msdcfsc.exe Token: SeRemoteShutdownPrivilege 2800 msdcfsc.exe Token: SeUndockPrivilege 2800 msdcfsc.exe Token: SeManageVolumePrivilege 2800 msdcfsc.exe Token: SeImpersonatePrivilege 2800 msdcfsc.exe Token: SeCreateGlobalPrivilege 2800 msdcfsc.exe Token: 33 2800 msdcfsc.exe Token: 34 2800 msdcfsc.exe Token: 35 2800 msdcfsc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2380 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe 2964 msdcfsc.exe 2800 msdcfsc.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2260 2380 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe 30 PID 2380 wrote to memory of 2260 2380 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe 30 PID 2380 wrote to memory of 2260 2380 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe 30 PID 2380 wrote to memory of 2260 2380 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe 30 PID 2380 wrote to memory of 2260 2380 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe 30 PID 2380 wrote to memory of 2260 2380 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe 30 PID 2380 wrote to memory of 2260 2380 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe 30 PID 2380 wrote to memory of 2260 2380 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe 30 PID 2380 wrote to memory of 2260 2380 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe 30 PID 2380 wrote to memory of 2260 2380 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe 30 PID 2380 wrote to memory of 2260 2380 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe 30 PID 2380 wrote to memory of 2260 2380 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe 30 PID 2380 wrote to memory of 2260 2380 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe 30 PID 2260 wrote to memory of 2964 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe 31 PID 2260 wrote to memory of 2964 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe 31 PID 2260 wrote to memory of 2964 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe 31 PID 2260 wrote to memory of 2964 2260 JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe 31 PID 2964 wrote to memory of 2800 2964 msdcfsc.exe 32 PID 2964 wrote to memory of 2800 2964 msdcfsc.exe 32 PID 2964 wrote to memory of 2800 2964 msdcfsc.exe 32 PID 2964 wrote to memory of 2800 2964 msdcfsc.exe 32 PID 2964 wrote to memory of 2800 2964 msdcfsc.exe 32 PID 2964 wrote to memory of 2800 2964 msdcfsc.exe 32 PID 2964 wrote to memory of 2800 2964 msdcfsc.exe 32 PID 2964 wrote to memory of 2800 2964 msdcfsc.exe 32 PID 2964 wrote to memory of 2800 2964 msdcfsc.exe 32 PID 2964 wrote to memory of 2800 2964 msdcfsc.exe 32 PID 2964 wrote to memory of 2800 2964 msdcfsc.exe 32 PID 2964 wrote to memory of 2800 2964 msdcfsc.exe 32 PID 2964 wrote to memory of 2800 2964 msdcfsc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_620745eb357249f9a22e2fd3ae78e180.exe"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\MSdDCSC\msdcfsc.exe"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\MSdDCSC\msdcfsc.exe"3⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\MSdDCSC\msdcfsc.exe"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\MSdDCSC\msdcfsc.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
754KB
MD5620745eb357249f9a22e2fd3ae78e180
SHA14ef382dbdc997e84abcccb4e84c1ba9f72f1a7f1
SHA256f1d06b078b4ba01577ac77d51b5b817cf0dc5aaf1f42f9a900315d1321a7c95b
SHA51248b65ee65dda9a3490b3c8f9ce96c5738113e856b9d680a9b214e74522cad507df6ee03ba0ee3b66476a3ba351f84c3e8c621269f4c118865dd849c7d1801588