Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 08:36
Static task
static1
Behavioral task
behavioral1
Sample
21b9535baf268cdf2f05a56be056599e_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
21b9535baf268cdf2f05a56be056599e_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
21b9535baf268cdf2f05a56be056599e_JaffaCakes118.exe
-
Size
96KB
-
MD5
21b9535baf268cdf2f05a56be056599e
-
SHA1
74d614ae09842947a16630d2257e8b40609151a0
-
SHA256
e0e4c279d23e919cf9557309e14ed489ca1663b5d0f4178d29c6fb904fe71e66
-
SHA512
0973a04b5b4f31f5fe655d7875600d2d5bec2482a213f1af6dae78c4e6dacf0714cba28ced136f479407b903979b78d6e282e157631b882e69a4f907dec855cf
-
SSDEEP
1536:7CQBHVwf6cO/h8LkGulSc16l6u+NMMl/KlYv1Tq5ThFRNIjN:5V7hJlu8CFFRCN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 21b9535baf268cdf2f05a56be056599e_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zfjux.exe -
Executes dropped EXE 1 IoCs
pid Process 2604 zfjux.exe -
Loads dropped DLL 2 IoCs
pid Process 2236 21b9535baf268cdf2f05a56be056599e_JaffaCakes118.exe 2236 21b9535baf268cdf2f05a56be056599e_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /M" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /g" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /x" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /W" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /d" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /U" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /m" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /G" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /Q" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /b" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /w" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /X" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /B" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /A" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /f" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /H" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /P" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /S" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /N" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /C" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /L" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /r" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /Y" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /K" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /s" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /u" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /D" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /z" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /p" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /Z" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /T" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /y" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /k" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /F" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /v" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /h" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /o" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /l" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /V" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /c" 21b9535baf268cdf2f05a56be056599e_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /R" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /a" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /I" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /j" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /e" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /J" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /O" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /E" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /c" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /n" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /q" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /t" zfjux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfjux = "C:\\Users\\Admin\\zfjux.exe /i" zfjux.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2236 21b9535baf268cdf2f05a56be056599e_JaffaCakes118.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe 2604 zfjux.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2236 21b9535baf268cdf2f05a56be056599e_JaffaCakes118.exe 2604 zfjux.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2604 2236 21b9535baf268cdf2f05a56be056599e_JaffaCakes118.exe 28 PID 2236 wrote to memory of 2604 2236 21b9535baf268cdf2f05a56be056599e_JaffaCakes118.exe 28 PID 2236 wrote to memory of 2604 2236 21b9535baf268cdf2f05a56be056599e_JaffaCakes118.exe 28 PID 2236 wrote to memory of 2604 2236 21b9535baf268cdf2f05a56be056599e_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\21b9535baf268cdf2f05a56be056599e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\21b9535baf268cdf2f05a56be056599e_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\zfjux.exe"C:\Users\Admin\zfjux.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD59c2c411fb2750788e2cf64f63e3a30ee
SHA16d7b970b3e1f71963392e907b4c3029955c6edd9
SHA256c0584b7d9e80f2be5372bf2a2e83f822e72d7f23c08c29891b9d42a48acc670a
SHA512500ee051299d4881058b986814e2aa453c2ee9dbf1bb68f0f7d0b0f140efeee1e8daf009b4469a0b1a34bd86b7292b576cb10cd0014c7ecc3222b76ed9805565