Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 02:39
Static task
static1
Behavioral task
behavioral1
Sample
f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe
-
Size
224KB
-
MD5
f01b504ee60ccee7e7c2332ea904a23c
-
SHA1
90f9d3ed96c2afcee6eee8a90f31f15b6ce04abe
-
SHA256
77f1845b8f1d0a95c1cace6f09259bcc4372d862a58e0c68ff6e86a1895fe529
-
SHA512
a6e065cefeb2e5e7b3742c0602d51761cc566ebec22db8aed44400e606990d5e40f5a03c0474ca0ba0819f40133638c51a9f63e1f1fed3c8b857191a52feac32
-
SSDEEP
3072:tc2ExEMEoAoAKAXA6A3A+AfAzA2AfAbeo4U41414j414t454/414H41414141411:u
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zaoay.exe -
Executes dropped EXE 1 IoCs
pid Process 2964 zaoay.exe -
Loads dropped DLL 2 IoCs
pid Process 1048 f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe 1048 f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /N" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /o" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /X" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /Z" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /E" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /L" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /x" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /R" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /v" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /k" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /G" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /b" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /D" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /w" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /q" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /s" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /l" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /h" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /g" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /H" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /J" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /O" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /T" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /n" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /A" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /c" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /Q" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /W" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /a" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /j" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /d" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /u" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /K" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /p" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /r" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /U" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /t" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /m" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /B" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /Y" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /z" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /F" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /S" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /y" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /C" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /P" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /f" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /i" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /I" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /M" zaoay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoay = "C:\\Users\\Admin\\zaoay.exe /V" zaoay.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe 2964 zaoay.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1048 f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe 2964 zaoay.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2964 1048 f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe 28 PID 1048 wrote to memory of 2964 1048 f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe 28 PID 1048 wrote to memory of 2964 1048 f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe 28 PID 1048 wrote to memory of 2964 1048 f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe 28 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27 PID 2964 wrote to memory of 1048 2964 zaoay.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f01b504ee60ccee7e7c2332ea904a23c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\zaoay.exe"C:\Users\Admin\zaoay.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5a3eb453663b218a32fb7de8d3cdf0ab3
SHA1b13e49709a4b87a8df6b19ffa57c301512bf5065
SHA2568283313f5e659660ba3ea307c0dde6c2ecb9ebae67149867ddff60eba3ed0a34
SHA512d35fa29322e2cf3f3df45907b7f20c2f6d9d67fe51ea7af2ecdfcf7809b11a0225f695e3d7d9c7184f19af697f4bec006577e3041d659f640cd49f01bdad96dc