Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe
-
Size
288KB
-
MD5
21f8913a7ec6476c5b3fd5305df7ee23
-
SHA1
cb8608f0dac6876ed92f13e2a20be57229854059
-
SHA256
368082bcb7cdbad5c9047f69ef3fc1a08570c8760692d0f841c07554e1d8763c
-
SHA512
e2c4e795e021abf78f640ec1e6448b216f8c55ba687d080ebafc9110fd5d8b842f658a8c5a258937f580fbd8e1b1c48caf08b6f2e5e69f391c8c850a4f29c4ca
-
SSDEEP
6144:BKZBzsuDVxE3lyUqqLSwAohoRa8wu5z469o0HZXbVslhi:yNsGVyz9A3Rch09Glhi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 672 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1280 uzree.exe -
Loads dropped DLL 2 IoCs
pid Process 2156 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe 2156 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\{2E5B3508-58FD-AD4F-AD0A-E58896B9C695} = "C:\\Users\\Admin\\AppData\\Roaming\\Ifixs\\uzree.exe" uzree.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2156 set thread context of 672 2156 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe 29 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Privacy 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe 1280 uzree.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2156 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe Token: SeSecurityPrivilege 2156 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe Token: SeSecurityPrivilege 2156 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2156 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe 1280 uzree.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1280 2156 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe 28 PID 2156 wrote to memory of 1280 2156 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe 28 PID 2156 wrote to memory of 1280 2156 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe 28 PID 2156 wrote to memory of 1280 2156 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe 28 PID 1280 wrote to memory of 1120 1280 uzree.exe 19 PID 1280 wrote to memory of 1120 1280 uzree.exe 19 PID 1280 wrote to memory of 1120 1280 uzree.exe 19 PID 1280 wrote to memory of 1120 1280 uzree.exe 19 PID 1280 wrote to memory of 1120 1280 uzree.exe 19 PID 1280 wrote to memory of 1180 1280 uzree.exe 20 PID 1280 wrote to memory of 1180 1280 uzree.exe 20 PID 1280 wrote to memory of 1180 1280 uzree.exe 20 PID 1280 wrote to memory of 1180 1280 uzree.exe 20 PID 1280 wrote to memory of 1180 1280 uzree.exe 20 PID 1280 wrote to memory of 1196 1280 uzree.exe 21 PID 1280 wrote to memory of 1196 1280 uzree.exe 21 PID 1280 wrote to memory of 1196 1280 uzree.exe 21 PID 1280 wrote to memory of 1196 1280 uzree.exe 21 PID 1280 wrote to memory of 1196 1280 uzree.exe 21 PID 1280 wrote to memory of 1952 1280 uzree.exe 23 PID 1280 wrote to memory of 1952 1280 uzree.exe 23 PID 1280 wrote to memory of 1952 1280 uzree.exe 23 PID 1280 wrote to memory of 1952 1280 uzree.exe 23 PID 1280 wrote to memory of 1952 1280 uzree.exe 23 PID 1280 wrote to memory of 2156 1280 uzree.exe 27 PID 1280 wrote to memory of 2156 1280 uzree.exe 27 PID 1280 wrote to memory of 2156 1280 uzree.exe 27 PID 1280 wrote to memory of 2156 1280 uzree.exe 27 PID 1280 wrote to memory of 2156 1280 uzree.exe 27 PID 2156 wrote to memory of 672 2156 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe 29 PID 2156 wrote to memory of 672 2156 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe 29 PID 2156 wrote to memory of 672 2156 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe 29 PID 2156 wrote to memory of 672 2156 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe 29 PID 2156 wrote to memory of 672 2156 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe 29 PID 2156 wrote to memory of 672 2156 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe 29 PID 2156 wrote to memory of 672 2156 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe 29 PID 2156 wrote to memory of 672 2156 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe 29 PID 2156 wrote to memory of 672 2156 21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Roaming\Ifixs\uzree.exe"C:\Users\Admin\AppData\Roaming\Ifixs\uzree.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1280
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpdb5a6338.bat"3⤵
- Deletes itself
PID:672
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD558a1f39f900693519db5c3d47ffb544b
SHA1d6761a8540052352b39f3bf2448dc060d591b502
SHA25688f4f302ab198456904cdfe043964f7e9122061a32014ae3da6b35c8847134ac
SHA512de16bb3b71649c65f5922d1c496738be337b4423e871a1219dea765c57122c18a1893f28745fe6e0914ce9ef9415edf9f7c357880bff2b566a978ec4d349de1b
-
Filesize
380B
MD599e3e7ff56386bc92a6799b0a4be59ad
SHA174840a1cc053027274c8f4fe8d1da965e2ef42df
SHA2567f1a71e8db9d68163ae505086b7c2fe26fcecba6d7f18aef9e49e4a99e6edaf7
SHA5124571701784b199a324b87cba67f95b3faa43a6f6e0e1abb7fafafe20bc6fd6367c6951874b31c10ebbefdf30f854f9986a50d1fbd80da4248a097062a2a0c49a
-
Filesize
288KB
MD5872a9de2d7daff584d6ff2e819bb8a64
SHA1f3a177a01a41ce1508bb57f614c739270856b555
SHA256261c10adcec38d2610f8cdbf87b62111007c3a57a66a03b34f3d0c9e31c09172
SHA512ba6db558d9fa76f5bf28e52d9b2d7c0f74a910420c507ac38975f2c6c0e92d6e57de89d05c05557a20538ea7b34b7aa4b94cc7bd08071f4434882500bde857e8