Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2025, 18:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe
-
Size
504KB
-
MD5
71c5c3921891aa17a545b12b9081b3ff
-
SHA1
1a059895434dc4a8e40d19d8411b1432dbdb2060
-
SHA256
a0765d2800c0ad0ee6dff1f252f63e26ccf759739c48d2c008c67b1be106a8b3
-
SHA512
cb53f8644fbfa8d6dc5b587c87a21c2b4de9fcfe798e7bc95c862247da39087a1c8cdc60795dbada03762963ed922790a4140128ae949c1b168bb9180d12f12a
-
SSDEEP
12288:G0Qr0Mk7z+4KMVzDfrTRYQ3+WltCiHE4vTB3cw7m:GBkxFDf/RkWjJvTOB
Malware Config
Extracted
darkcomet
Guest16
77.120.29.157:1604
DC_MUTEX-87KSHV4
-
InstallPath
Windupdt\winupdate.exe
-
gencode
Esk4h+sMz6Qm
-
install
true
-
offline_keylogger
false
-
persistence
false
-
reg_key
winupdater
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\Windupdt\\winupdate.exe" JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate winupdate.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe -
Executes dropped EXE 2 IoCs
pid Process 552 winupdate.exe 3740 winupdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Windupdt\\winupdate.exe" JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 996 set thread context of 2292 996 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe 84 PID 552 set thread context of 3740 552 winupdate.exe 98 -
resource yara_rule behavioral2/memory/2292-3-0x0000000000400000-0x00000000004F7000-memory.dmp upx behavioral2/memory/2292-5-0x0000000000400000-0x00000000004F7000-memory.dmp upx behavioral2/memory/2292-7-0x0000000000400000-0x00000000004F7000-memory.dmp upx behavioral2/memory/2292-8-0x0000000000400000-0x00000000004F7000-memory.dmp upx behavioral2/memory/2292-9-0x0000000000400000-0x00000000004F7000-memory.dmp upx behavioral2/memory/2292-10-0x0000000000400000-0x00000000004F7000-memory.dmp upx behavioral2/memory/2292-11-0x0000000000400000-0x00000000004F7000-memory.dmp upx behavioral2/memory/2292-72-0x0000000000400000-0x00000000004F7000-memory.dmp upx behavioral2/memory/3740-81-0x0000000000400000-0x00000000004F7000-memory.dmp upx behavioral2/memory/3740-83-0x0000000000400000-0x00000000004F7000-memory.dmp upx behavioral2/memory/3740-84-0x0000000000400000-0x00000000004F7000-memory.dmp upx behavioral2/memory/3740-85-0x0000000000400000-0x00000000004F7000-memory.dmp upx behavioral2/memory/3740-86-0x0000000000400000-0x00000000004F7000-memory.dmp upx behavioral2/memory/3740-87-0x0000000000400000-0x00000000004F7000-memory.dmp upx behavioral2/memory/3740-89-0x0000000000400000-0x00000000004F7000-memory.dmp upx behavioral2/memory/3740-91-0x0000000000400000-0x00000000004F7000-memory.dmp upx behavioral2/memory/3740-93-0x0000000000400000-0x00000000004F7000-memory.dmp upx behavioral2/memory/3740-95-0x0000000000400000-0x00000000004F7000-memory.dmp upx behavioral2/memory/3740-97-0x0000000000400000-0x00000000004F7000-memory.dmp upx behavioral2/memory/3740-99-0x0000000000400000-0x00000000004F7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier winupdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier winupdate.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier winupdate.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: SeSecurityPrivilege 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: SeTakeOwnershipPrivilege 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: SeLoadDriverPrivilege 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: SeSystemProfilePrivilege 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: SeSystemtimePrivilege 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: SeProfSingleProcessPrivilege 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: SeIncBasePriorityPrivilege 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: SeCreatePagefilePrivilege 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: SeBackupPrivilege 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: SeRestorePrivilege 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: SeShutdownPrivilege 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: SeDebugPrivilege 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: SeSystemEnvironmentPrivilege 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: SeChangeNotifyPrivilege 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: SeRemoteShutdownPrivilege 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: SeUndockPrivilege 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: SeManageVolumePrivilege 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: SeImpersonatePrivilege 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: SeCreateGlobalPrivilege 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: 33 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: 34 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: 35 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: 36 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe Token: SeIncreaseQuotaPrivilege 3740 winupdate.exe Token: SeSecurityPrivilege 3740 winupdate.exe Token: SeTakeOwnershipPrivilege 3740 winupdate.exe Token: SeLoadDriverPrivilege 3740 winupdate.exe Token: SeSystemProfilePrivilege 3740 winupdate.exe Token: SeSystemtimePrivilege 3740 winupdate.exe Token: SeProfSingleProcessPrivilege 3740 winupdate.exe Token: SeIncBasePriorityPrivilege 3740 winupdate.exe Token: SeCreatePagefilePrivilege 3740 winupdate.exe Token: SeBackupPrivilege 3740 winupdate.exe Token: SeRestorePrivilege 3740 winupdate.exe Token: SeShutdownPrivilege 3740 winupdate.exe Token: SeDebugPrivilege 3740 winupdate.exe Token: SeSystemEnvironmentPrivilege 3740 winupdate.exe Token: SeChangeNotifyPrivilege 3740 winupdate.exe Token: SeRemoteShutdownPrivilege 3740 winupdate.exe Token: SeUndockPrivilege 3740 winupdate.exe Token: SeManageVolumePrivilege 3740 winupdate.exe Token: SeImpersonatePrivilege 3740 winupdate.exe Token: SeCreateGlobalPrivilege 3740 winupdate.exe Token: 33 3740 winupdate.exe Token: 34 3740 winupdate.exe Token: 35 3740 winupdate.exe Token: 36 3740 winupdate.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 996 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe 996 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe 552 winupdate.exe 552 winupdate.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 996 wrote to memory of 2292 996 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe 84 PID 996 wrote to memory of 2292 996 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe 84 PID 996 wrote to memory of 2292 996 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe 84 PID 996 wrote to memory of 2292 996 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe 84 PID 996 wrote to memory of 2292 996 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe 84 PID 996 wrote to memory of 2292 996 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe 84 PID 996 wrote to memory of 2292 996 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe 84 PID 996 wrote to memory of 2292 996 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe 84 PID 2292 wrote to memory of 552 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe 97 PID 2292 wrote to memory of 552 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe 97 PID 2292 wrote to memory of 552 2292 JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe 97 PID 552 wrote to memory of 3740 552 winupdate.exe 98 PID 552 wrote to memory of 3740 552 winupdate.exe 98 PID 552 wrote to memory of 3740 552 winupdate.exe 98 PID 552 wrote to memory of 3740 552 winupdate.exe 98 PID 552 wrote to memory of 3740 552 winupdate.exe 98 PID 552 wrote to memory of 3740 552 winupdate.exe 98 PID 552 wrote to memory of 3740 552 winupdate.exe 98 PID 552 wrote to memory of 3740 552 winupdate.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_71c5c3921891aa17a545b12b9081b3ff.exe"2⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\Windupdt\winupdate.exe"C:\Users\Admin\AppData\Local\Temp\Windupdt\winupdate.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\Windupdt\winupdate.exe"C:\Users\Admin\AppData\Local\Temp\Windupdt\winupdate.exe"4⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3740
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504KB
MD571c5c3921891aa17a545b12b9081b3ff
SHA11a059895434dc4a8e40d19d8411b1432dbdb2060
SHA256a0765d2800c0ad0ee6dff1f252f63e26ccf759739c48d2c008c67b1be106a8b3
SHA512cb53f8644fbfa8d6dc5b587c87a21c2b4de9fcfe798e7bc95c862247da39087a1c8cdc60795dbada03762963ed922790a4140128ae949c1b168bb9180d12f12a