Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/01/2025, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe
-
Size
1.5MB
-
MD5
059210d7a24b0d8e288cd9d65827a270
-
SHA1
f59ec54d5aa48c1f7dc7db2e9992d3d07d1cfd5f
-
SHA256
c9b870546741d665be6fd9ae8e80f7a4cc337c57b78431e23600c48e41fb52a3
-
SHA512
7c7baae6ecba097877ebe943c5a6fd8b0c0c1e0f504d0095417147e4c81a3f035ecdeb2f2debbcbefcad4cbd00e45adaea864dcb47437a26509fcb568e4ec122
-
SSDEEP
24576:yPnmwiQ93fClAkh5VH2yiln5yAqNAlptFtBny63tj7iFWh0jScurTdu1bE0pgsFS:RYPClLVq4ARtFeARmFWOqTUp1pfS
Malware Config
Extracted
latentbot
kgaffey1234.zapto.org
Signatures
-
Darkcomet family
-
Latentbot family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rundll32 .exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rundll32 .exe cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3200 svhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rundll32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rundll32 .exe" JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3524 set thread context of 3200 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe Token: SeIncreaseQuotaPrivilege 3200 svhost.exe Token: SeSecurityPrivilege 3200 svhost.exe Token: SeTakeOwnershipPrivilege 3200 svhost.exe Token: SeLoadDriverPrivilege 3200 svhost.exe Token: SeSystemProfilePrivilege 3200 svhost.exe Token: SeSystemtimePrivilege 3200 svhost.exe Token: SeProfSingleProcessPrivilege 3200 svhost.exe Token: SeIncBasePriorityPrivilege 3200 svhost.exe Token: SeCreatePagefilePrivilege 3200 svhost.exe Token: SeBackupPrivilege 3200 svhost.exe Token: SeRestorePrivilege 3200 svhost.exe Token: SeShutdownPrivilege 3200 svhost.exe Token: SeDebugPrivilege 3200 svhost.exe Token: SeSystemEnvironmentPrivilege 3200 svhost.exe Token: SeChangeNotifyPrivilege 3200 svhost.exe Token: SeRemoteShutdownPrivilege 3200 svhost.exe Token: SeUndockPrivilege 3200 svhost.exe Token: SeManageVolumePrivilege 3200 svhost.exe Token: SeImpersonatePrivilege 3200 svhost.exe Token: SeCreateGlobalPrivilege 3200 svhost.exe Token: 33 3200 svhost.exe Token: 34 3200 svhost.exe Token: 35 3200 svhost.exe Token: 36 3200 svhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3200 svhost.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 3524 wrote to memory of 3816 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 83 PID 3524 wrote to memory of 3816 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 83 PID 3524 wrote to memory of 3816 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 83 PID 3524 wrote to memory of 3308 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 85 PID 3524 wrote to memory of 3308 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 85 PID 3524 wrote to memory of 3308 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 85 PID 3524 wrote to memory of 3200 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 86 PID 3524 wrote to memory of 3200 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 86 PID 3524 wrote to memory of 3200 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 86 PID 3524 wrote to memory of 3200 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 86 PID 3524 wrote to memory of 3200 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 86 PID 3524 wrote to memory of 3200 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 86 PID 3524 wrote to memory of 3200 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 86 PID 3524 wrote to memory of 3200 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 86 PID 3524 wrote to memory of 3200 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 86 PID 3524 wrote to memory of 3200 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 86 PID 3524 wrote to memory of 3200 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 86 PID 3524 wrote to memory of 3200 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 86 PID 3524 wrote to memory of 3200 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 86 PID 3524 wrote to memory of 3200 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 86 PID 3524 wrote to memory of 4496 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 87 PID 3524 wrote to memory of 4496 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 87 PID 3524 wrote to memory of 4496 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 87 PID 3524 wrote to memory of 2284 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 88 PID 3524 wrote to memory of 2284 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 88 PID 3524 wrote to memory of 2284 3524 JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe 88 PID 3816 wrote to memory of 3284 3816 cmd.exe 89 PID 3816 wrote to memory of 3284 3816 cmd.exe 89 PID 3816 wrote to memory of 3284 3816 cmd.exe 89 PID 3284 wrote to memory of 1164 3284 wscript.exe 90 PID 3284 wrote to memory of 1164 3284 wscript.exe 90 PID 3284 wrote to memory of 1164 3284 wscript.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_059210d7a24b0d8e288cd9d65827a270.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lala.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\invs.vbs" "C:\Users\Admin\AppData\Local\Temp\lala2.bat3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lala2.bat" "4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1164
-
-
-
-
C:\Windows\Temp\svhost.exeC:\Windows\Temp\svhost.exe2⤵PID:3308
-
-
C:\Windows\Temp\svhost.exeC:\Windows\Temp\svhost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3200
-
-
C:\Windows\Temp\svhost.exeC:\Windows\Temp\svhost.exe2⤵PID:4496
-
-
C:\Windows\Temp\svhost.exeC:\Windows\Temp\svhost.exe2⤵PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78B
MD5c578d9653b22800c3eb6b6a51219bbb8
SHA1a97aa251901bbe179a48dbc7a0c1872e163b1f2d
SHA25620a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2
SHA5123ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d
-
Filesize
47B
MD5b64c476328c10cbc4aa16bccc539320f
SHA1ca4ffb271e360b91b11befdc87fd62f1ed91b0a2
SHA256c93c2b04839cc19351c1377c72086b025c56a77d1707e6a995baa64de16f0ecb
SHA5120fcbf2fd1a3ca57d21e3a196a0847937b9afc929e296ab5582e97536595958f44660dad8f4fdf33904272da8ce764657d52c3c96d3eaec4a74bfbd77812b6607
-
Filesize
151B
MD5ed28c618f7d8306e3736432b58bb5d27
SHA1441e6dab70e31d9c599fcd9e2d32009038781b42
SHA256d9aa03911260779b1f8a9b046a7ecf7aa87b0f13c762491fe8e06c482bac09a3
SHA5124257d8839e881a9ab6de6230a9df1e81456cb796eb9ee2361789fa5fe4c81b297ed1c472f91d97bb0b2ebdb6acadb924617e6ffd32fc96d8ddcebf8fee4a7880
-
Filesize
1.5MB
MD5059210d7a24b0d8e288cd9d65827a270
SHA1f59ec54d5aa48c1f7dc7db2e9992d3d07d1cfd5f
SHA256c9b870546741d665be6fd9ae8e80f7a4cc337c57b78431e23600c48e41fb52a3
SHA5127c7baae6ecba097877ebe943c5a6fd8b0c0c1e0f504d0095417147e4c81a3f035ecdeb2f2debbcbefcad4cbd00e45adaea864dcb47437a26509fcb568e4ec122
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34