Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/03/2025, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe
-
Size
608KB
-
MD5
82270aed949bda6503b1d0874a97a63b
-
SHA1
805e505169f34b2bf629f33fad0c38c6290e6af5
-
SHA256
f4cdf2802cab61411b1e2ccfd2059a48c98ccac2c9cecbd50431ab5c5f7664ed
-
SHA512
ecbc8d82ac578de53f30becde9273c83777cf893ea07f85d6710bb909ec9073dfd01c9ca2c9d7c03d10618ff7b2f4c4d10f09a156f8a3e34f20cdb51dec51af2
-
SSDEEP
12288:2RFj6uJsOFvz1ABs83aaAbhzANOF2+ZkzDolKS2gDFZofGZCC5fFQY:ZujvznbhkNeUolKS2g5/CCl
Malware Config
Extracted
darkcomet
Guest16
chitan.myftp.org:1604
DC_MUTEX-B1N7QHH
-
gencode
jGCG#1SnUzAK
-
install
false
-
offline_keylogger
false
-
password
hakima
-
persistence
false
Signatures
-
Darkcomet family
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe -
Windows security bypass 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2784 attrib.exe 2728 attrib.exe -
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule behavioral1/memory/2192-0-0x0000000000400000-0x00000000004F5000-memory.dmp molebox -
Windows security modification 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeSecurityPrivilege 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeTakeOwnershipPrivilege 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeLoadDriverPrivilege 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeSystemProfilePrivilege 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeSystemtimePrivilege 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeProfSingleProcessPrivilege 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeIncBasePriorityPrivilege 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeCreatePagefilePrivilege 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeBackupPrivilege 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeRestorePrivilege 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeShutdownPrivilege 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeDebugPrivilege 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeSystemEnvironmentPrivilege 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeChangeNotifyPrivilege 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeRemoteShutdownPrivilege 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeUndockPrivilege 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeManageVolumePrivilege 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeImpersonatePrivilege 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeCreateGlobalPrivilege 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: 33 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: 34 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: 35 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2584 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe 28 PID 2192 wrote to memory of 2584 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe 28 PID 2192 wrote to memory of 2584 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe 28 PID 2192 wrote to memory of 2584 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe 28 PID 2192 wrote to memory of 2736 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe 29 PID 2192 wrote to memory of 2736 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe 29 PID 2192 wrote to memory of 2736 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe 29 PID 2192 wrote to memory of 2736 2192 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe 29 PID 2736 wrote to memory of 2784 2736 cmd.exe 33 PID 2736 wrote to memory of 2784 2736 cmd.exe 33 PID 2736 wrote to memory of 2784 2736 cmd.exe 33 PID 2736 wrote to memory of 2784 2736 cmd.exe 33 PID 2584 wrote to memory of 2728 2584 cmd.exe 32 PID 2584 wrote to memory of 2728 2584 cmd.exe 32 PID 2584 wrote to memory of 2728 2584 cmd.exe 32 PID 2584 wrote to memory of 2728 2584 cmd.exe 32 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2784 attrib.exe 2728 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe"1⤵
- Modifies security service
- Windows security bypass
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe" +s +h2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe" +s +h3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2728
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2784
-
-