Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 23:59
Static task
static1
Behavioral task
behavioral1
Sample
18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe
-
Size
285KB
-
MD5
18091b0cfce103223882f36e0553c86e
-
SHA1
302d12dbc56d0b5acf040fc238e041068c46e158
-
SHA256
04d4ba6f1864426f327e14066671c6408b4fb35db0dab83d672958f99ac3a606
-
SHA512
2c018e76c19657c532e9c03bf693cf90911c61409e9a88ab84929f0a4141b88b63435b9e44564eb824bb3b39a0115219020513f639f8ef3d357354069eb433f3
-
SSDEEP
6144:2FryXRup34sB7VF4iE/XO3KxiYVS7GK5xxt8ZkBrVk6s36Gn+W:2NL4A7vG/ea8cSFxx60rVJs36G1
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1912 F5B4.tmp -
Loads dropped DLL 2 IoCs
pid Process 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1440-1-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1440-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1440-66-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1128-68-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1128-70-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1012-196-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1440-197-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1440-198-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1440-245-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1440-389-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1440-393-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\15F.exe = "C:\\Program Files (x86)\\LP\\1942\\15F.exe" 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\1942\15F.exe 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\1942\F5B4.tmp 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\1942\15F.exe 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2088 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2732 msiexec.exe Token: SeTakeOwnershipPrivilege 2732 msiexec.exe Token: SeSecurityPrivilege 2732 msiexec.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe Token: SeShutdownPrivilege 2088 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe 2088 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1440 wrote to memory of 1128 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 30 PID 1440 wrote to memory of 1128 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 30 PID 1440 wrote to memory of 1128 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 30 PID 1440 wrote to memory of 1128 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 30 PID 1440 wrote to memory of 1012 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 32 PID 1440 wrote to memory of 1012 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 32 PID 1440 wrote to memory of 1012 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 32 PID 1440 wrote to memory of 1012 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 32 PID 1440 wrote to memory of 1912 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 36 PID 1440 wrote to memory of 1912 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 36 PID 1440 wrote to memory of 1912 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 36 PID 1440 wrote to memory of 1912 1440 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\18091b0cfce103223882f36e0553c86e_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\26417\42219.exe%C:\Users\Admin\AppData\Roaming\264172⤵PID:1128
-
-
C:\Users\Admin\AppData\Local\Temp\18091b0cfce103223882f36e0553c86e_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\18091b0cfce103223882f36e0553c86e_JaffaCakes118.exe startC:\Program Files (x86)\1709A\lvvm.exe%C:\Program Files (x86)\1709A2⤵PID:1012
-
-
C:\Program Files (x86)\LP\1942\F5B4.tmp"C:\Program Files (x86)\LP\1942\F5B4.tmp"2⤵
- Executes dropped EXE
PID:1912
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2088
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD56bab370ebda308718a0cb741e5ac824d
SHA119779b68d1c23a8d372bede7a2dc2b4f05054d6e
SHA25687db8ad5cba4fbbfa6f682110d2beb34de47276f68654aca0f4056579433b8fa
SHA5126e343c4c057891e51d78dd3527de7ef00699551343405361dd9d5609c228c9aff7d984d86dcc096ecefd7b7fe2a20d36690d9036fa290bd1809bbd3ca54e05e5
-
Filesize
996B
MD588c95cd0579b72f47a88e074b77cfd48
SHA13255f6d313a46a9630020b6f7fa8f07c69c1b6c8
SHA2565d71e237ff9fda2e97a156151326a0560a7aad52330278eaf5dbd0025c7e62c5
SHA5127881544c2924fd607afae7e185d72d4f992c0f827e1ee4f7ebf669046021fedb3cbcc638643b98b609f3f94838457360f750a38a8f7ce9f95f225f939be1bf91
-
Filesize
1KB
MD5567457bf1ff0a33c5b067c2da3836caf
SHA18722d238ece006162e0796c3ce6c3889811aabdc
SHA256adc9398e381ebb9182921af8c29668d33270fc6caba6229cd2cc3f5b60cf5147
SHA51291a3f1ce0d42fbc258761ffa32cb862a8583ca58ca66f2a4d843e504a18986337e58e1dda38922ab1cc959bddaeeeac9b3e73f0d47a46ca86e758618e62063e3
-
Filesize
600B
MD5e9f8805389dd1b6193b842567de7a9d8
SHA10616cc2becdcaaff33166a84e1ca8153ac2d40b5
SHA2564526df553754d03e5f59eafa6988dcee593f15224512a24640ed32c4befee438
SHA5125f90e3e0bd14ea7a5f45676e8e998a3259876f11de87ed6f084a3006ea8b7b1627c8ccf54e2f98032ac155930fc9e461f53db1ed9d3439687b00ce4c4f997010
-
Filesize
102KB
MD56d7f922d6214ef1996346395afd017be
SHA15594d286e8b8e46008426e15ffd53e86f4143d15
SHA2564e58ef597c40404d3286c87cc13ea0563f4d08dacb4b40ea3d8b6744221898ae
SHA5129dc8ac8d33268face5a007dce5cf5c7c1b749f1a656fdc70276ad431392978f47fbbae0e1d625040acc01641d9f7b5341d7b28b68169f39a1df789ea12654626