Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 15:34
Static task
static1
Behavioral task
behavioral1
Sample
0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe
-
Size
349KB
-
MD5
0ee4d9f8d2ae144c04888a48bcff202a
-
SHA1
9bd2ec9f7f60015bbb1e699524db579ce3fdd9c3
-
SHA256
04e894e42730e4d7509ddce4e42b86028d3ffb2c18b53046c1a604bb234e82e6
-
SHA512
79145ed366bf3f787d6624254ca3aeedca48cf5d4e329437814b1967ed9914b841c099ff0b827831473c78821482d7cff3b1d968b2411577c27b6747e0d557f6
-
SSDEEP
6144:tUxjHDHwIOJ4bPTni2b4HuwIAhhJHydC1+KNweG/5m1NEQ+jNCFKrWSrlTvbzpp5:tUxbj/xLblpFXld7mEJa/q/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,\"C:\\Windows\\system32\\clientsvr.exe\"" 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Temp\\0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe\"" 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2136 repair.exe 1764 repair.exe -
Loads dropped DLL 4 IoCs
pid Process 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 2136 repair.exe 2136 repair.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Mechanic = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe\"" 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\clientsvr.exe 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2812 set thread context of 460 2812 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 30 PID 2136 set thread context of 1764 2136 repair.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 2136 repair.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2812 wrote to memory of 460 2812 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 30 PID 2812 wrote to memory of 460 2812 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 30 PID 2812 wrote to memory of 460 2812 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 30 PID 2812 wrote to memory of 460 2812 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 30 PID 2812 wrote to memory of 460 2812 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 30 PID 2812 wrote to memory of 460 2812 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 30 PID 2812 wrote to memory of 460 2812 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 30 PID 2812 wrote to memory of 460 2812 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 30 PID 2812 wrote to memory of 460 2812 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 30 PID 460 wrote to memory of 2136 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 32 PID 460 wrote to memory of 2136 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 32 PID 460 wrote to memory of 2136 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 32 PID 460 wrote to memory of 2136 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 32 PID 460 wrote to memory of 2136 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 32 PID 460 wrote to memory of 2136 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 32 PID 460 wrote to memory of 2136 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 32 PID 460 wrote to memory of 2136 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 32 PID 460 wrote to memory of 2136 460 0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe 32 PID 2136 wrote to memory of 1764 2136 repair.exe 33 PID 2136 wrote to memory of 1764 2136 repair.exe 33 PID 2136 wrote to memory of 1764 2136 repair.exe 33 PID 2136 wrote to memory of 1764 2136 repair.exe 33 PID 2136 wrote to memory of 1764 2136 repair.exe 33 PID 2136 wrote to memory of 1764 2136 repair.exe 33 PID 2136 wrote to memory of 1764 2136 repair.exe 33 PID 2136 wrote to memory of 1764 2136 repair.exe 33 PID 2136 wrote to memory of 1764 2136 repair.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:460 -
C:\ProgramData\411325\repair.exe"C:\ProgramData\411325\repair.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\ProgramData\411325\repair.exe"C:\ProgramData\411325\repair.exe"4⤵
- Executes dropped EXE
PID:1764
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C3948BE6E525B8A8CEE9FAC91C9E392_AD2905D734307F784BBEC99C49201928
Filesize5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C3948BE6E525B8A8CEE9FAC91C9E392_AD2905D734307F784BBEC99C49201928
Filesize412B
MD553598497abdc1bade102a1d1c43f09c4
SHA1c298e13e58aff57352f108f83ed39ff59d2ff4aa
SHA25611b183fbd09a4ef367aaad33e84c8a8667285fec4c50edb04749812b7de3143b
SHA51205b1473b789adc5f5c58f093988308f0e6a461957928139ece5f653b3528b3dfad3141f35afa3fa1163578048c88794a83eb91bb945526f5e6c745680642de9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536040b385a037db955b7df71ec733b75
SHA1386a35cb43bf6ffa590cecddab97a44031e5b41f
SHA256ba5515d347808578bc645c8c15a3d8440538ac949a60a1d62291fe89fd26c64c
SHA512eead6430e8b11bee0fb5bb8580471a54e3c3b8aaa02266314f7f666a75d51d1f6bee81afea01a68ace44cea0d64ef32d98936f988c3b1ca09476708a3809154e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51220af9aad59407e03c164db22fd8278
SHA19df14617571e6bc258a86c0d3e1de30c0eb13d52
SHA2560de151b8603db920e7d89255d24b0ee719272d8526b476b7222afb75634901bd
SHA5125bf3d0ceb59ff2c90c2d402b7ad35634d1b9cddc4be0fabaed61fd7dda635472473c5480ef938963562a6d0d93674075af93135f4ed04a69ea22daa76477db9c
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
349KB
MD50ee4d9f8d2ae144c04888a48bcff202a
SHA19bd2ec9f7f60015bbb1e699524db579ce3fdd9c3
SHA25604e894e42730e4d7509ddce4e42b86028d3ffb2c18b53046c1a604bb234e82e6
SHA51279145ed366bf3f787d6624254ca3aeedca48cf5d4e329437814b1967ed9914b841c099ff0b827831473c78821482d7cff3b1d968b2411577c27b6747e0d557f6