Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 11:16
Static task
static1
Behavioral task
behavioral1
Sample
eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe
-
Size
239KB
-
MD5
eaf0b16d7b5fa059bf4bc3338aa45d85
-
SHA1
1e98641e0f98d7e47a72461df9a90bc3755cb5ee
-
SHA256
13acb2a0cfc213abdbb8f42ae25b2def0c11116aead93ac2cb75b2d965cbb682
-
SHA512
6092fd178b0ca7d57889e31a432036b4b47619ab2f7d1c701dc68d7551aaa47f17e94314650640749971247ad913593179647e7a28e134fb653b98d68748312b
-
SSDEEP
3072:R410tNnOvYL/XcPBsLBkIcyYpZ0OFGkw+ALtjHyN3yeW8Wf8NFldNnD7SXlDfRVW:u2nGQ/WeJcyCZzFXsqo8DSX9fRb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\d253e49c\\X" Explorer.EXE -
Deletes itself 1 IoCs
pid Process 2168 explorer.exe -
Executes dropped EXE 2 IoCs
pid Process 2160 X 336 csrss.exe -
Loads dropped DLL 2 IoCs
pid Process 1784 eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe 1784 eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1784 set thread context of 2168 1784 eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe 28 -
Modifies registry class 3 IoCs
description ioc Process Key created \registry\machine\Software\Classes\Interface\{3a7e3810-6a21-c5f7-6815-5df73c235f92} explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3a7e3810-6a21-c5f7-6815-5df73c235f92}\u = "40" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3a7e3810-6a21-c5f7-6815-5df73c235f92}\cid = "6029841039944191016" explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2160 X 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2168 explorer.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 336 csrss.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1784 wrote to memory of 2168 1784 eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe 28 PID 1784 wrote to memory of 2168 1784 eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe 28 PID 1784 wrote to memory of 2168 1784 eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe 28 PID 1784 wrote to memory of 2168 1784 eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe 28 PID 1784 wrote to memory of 2168 1784 eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe 28 PID 1784 wrote to memory of 2160 1784 eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe 29 PID 1784 wrote to memory of 2160 1784 eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe 29 PID 1784 wrote to memory of 2160 1784 eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe 29 PID 1784 wrote to memory of 2160 1784 eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe 29 PID 2160 wrote to memory of 1344 2160 X 21 PID 2168 wrote to memory of 336 2168 explorer.exe 2 PID 336 wrote to memory of 2136 336 csrss.exe 30 PID 336 wrote to memory of 2136 336 csrss.exe 30 PID 336 wrote to memory of 3024 336 csrss.exe 31 PID 336 wrote to memory of 3024 336 csrss.exe 31
Processes
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:336
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies WinLogon for persistence
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\explorer.exe00000074*3⤵
- Deletes itself
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168
-
-
C:\Users\Admin\AppData\Local\d253e49c\X193.105.154.210:803⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2160
-
-
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:2136
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding1⤵PID:3024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD552cfc02d36193d30588353255022c683
SHA1b1e0b1403c65c78c59a9717a2191cb4fe536d505
SHA256fdbf68765b8ccb9a63c75ac51ae22a3df97b90700281ff0b8954dbe286416581
SHA512cda1db5df8c7d3ef793fcce7c99a1146279996c4511fbd2be1903532fdcb1e559f0ae199a7bc1a165b0f651b02d99b6e95ef066d15f259e3851b9371c8da0d9e
-
Filesize
41KB
MD5686b479b0ee164cf1744a8be359ebb7d
SHA18615e8f967276a85110b198d575982a958581a07
SHA256fcfbb4c648649f4825b66504b261f912227ba32cbaabcadf4689020a83fb201b
SHA5127ed8022e2b09f232150b77fc3a25269365b624f19f0b50c46a4fdf744eeb23294c09c051452c4c9dbb34a274f1a0bfc54b3ff1987ec16ae2e54848e22a97ed64
-
Filesize
31KB
MD5dafc4a53954b76c5db1d857e955f3805
SHA1a18fa0d38c6656b4398953e77e87eec3b0209ef3
SHA256c6c82dde145a2dd9d70b1b539b17571befb663fc4a9ca834ff2a140cc4ebaa0b
SHA512745e27a4f952e2492dbd12ced396be2c7dc78344ba415ad64b45920f95d7a282e30c7ad2da9266dc195c71e38019809e8183a705f9276c7d178de2f5ef34b633
-
Filesize
2KB
MD575f12a889081632fb877168a1f17259b
SHA1f1b61e77bbdb68dddcb42ea7f3b9f29510ca6a6b
SHA2568a0d0d57b51a15a2eec758edeb0afca7d487305eb51358c115134b82d4b62fc8
SHA51238930d6758c1737a58c3e06a217b744de380027f38170e881391342db31e57be9070ca742a13d3f9aab8a823e64377780aa6516a0b81efc366d2e21dc2f59675