Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
25s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/01/2025, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe
-
Size
1.5MB
-
MD5
059210d7a24b0d8e288cd9d65827a270
-
SHA1
f59ec54d5aa48c1f7dc7db2e9992d3d07d1cfd5f
-
SHA256
c9b870546741d665be6fd9ae8e80f7a4cc337c57b78431e23600c48e41fb52a3
-
SHA512
7c7baae6ecba097877ebe943c5a6fd8b0c0c1e0f504d0095417147e4c81a3f035ecdeb2f2debbcbefcad4cbd00e45adaea864dcb47437a26509fcb568e4ec122
-
SSDEEP
24576:yPnmwiQ93fClAkh5VH2yiln5yAqNAlptFtBny63tj7iFWh0jScurTdu1bE0pgsFS:RYPClLVq4ARtFeARmFWOqTUp1pfS
Malware Config
Extracted
latentbot
kgaffey1234.zapto.org
Signatures
-
Darkcomet family
-
Latentbot family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rundll32 .exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rundll32 .exe cmd.exe -
Executes dropped EXE 4 IoCs
pid Process 2808 svhost.exe 2572 svhost.exe 2848 svhost.exe 2636 svhost.exe -
Loads dropped DLL 4 IoCs
pid Process 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\rundll32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rundll32 .exe" JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2664 set thread context of 2808 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe Token: SeIncreaseQuotaPrivilege 2808 svhost.exe Token: SeSecurityPrivilege 2808 svhost.exe Token: SeTakeOwnershipPrivilege 2808 svhost.exe Token: SeLoadDriverPrivilege 2808 svhost.exe Token: SeSystemProfilePrivilege 2808 svhost.exe Token: SeSystemtimePrivilege 2808 svhost.exe Token: SeProfSingleProcessPrivilege 2808 svhost.exe Token: SeIncBasePriorityPrivilege 2808 svhost.exe Token: SeCreatePagefilePrivilege 2808 svhost.exe Token: SeBackupPrivilege 2808 svhost.exe Token: SeRestorePrivilege 2808 svhost.exe Token: SeShutdownPrivilege 2808 svhost.exe Token: SeDebugPrivilege 2808 svhost.exe Token: SeSystemEnvironmentPrivilege 2808 svhost.exe Token: SeChangeNotifyPrivilege 2808 svhost.exe Token: SeRemoteShutdownPrivilege 2808 svhost.exe Token: SeUndockPrivilege 2808 svhost.exe Token: SeManageVolumePrivilege 2808 svhost.exe Token: SeImpersonatePrivilege 2808 svhost.exe Token: SeCreateGlobalPrivilege 2808 svhost.exe Token: 33 2808 svhost.exe Token: 34 2808 svhost.exe Token: 35 2808 svhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2808 svhost.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2780 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 31 PID 2664 wrote to memory of 2780 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 31 PID 2664 wrote to memory of 2780 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 31 PID 2664 wrote to memory of 2780 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 31 PID 2780 wrote to memory of 2576 2780 cmd.exe 33 PID 2780 wrote to memory of 2576 2780 cmd.exe 33 PID 2780 wrote to memory of 2576 2780 cmd.exe 33 PID 2780 wrote to memory of 2576 2780 cmd.exe 33 PID 2664 wrote to memory of 2848 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 34 PID 2664 wrote to memory of 2848 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 34 PID 2664 wrote to memory of 2848 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 34 PID 2664 wrote to memory of 2848 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 34 PID 2664 wrote to memory of 2808 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 35 PID 2664 wrote to memory of 2808 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 35 PID 2664 wrote to memory of 2808 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 35 PID 2664 wrote to memory of 2808 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 35 PID 2664 wrote to memory of 2808 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 35 PID 2664 wrote to memory of 2808 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 35 PID 2664 wrote to memory of 2808 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 35 PID 2664 wrote to memory of 2808 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 35 PID 2664 wrote to memory of 2808 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 35 PID 2664 wrote to memory of 2808 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 35 PID 2664 wrote to memory of 2808 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 35 PID 2664 wrote to memory of 2808 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 35 PID 2664 wrote to memory of 2808 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 35 PID 2664 wrote to memory of 2572 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 36 PID 2664 wrote to memory of 2572 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 36 PID 2664 wrote to memory of 2572 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 36 PID 2664 wrote to memory of 2572 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 36 PID 2664 wrote to memory of 2636 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 37 PID 2664 wrote to memory of 2636 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 37 PID 2664 wrote to memory of 2636 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 37 PID 2664 wrote to memory of 2636 2664 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 37 PID 2576 wrote to memory of 2424 2576 wscript.exe 38 PID 2576 wrote to memory of 2424 2576 wscript.exe 38 PID 2576 wrote to memory of 2424 2576 wscript.exe 38 PID 2576 wrote to memory of 2424 2576 wscript.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\lala.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\invs.vbs" "C:\Users\Admin\AppData\Local\Temp\lala2.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\lala2.bat" "4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2424
-
-
-
-
C:\Windows\Temp\svhost.exeC:\Windows\Temp\svhost.exe2⤵
- Executes dropped EXE
PID:2848
-
-
C:\Windows\Temp\svhost.exeC:\Windows\Temp\svhost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
C:\Windows\Temp\svhost.exeC:\Windows\Temp\svhost.exe2⤵
- Executes dropped EXE
PID:2572
-
-
C:\Windows\Temp\svhost.exeC:\Windows\Temp\svhost.exe2⤵
- Executes dropped EXE
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78B
MD5c578d9653b22800c3eb6b6a51219bbb8
SHA1a97aa251901bbe179a48dbc7a0c1872e163b1f2d
SHA25620a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2
SHA5123ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d
-
Filesize
47B
MD5b64c476328c10cbc4aa16bccc539320f
SHA1ca4ffb271e360b91b11befdc87fd62f1ed91b0a2
SHA256c93c2b04839cc19351c1377c72086b025c56a77d1707e6a995baa64de16f0ecb
SHA5120fcbf2fd1a3ca57d21e3a196a0847937b9afc929e296ab5582e97536595958f44660dad8f4fdf33904272da8ce764657d52c3c96d3eaec4a74bfbd77812b6607
-
Filesize
151B
MD5ed28c618f7d8306e3736432b58bb5d27
SHA1441e6dab70e31d9c599fcd9e2d32009038781b42
SHA256d9aa03911260779b1f8a9b046a7ecf7aa87b0f13c762491fe8e06c482bac09a3
SHA5124257d8839e881a9ab6de6230a9df1e81456cb796eb9ee2361789fa5fe4c81b297ed1c472f91d97bb0b2ebdb6acadb924617e6ffd32fc96d8ddcebf8fee4a7880
-
Filesize
1.5MB
MD5059210d7a24b0d8e288cd9d65827a270
SHA1f59ec54d5aa48c1f7dc7db2e9992d3d07d1cfd5f
SHA256c9b870546741d665be6fd9ae8e80f7a4cc337c57b78431e23600c48e41fb52a3
SHA5127c7baae6ecba097877ebe943c5a6fd8b0c0c1e0f504d0095417147e4c81a3f035ecdeb2f2debbcbefcad4cbd00e45adaea864dcb47437a26509fcb568e4ec122
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98