Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 03:47
Static task
static1
Behavioral task
behavioral1
Sample
894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe
-
Size
523KB
-
MD5
894737078b3cd6b44f6f4d6db828bee8
-
SHA1
c618cb2da208066781f6644326077863d2688cb2
-
SHA256
e0ce0775b5ba31db0f90d90d4c56c78a5bd7bacfdb77a616e22f41695862527e
-
SHA512
6e055815bb256ce85884be07da847738f2cd5374ac862414a10de6bb956919fb8d5f3027c773392cc3765c1bef34a9acb9c438cafd339e0fd853caf314f6eb07
-
SSDEEP
12288:oQJkMqtWvQB95/Zxc4WHqJjd/vfMzAhzWYJ9X6z4MOig:S0yfai3MkVJa4Bx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2876 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1676 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 2260 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe -
Loads dropped DLL 4 IoCs
pid Process 2556 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 1676 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 1408 taskmgr.exe 1408 taskmgr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\DefenderSecurity = "C:\\Users\\Admin\\AppData\\Roaming\\Security\\SecurityDefender.exe" 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1688 set thread context of 2556 1688 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 28 PID 1676 set thread context of 2260 1676 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2192 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2556 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 2556 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 2556 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 2260 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 2260 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 2260 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 2260 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 2260 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 2260 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 2260 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2260 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 1408 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1688 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe Token: 33 1688 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1688 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe Token: SeDebugPrivilege 2556 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe Token: SeDebugPrivilege 1676 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe Token: 33 1676 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe Token: SeIncBasePriorityPrivilege 1676 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe Token: SeDebugPrivilege 2260 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe Token: SeDebugPrivilege 1408 taskmgr.exe Token: 33 2260 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe Token: SeIncBasePriorityPrivilege 2260 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe 1408 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2260 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2556 1688 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 28 PID 1688 wrote to memory of 2556 1688 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 28 PID 1688 wrote to memory of 2556 1688 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 28 PID 1688 wrote to memory of 2556 1688 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 28 PID 1688 wrote to memory of 2556 1688 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 28 PID 1688 wrote to memory of 2556 1688 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 28 PID 1688 wrote to memory of 2556 1688 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 28 PID 1688 wrote to memory of 2556 1688 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 28 PID 1688 wrote to memory of 2556 1688 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 28 PID 2556 wrote to memory of 1676 2556 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 30 PID 2556 wrote to memory of 1676 2556 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 30 PID 2556 wrote to memory of 1676 2556 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 30 PID 2556 wrote to memory of 1676 2556 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 30 PID 2556 wrote to memory of 2876 2556 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 31 PID 2556 wrote to memory of 2876 2556 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 31 PID 2556 wrote to memory of 2876 2556 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 31 PID 2556 wrote to memory of 2876 2556 894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe 31 PID 2876 wrote to memory of 2192 2876 cmd.exe 33 PID 2876 wrote to memory of 2192 2876 cmd.exe 33 PID 2876 wrote to memory of 2192 2876 cmd.exe 33 PID 2876 wrote to memory of 2192 2876 cmd.exe 33 PID 1676 wrote to memory of 2260 1676 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 34 PID 1676 wrote to memory of 2260 1676 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 34 PID 1676 wrote to memory of 2260 1676 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 34 PID 1676 wrote to memory of 2260 1676 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 34 PID 1676 wrote to memory of 2260 1676 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 34 PID 1676 wrote to memory of 2260 1676 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 34 PID 1676 wrote to memory of 2260 1676 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 34 PID 1676 wrote to memory of 2260 1676 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 34 PID 1676 wrote to memory of 2260 1676 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 34 PID 2260 wrote to memory of 1408 2260 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 35 PID 2260 wrote to memory of 1408 2260 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 35 PID 2260 wrote to memory of 1408 2260 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 35 PID 2260 wrote to memory of 1408 2260 894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\894737078b3cd6b44f6f4d6db828bee8_jaffacakes118\894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\894737078b3cd6b44f6f4d6db828bee8_jaffacakes118\894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\894737078b3cd6b44f6f4d6db828bee8_jaffacakes118\894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\894737078b3cd6b44f6f4d6db828bee8_jaffacakes118\894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\taskmgr.exe"C:\Windows\System32\taskmgr.exe"5⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1408
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\894737078b3cd6b44f6f4d6db828bee8_JaffaCakes118.exe"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:2192
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\894737078b3cd6b44f6f4d6db828bee8_jaffacakes118\894737078b3cd6b44f6f4d6db828bee8_jaffacakes118.exe
Filesize523KB
MD5894737078b3cd6b44f6f4d6db828bee8
SHA1c618cb2da208066781f6644326077863d2688cb2
SHA256e0ce0775b5ba31db0f90d90d4c56c78a5bd7bacfdb77a616e22f41695862527e
SHA5126e055815bb256ce85884be07da847738f2cd5374ac862414a10de6bb956919fb8d5f3027c773392cc3765c1bef34a9acb9c438cafd339e0fd853caf314f6eb07