Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
06/01/2025, 19:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_375c48ce666da3e9b11e9317cb94c190.vbs
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_375c48ce666da3e9b11e9317cb94c190.vbs
-
Size
1.3MB
-
MD5
375c48ce666da3e9b11e9317cb94c190
-
SHA1
65a878064405489a8ed89ce5980a1726d164f4d0
-
SHA256
8a6c0f3be2ae85edd94a0aa130ebd98ea323cf84668992de29a5eafe898188ea
-
SHA512
d75508481f5f904255648935fc7f479937f0175a78d3943bbb4346786e5b40342d9b7a1e16409e978bd8e102cb748490bafba86cc07e197317070ec02aec2e5f
-
SSDEEP
768:MiBZ/5SfN0GIW6tKVSPB6Rs50S4zit70H9MsDgz9gZ64x/ijW6VVy1rG28FrOk3w:WN
Malware Config
Extracted
nanocore
1.2.2.0
techmorgan.fr:54984
127.0.0.1:54984
03f71578-b48c-47c4-a3b5-de07d27123ef
-
activate_away_mode
false
-
backup_connection_host
127.0.0.1
- backup_dns_server
-
buffer_size
65535
-
build_time
2021-07-29T10:57:48.257119736Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
54984
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
03f71578-b48c-47c4-a3b5-de07d27123ef
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
techmorgan.fr
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Nanocore family
-
Executes dropped EXE 1 IoCs
pid Process 2988 57yhyh.ExE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WPA Service = "C:\\Program Files (x86)\\WPA Service\\wpasv.exe" 57yhyh.ExE -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 57yhyh.ExE -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\WPA Service\wpasv.exe 57yhyh.ExE File opened for modification C:\Program Files (x86)\WPA Service\wpasv.exe 57yhyh.ExE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57yhyh.ExE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2988 57yhyh.ExE 2988 57yhyh.ExE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2988 57yhyh.ExE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2988 57yhyh.ExE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2988 3016 WScript.exe 29 PID 3016 wrote to memory of 2988 3016 WScript.exe 29 PID 3016 wrote to memory of 2988 3016 WScript.exe 29 PID 3016 wrote to memory of 2988 3016 WScript.exe 29
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_375c48ce666da3e9b11e9317cb94c190.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\57yhyh.ExEC:\Users\Admin\AppData\Local\Temp\57yhyh.ExE2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5a6c6f81566d21c85dc94f2625ff60e68
SHA17f0e67caca2b706b5bdf03a9f5cb1c9562178ab1
SHA25663cf49fc2dfaad63b9f79a7a75c8dfa1302a00156ad46dbc05ffa97d3a42acf6
SHA512447d717c0e6757b61c855066ee0ce8600f3e6932b6dd54dc5e30bcd43d930c642c14e74eaa841af5145b067af9d9e7709c1f349a66e81706b7a74128c60afabc