Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
fad175591d470141ff5971cbaee87c4e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fad175591d470141ff5971cbaee87c4e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fad175591d470141ff5971cbaee87c4e_JaffaCakes118.exe
-
Size
592KB
-
MD5
fad175591d470141ff5971cbaee87c4e
-
SHA1
d3e083ab92a62682dd9425ca3e76ae74d97bfe30
-
SHA256
5a814a0e6d8c44ba3519d4d11d39a22730a62729dce0bbda8d2946e5f02b7afb
-
SHA512
fdaf8f1bfc719a9c85aa2afe07ad1aa45db2dc1cda5b77ed77820f911416a71c8c1a9e043290932824a7f1df1d28a2e274c9f8eae04f12df2bb975e9e298d2cc
-
SSDEEP
12288:tvoeq1/cnTVKIBTuoHvK2+zw/D+UdZLfHcXeT9lYbTsQI/13B+Rzq9zWOvK7uOXF:uP0rD3KsV1pKM
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\9UK48PUZP1.exe = "C:\\Users\\Admin\\AppData\\Roaming\\9UK48PUZP1.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\ProgramData\WinLogon.exe = "C:\\ProgramData\\WinLogon.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Executes dropped EXE 2 IoCs
pid Process 2884 drvhost.exe 2712 WinLogon.exe -
Loads dropped DLL 3 IoCs
pid Process 2212 fad175591d470141ff5971cbaee87c4e_JaffaCakes118.exe 2884 drvhost.exe 2884 drvhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Driver Component = "\"C:\\Windows\\system32\\drvhost.exe\"" fad175591d470141ff5971cbaee87c4e_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drvhost.exe fad175591d470141ff5971cbaee87c4e_JaffaCakes118.exe File created C:\Windows\SysWOW64\drvhost.exe fad175591d470141ff5971cbaee87c4e_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2884 set thread context of 2712 2884 drvhost.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 4 IoCs
pid Process 2472 reg.exe 2800 reg.exe 2156 reg.exe 2780 reg.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 2212 fad175591d470141ff5971cbaee87c4e_JaffaCakes118.exe Token: SeDebugPrivilege 2884 drvhost.exe Token: 1 2712 WinLogon.exe Token: SeCreateTokenPrivilege 2712 WinLogon.exe Token: SeAssignPrimaryTokenPrivilege 2712 WinLogon.exe Token: SeLockMemoryPrivilege 2712 WinLogon.exe Token: SeIncreaseQuotaPrivilege 2712 WinLogon.exe Token: SeMachineAccountPrivilege 2712 WinLogon.exe Token: SeTcbPrivilege 2712 WinLogon.exe Token: SeSecurityPrivilege 2712 WinLogon.exe Token: SeTakeOwnershipPrivilege 2712 WinLogon.exe Token: SeLoadDriverPrivilege 2712 WinLogon.exe Token: SeSystemProfilePrivilege 2712 WinLogon.exe Token: SeSystemtimePrivilege 2712 WinLogon.exe Token: SeProfSingleProcessPrivilege 2712 WinLogon.exe Token: SeIncBasePriorityPrivilege 2712 WinLogon.exe Token: SeCreatePagefilePrivilege 2712 WinLogon.exe Token: SeCreatePermanentPrivilege 2712 WinLogon.exe Token: SeBackupPrivilege 2712 WinLogon.exe Token: SeRestorePrivilege 2712 WinLogon.exe Token: SeShutdownPrivilege 2712 WinLogon.exe Token: SeDebugPrivilege 2712 WinLogon.exe Token: SeAuditPrivilege 2712 WinLogon.exe Token: SeSystemEnvironmentPrivilege 2712 WinLogon.exe Token: SeChangeNotifyPrivilege 2712 WinLogon.exe Token: SeRemoteShutdownPrivilege 2712 WinLogon.exe Token: SeUndockPrivilege 2712 WinLogon.exe Token: SeSyncAgentPrivilege 2712 WinLogon.exe Token: SeEnableDelegationPrivilege 2712 WinLogon.exe Token: SeManageVolumePrivilege 2712 WinLogon.exe Token: SeImpersonatePrivilege 2712 WinLogon.exe Token: SeCreateGlobalPrivilege 2712 WinLogon.exe Token: 31 2712 WinLogon.exe Token: 32 2712 WinLogon.exe Token: 33 2712 WinLogon.exe Token: 34 2712 WinLogon.exe Token: 35 2712 WinLogon.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2712 WinLogon.exe 2712 WinLogon.exe 2712 WinLogon.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2884 2212 fad175591d470141ff5971cbaee87c4e_JaffaCakes118.exe 28 PID 2212 wrote to memory of 2884 2212 fad175591d470141ff5971cbaee87c4e_JaffaCakes118.exe 28 PID 2212 wrote to memory of 2884 2212 fad175591d470141ff5971cbaee87c4e_JaffaCakes118.exe 28 PID 2212 wrote to memory of 2884 2212 fad175591d470141ff5971cbaee87c4e_JaffaCakes118.exe 28 PID 2884 wrote to memory of 2712 2884 drvhost.exe 29 PID 2884 wrote to memory of 2712 2884 drvhost.exe 29 PID 2884 wrote to memory of 2712 2884 drvhost.exe 29 PID 2884 wrote to memory of 2712 2884 drvhost.exe 29 PID 2884 wrote to memory of 2712 2884 drvhost.exe 29 PID 2884 wrote to memory of 2712 2884 drvhost.exe 29 PID 2884 wrote to memory of 2712 2884 drvhost.exe 29 PID 2884 wrote to memory of 2712 2884 drvhost.exe 29 PID 2712 wrote to memory of 2376 2712 WinLogon.exe 30 PID 2712 wrote to memory of 2376 2712 WinLogon.exe 30 PID 2712 wrote to memory of 2376 2712 WinLogon.exe 30 PID 2712 wrote to memory of 2376 2712 WinLogon.exe 30 PID 2712 wrote to memory of 2516 2712 WinLogon.exe 31 PID 2712 wrote to memory of 2516 2712 WinLogon.exe 31 PID 2712 wrote to memory of 2516 2712 WinLogon.exe 31 PID 2712 wrote to memory of 2516 2712 WinLogon.exe 31 PID 2712 wrote to memory of 1952 2712 WinLogon.exe 33 PID 2712 wrote to memory of 1952 2712 WinLogon.exe 33 PID 2712 wrote to memory of 1952 2712 WinLogon.exe 33 PID 2712 wrote to memory of 1952 2712 WinLogon.exe 33 PID 2712 wrote to memory of 2360 2712 WinLogon.exe 36 PID 2712 wrote to memory of 2360 2712 WinLogon.exe 36 PID 2712 wrote to memory of 2360 2712 WinLogon.exe 36 PID 2712 wrote to memory of 2360 2712 WinLogon.exe 36 PID 2376 wrote to memory of 2472 2376 cmd.exe 38 PID 2376 wrote to memory of 2472 2376 cmd.exe 38 PID 2376 wrote to memory of 2472 2376 cmd.exe 38 PID 2376 wrote to memory of 2472 2376 cmd.exe 38 PID 2516 wrote to memory of 2780 2516 cmd.exe 39 PID 2516 wrote to memory of 2780 2516 cmd.exe 39 PID 2516 wrote to memory of 2780 2516 cmd.exe 39 PID 2516 wrote to memory of 2780 2516 cmd.exe 39 PID 2360 wrote to memory of 2156 2360 cmd.exe 41 PID 2360 wrote to memory of 2156 2360 cmd.exe 41 PID 2360 wrote to memory of 2156 2360 cmd.exe 41 PID 2360 wrote to memory of 2156 2360 cmd.exe 41 PID 1952 wrote to memory of 2800 1952 cmd.exe 40 PID 1952 wrote to memory of 2800 1952 cmd.exe 40 PID 1952 wrote to memory of 2800 1952 cmd.exe 40 PID 1952 wrote to memory of 2800 1952 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\fad175591d470141ff5971cbaee87c4e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fad175591d470141ff5971cbaee87c4e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\drvhost.exe"C:\Windows\system32\drvhost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\ProgramData\WinLogon.exeC:\ProgramData\WinLogon.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:2472
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\ProgramData\WinLogon.exe" /t REG_SZ /d "C:\ProgramData\WinLogon.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\ProgramData\WinLogon.exe" /t REG_SZ /d "C:\ProgramData\WinLogon.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:2780
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:2800
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\9UK48PUZP1.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\9UK48PUZP1.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\9UK48PUZP1.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\9UK48PUZP1.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:2156
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD536c689700adbb227867e409938607270
SHA16123e236f73faa37600a60107a5b167980b83a61
SHA256a2158014ecd471868954d0e97397f9df43e310c48d56fa0b5a6ef908dc654adf
SHA512c75728ed30135032a6755e33b9034b98c871554c33a4b8ba1586e0b3282dbc65e3b61571d407365b24289dae2de56b514ef0db744f85e6648dc6432a33b85fef
-
Filesize
592KB
MD5fad175591d470141ff5971cbaee87c4e
SHA1d3e083ab92a62682dd9425ca3e76ae74d97bfe30
SHA2565a814a0e6d8c44ba3519d4d11d39a22730a62729dce0bbda8d2946e5f02b7afb
SHA512fdaf8f1bfc719a9c85aa2afe07ad1aa45db2dc1cda5b77ed77820f911416a71c8c1a9e043290932824a7f1df1d28a2e274c9f8eae04f12df2bb975e9e298d2cc