Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2025, 19:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_375c48ce666da3e9b11e9317cb94c190.vbs
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_375c48ce666da3e9b11e9317cb94c190.vbs
-
Size
1.3MB
-
MD5
375c48ce666da3e9b11e9317cb94c190
-
SHA1
65a878064405489a8ed89ce5980a1726d164f4d0
-
SHA256
8a6c0f3be2ae85edd94a0aa130ebd98ea323cf84668992de29a5eafe898188ea
-
SHA512
d75508481f5f904255648935fc7f479937f0175a78d3943bbb4346786e5b40342d9b7a1e16409e978bd8e102cb748490bafba86cc07e197317070ec02aec2e5f
-
SSDEEP
768:MiBZ/5SfN0GIW6tKVSPB6Rs50S4zit70H9MsDgz9gZ64x/ijW6VVy1rG28FrOk3w:WN
Malware Config
Extracted
nanocore
1.2.2.0
techmorgan.fr:54984
127.0.0.1:54984
03f71578-b48c-47c4-a3b5-de07d27123ef
-
activate_away_mode
false
-
backup_connection_host
127.0.0.1
- backup_dns_server
-
buffer_size
65535
-
build_time
2021-07-29T10:57:48.257119736Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
54984
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
03f71578-b48c-47c4-a3b5-de07d27123ef
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
techmorgan.fr
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Nanocore family
-
Executes dropped EXE 1 IoCs
pid Process 3276 57yhyh.ExE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SMTP Subsystem = "C:\\Program Files (x86)\\SMTP Subsystem\\smtpss.exe" 57yhyh.ExE -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 57yhyh.ExE -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\SMTP Subsystem\smtpss.exe 57yhyh.ExE File created C:\Program Files (x86)\SMTP Subsystem\smtpss.exe 57yhyh.ExE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57yhyh.ExE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3276 57yhyh.ExE 3276 57yhyh.ExE 3276 57yhyh.ExE 3276 57yhyh.ExE 3276 57yhyh.ExE 3276 57yhyh.ExE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3276 57yhyh.ExE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3276 57yhyh.ExE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4072 wrote to memory of 3276 4072 WScript.exe 83 PID 4072 wrote to memory of 3276 4072 WScript.exe 83 PID 4072 wrote to memory of 3276 4072 WScript.exe 83
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_375c48ce666da3e9b11e9317cb94c190.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\57yhyh.ExEC:\Users\Admin\AppData\Local\Temp\57yhyh.ExE2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5a6c6f81566d21c85dc94f2625ff60e68
SHA17f0e67caca2b706b5bdf03a9f5cb1c9562178ab1
SHA25663cf49fc2dfaad63b9f79a7a75c8dfa1302a00156ad46dbc05ffa97d3a42acf6
SHA512447d717c0e6757b61c855066ee0ce8600f3e6932b6dd54dc5e30bcd43d930c642c14e74eaa841af5145b067af9d9e7709c1f349a66e81706b7a74128c60afabc