Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
42s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 04:07
Behavioral task
behavioral1
Sample
210619e23f9680333393f28461f093d6_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
210619e23f9680333393f28461f093d6_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
210619e23f9680333393f28461f093d6_JaffaCakes118.exe
-
Size
404KB
-
MD5
210619e23f9680333393f28461f093d6
-
SHA1
2425077adfacabb570fc6e717f987f9d8e8c5ff7
-
SHA256
cc16d24d1d6b7c806908c6f16ac3827c1d352e4c0c05e4ad47a391746688562a
-
SHA512
c12ffe1c465b8884cfc816e6b6e10fdc1a3dcdb419cf2c7643eba69416005d019f4b43084625ae36fc51e2ce3e4c8929e0aaa129c1bcbb61604de9f201837715
-
SSDEEP
6144:kTnjnvrM3mjHGh5Doh9Z5cAea4Jv81E66Hwc2Fq4t:kHn438Hwerea2vEEFz2F
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe SCVVHSOT.exe" 210619e23f9680333393f28461f093d6_JaffaCakes118.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 210619e23f9680333393f28461f093d6_JaffaCakes118.exe -
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/2024-0-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral1/files/0x000700000001444c-5.dat upx behavioral1/memory/2024-14-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral1/memory/2024-15-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral1/memory/2024-16-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral1/memory/2024-18-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral1/memory/2024-19-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral1/memory/2024-20-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral1/memory/2024-21-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral1/memory/2024-22-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral1/memory/2024-23-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral1/memory/2024-24-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral1/memory/2024-26-0x0000000000400000-0x00000000004C4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\SCVVHSOT.exe" 210619e23f9680333393f28461f093d6_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\g: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\n: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\w: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\y: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\z: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\e: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\i: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\m: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\o: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\r: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\s: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\t: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\v: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\a: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\b: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\h: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\j: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\l: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\q: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\u: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\k: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\p: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened (read-only) \??\x: 210619e23f9680333393f28461f093d6_JaffaCakes118.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\blastclnnn.exe 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\blastclnnn.exe 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\autorun.ini 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File created C:\Windows\SysWOW64\SCVVHSOT.exe 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\SCVVHSOT.exe 210619e23f9680333393f28461f093d6_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\SCVVHSOT.exe 210619e23f9680333393f28461f093d6_JaffaCakes118.exe File opened for modification C:\Windows\SCVVHSOT.exe 210619e23f9680333393f28461f093d6_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1940 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 28 PID 2024 wrote to memory of 1940 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 28 PID 2024 wrote to memory of 1940 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 28 PID 2024 wrote to memory of 1940 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 28 PID 1940 wrote to memory of 2792 1940 cmd.exe 30 PID 1940 wrote to memory of 2792 1940 cmd.exe 30 PID 1940 wrote to memory of 2792 1940 cmd.exe 30 PID 1940 wrote to memory of 2792 1940 cmd.exe 30 PID 2024 wrote to memory of 3044 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 31 PID 2024 wrote to memory of 3044 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 31 PID 2024 wrote to memory of 3044 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 31 PID 2024 wrote to memory of 3044 2024 210619e23f9680333393f28461f093d6_JaffaCakes118.exe 31 PID 3044 wrote to memory of 2384 3044 cmd.exe 33 PID 3044 wrote to memory of 2384 3044 cmd.exe 33 PID 3044 wrote to memory of 2384 3044 cmd.exe 33 PID 3044 wrote to memory of 2384 3044 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\210619e23f9680333393f28461f093d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\210619e23f9680333393f28461f093d6_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:2792
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\blastclnnn.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\blastclnnn.exe3⤵PID:2384
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
404KB
MD5210619e23f9680333393f28461f093d6
SHA12425077adfacabb570fc6e717f987f9d8e8c5ff7
SHA256cc16d24d1d6b7c806908c6f16ac3827c1d352e4c0c05e4ad47a391746688562a
SHA512c12ffe1c465b8884cfc816e6b6e10fdc1a3dcdb419cf2c7643eba69416005d019f4b43084625ae36fc51e2ce3e4c8929e0aaa129c1bcbb61604de9f201837715