Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
104s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2025, 12:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_88931f200001a38d9fcbb9db14b10994.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_88931f200001a38d9fcbb9db14b10994.exe
-
Size
92KB
-
MD5
88931f200001a38d9fcbb9db14b10994
-
SHA1
4e7e78e249bb03b2a682efaa7970d9a5372ec65b
-
SHA256
2d3dd516f91090e5e59dc6559f0d2cca6cb992a0855dc6fd20d701d0addc92d2
-
SHA512
fd361ef4cabd48fe1e976ae602fff729456066cf2e5573370c5b764960f1e1932881eb14c14e264bd9894883805e2a81578fc7a90c84ad52596f38a966c1293f
-
SSDEEP
1536:IVZnxm6MG9xgfrvEaoiT/GyphjXDYjKwttoswRmhApE:YnxwgxgfR/DVG7wBpE
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 220 WaterMark.exe -
resource yara_rule behavioral2/memory/1612-4-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1612-6-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1612-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1612-10-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/220-21-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/220-26-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1612-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1612-2-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1612-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/220-35-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/220-34-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/220-36-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/220-37-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px4EDB.tmp JaffaCakes118_88931f200001a38d9fcbb9db14b10994.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe JaffaCakes118_88931f200001a38d9fcbb9db14b10994.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe JaffaCakes118_88931f200001a38d9fcbb9db14b10994.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4792 5044 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_88931f200001a38d9fcbb9db14b10994.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{7CC70252-08AD-11F0-A1E4-E628F4A4DBAC} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "449585141" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 220 WaterMark.exe 220 WaterMark.exe 220 WaterMark.exe 220 WaterMark.exe 220 WaterMark.exe 220 WaterMark.exe 220 WaterMark.exe 220 WaterMark.exe 220 WaterMark.exe 220 WaterMark.exe 220 WaterMark.exe 220 WaterMark.exe 220 WaterMark.exe 220 WaterMark.exe 220 WaterMark.exe 220 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 220 WaterMark.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1188 iexplore.exe 1188 iexplore.exe 5996 IEXPLORE.EXE 5996 IEXPLORE.EXE 5996 IEXPLORE.EXE 5996 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1612 JaffaCakes118_88931f200001a38d9fcbb9db14b10994.exe 220 WaterMark.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1612 wrote to memory of 220 1612 JaffaCakes118_88931f200001a38d9fcbb9db14b10994.exe 85 PID 1612 wrote to memory of 220 1612 JaffaCakes118_88931f200001a38d9fcbb9db14b10994.exe 85 PID 1612 wrote to memory of 220 1612 JaffaCakes118_88931f200001a38d9fcbb9db14b10994.exe 85 PID 220 wrote to memory of 5044 220 WaterMark.exe 86 PID 220 wrote to memory of 5044 220 WaterMark.exe 86 PID 220 wrote to memory of 5044 220 WaterMark.exe 86 PID 220 wrote to memory of 5044 220 WaterMark.exe 86 PID 220 wrote to memory of 5044 220 WaterMark.exe 86 PID 220 wrote to memory of 5044 220 WaterMark.exe 86 PID 220 wrote to memory of 5044 220 WaterMark.exe 86 PID 220 wrote to memory of 5044 220 WaterMark.exe 86 PID 220 wrote to memory of 5044 220 WaterMark.exe 86 PID 220 wrote to memory of 1188 220 WaterMark.exe 95 PID 220 wrote to memory of 1188 220 WaterMark.exe 95 PID 220 wrote to memory of 2368 220 WaterMark.exe 96 PID 220 wrote to memory of 2368 220 WaterMark.exe 96 PID 1188 wrote to memory of 5996 1188 iexplore.exe 97 PID 1188 wrote to memory of 5996 1188 iexplore.exe 97 PID 1188 wrote to memory of 5996 1188 iexplore.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_88931f200001a38d9fcbb9db14b10994.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_88931f200001a38d9fcbb9db14b10994.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 2084⤵
- Program crash
PID:4792
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1188 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5996
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
PID:2368
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5044 -ip 50441⤵PID:880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD588931f200001a38d9fcbb9db14b10994
SHA14e7e78e249bb03b2a682efaa7970d9a5372ec65b
SHA2562d3dd516f91090e5e59dc6559f0d2cca6cb992a0855dc6fd20d701d0addc92d2
SHA512fd361ef4cabd48fe1e976ae602fff729456066cf2e5573370c5b764960f1e1932881eb14c14e264bd9894883805e2a81578fc7a90c84ad52596f38a966c1293f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187
Filesize471B
MD570f2cd5a40c53a24406bef59c4dca71a
SHA1438a0730aab95862c097791a037678c5563c42cc
SHA256a1c50f56a0ce0c9c0288e7a21a933e4b477de7d729666c884d3e6d734b087607
SHA512f42fb79ad0075f05a4ad53d749a831f9d12f0d2b2d1016871734e19866b9c8406a041b84fc0085e422dcbbd17076f57ea2425e20a294124e24794d2262739e51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187
Filesize412B
MD508bace8510f644be204b76864ad5be58
SHA1a69bbd0988836b94057f4c050c091e6526b08a8f
SHA2568d8a931b44b7f2c6c4fe0fcaf0f73440932cd7c65b45623f2c91d9aa4eb2a08b
SHA512b59f82d3062d0d8c2a5af76192ab1e6463d988fb9e58ac44cac3da7d7897b8fd85ba7735f998d5fe04d5faa3eea613d04d1168d23e32801fef280a821a391246
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee