Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04/01/2025, 11:49
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe
-
Size
512KB
-
MD5
7986dfc5ba3a34272aad6b1128d04462
-
SHA1
1f26a98dafa6d33c09b57cc719df618eabe8d830
-
SHA256
cf0a727b7407810bf9200e55c35569c2816e5f9213dcbc18c778955b5d69dfe8
-
SHA512
4582fd8c31f977faf3c815723f77b95406e67de9d5405b20cb8e35586b3cf9deb0de1299779160a88274cc711a82d88dfe235d2e3ef9ea496a336ee6fc4dea80
-
SSDEEP
12288:Ih1Lk70TnvjcM5ez2rZEo2J1nPIs9iQLsRZYqhipVgtPp:Uk70TrcUTrV2J1nWQOce
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Executes dropped EXE 1 IoCs
pid Process 2812 tmpCFDD.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2064 JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe 2064 JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft.Vsa = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\aspnet_filter.exe\"" tmpCFDD.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpCFDD.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2064 JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe Token: SeDebugPrivilege 2812 tmpCFDD.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2064 wrote to memory of 564 2064 JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe 30 PID 2064 wrote to memory of 564 2064 JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe 30 PID 2064 wrote to memory of 564 2064 JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe 30 PID 2064 wrote to memory of 564 2064 JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe 30 PID 564 wrote to memory of 2780 564 vbc.exe 32 PID 564 wrote to memory of 2780 564 vbc.exe 32 PID 564 wrote to memory of 2780 564 vbc.exe 32 PID 564 wrote to memory of 2780 564 vbc.exe 32 PID 2064 wrote to memory of 2812 2064 JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe 33 PID 2064 wrote to memory of 2812 2064 JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe 33 PID 2064 wrote to memory of 2812 2064 JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe 33 PID 2064 wrote to memory of 2812 2064 JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\s6y7gpop.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD96F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD96E.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2780
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpCFDD.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpCFDD.tmp.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7986dfc5ba3a34272aad6b1128d04462.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD512619c1dbd8c09819c764fc4c17ee243
SHA1ec03da46669dbf87dcd699f9eb1edffc71510eba
SHA256f931a804fa9d295fd2e3d186a58841cb4553626b134f6c45f36255f5a3f1b8e3
SHA51243e478870b73e9f401b5440cf2ccf8014007fcd5790219a5c201e0794b0f0baeaf3d1a6c6e07ef880c03f4fc95a15542b361773ba6bf059d67388a29edea8443
-
Filesize
128KB
MD50edc22ed8471e29fc208d3a05f922d26
SHA1207b2fd8131cf0614f4c5dc53af5d98287022007
SHA25604c74b8ffdd80898c513ad4118e073fce30d26f6b4e665dbde15e88769b3829d
SHA5121ea2eb7a15682f813676ae64c4a67ef1c832fea766c943e75f5bdb78c5c1ba9e2348509f53269d93b15d976c7a8b7ddc4fbfa4be8d999ceb1dda768996b1d2dc
-
Filesize
266B
MD5ad05ed1c90d777876072a897d9269a90
SHA16a5b3cc76f21a47b5ce78f4af854c850efd47d7d
SHA256903d1a2644ed754bde0bf58dcbf9f48693e5ef87fe0fef5ca05f0eeaf8f234d3
SHA5125887bc0257aeec2e82f2935d7d42036a31176b37ef694e6a8f5bd26607147b9d539183310b531bf10467a226febff65f6ac0641eb3d22d88b5c33e1521132949
-
Filesize
121KB
MD5f991a64f7d90f77813d74074d11e1700
SHA157dfb5e99f8f283cbb6863835b5371c50f201fe4
SHA256f86c8f4dd4cf00f2f49e0d9cd5c90c15f42679875f708603d376a97bd519fc39
SHA512ca0d754f2e9c0960cb5031d71c293534923bc99adbd4ba412c36bc3c053fed6f9f57b832becc7bdd35f45e4d19164bbbabf541ffc3058ba35c7854edbe906d43
-
Filesize
660B
MD54277373bf110eef660e3be6eb0aa6cb2
SHA1452fae370a2ef086614d4608eed38925a8eca633
SHA256ce857e989d315ddc81d6a221aeaa45a072e80b0550c9589435c924e59c874dad
SHA5124b159eff4ef422b393847ef490f88f3cc0388d0c333ab629c05fc03b8a4d47ef5ac5522cc3a45a0b32aaf9bdf4ee1f0d6b1124b4f4831785b41c3cba6184288e
-
Filesize
62KB
MD5b8fb7009403489ea2ceda4e5abb969aa
SHA1caeeda2b652f02370501de51b599dc82b89a996b
SHA256340012732dc6952273a5892d09869d171235b6221d0f6773b31c0df5a2b9e8d4
SHA5129595f829f9354c9851fc4f280ecb642bb47881e0b920a031409f58e3cbbe0e6e881dc10a98a8d48b7459130f005ee1d00917f6a826ae9ae0bbe08ba9dafeb407