Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 00:36
Static task
static1
Behavioral task
behavioral1
Sample
1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe
-
Size
265KB
-
MD5
1824dae8adaa95fb4246042076d33aa2
-
SHA1
6141db8de375b43db72504b71aecb7c1f1ec4dbf
-
SHA256
651c648966193c6558da3a02ae818af8253ca2e86f85d828e76b22c62078996b
-
SHA512
02f507c594563e698f95e8dc7c11a4d14eb9922913838f9ca59bc56e43d9816571f92493ca0decb12bc0a1ca39719e7b2ac8090e0b6d701117d4f66b9f8d01b9
-
SSDEEP
6144:otwVI56dl2hi8u6D/2/9GrLmZlcjh8hsJAiAjZvPzjrBEk0oxAOx:Uc2hi8nDe/9mclzhsJujBPzjrBEv
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2156 bsw.exe -
Executes dropped EXE 1 IoCs
pid Process 2156 bsw.exe -
Loads dropped DLL 2 IoCs
pid Process 3044 1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe 3044 1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3044 1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe 3044 1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe 3044 1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe 3044 1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe 3044 1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe 3044 1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe 3044 1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe 3044 1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2268 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2156 3044 1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe 28 PID 3044 wrote to memory of 2156 3044 1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe 28 PID 3044 wrote to memory of 2156 3044 1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe 28 PID 3044 wrote to memory of 2156 3044 1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe 28 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\bsw.exe"C:\Users\Admin\AppData\Local\bsw.exe" -gav C:\Users\Admin\AppData\Local\Temp\1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:2156
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD5bb83818fc5d101d5fe99208baaffc839
SHA1e38af44bdfd3dfe96084461dc529bb6cb72d04a4
SHA2565bf1f25ee97f96ad471e8dbebcb43d060943b9709c72f7fd565751197c760427
SHA5128277c2faecdd10803b9e3399ddaf36fea2b150ee731387f51c168fbf2095b1de1c0aa70a54cc5a721feeef95ca869a71d569ff54ba244f0b777f7b0d1df1ae68