Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 20:05
Static task
static1
Behavioral task
behavioral1
Sample
261736c56c3947ccedc5e375b676b958_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
261736c56c3947ccedc5e375b676b958_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
261736c56c3947ccedc5e375b676b958_JaffaCakes118.exe
-
Size
876KB
-
MD5
261736c56c3947ccedc5e375b676b958
-
SHA1
9c4051e84983495ad136525222f82590a8d6b046
-
SHA256
62b9848f9eb468669b45b9f8daf1d2a6e89e279e7f7265c923ca4ce04f6e03cb
-
SHA512
1ff784ad21a9f31278ccc6fe17098b39264a15454bbbd28674786085c2ef196c6e3a87e1ba6a1f3cde198ba7e20f41845b613cfebc06db652613163fec506f50
-
SSDEEP
12288:+LfrxBM+Mkm3TJMpJJgFc+vM7uF3Z4mxx+KnL+0K63IfvLfrxBM+Mkm3TJMpJJgR:l3MIc+vM6QmX/l3sk3MIc+vMe
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1468 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2508 Hacker.com.cn.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Hacker.com.cn.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.exe 261736c56c3947ccedc5e375b676b958_JaffaCakes118.exe File opened for modification C:\Windows\Hacker.com.cn.exe 261736c56c3947ccedc5e375b676b958_JaffaCakes118.exe File created C:\Windows\uninstal.bat 261736c56c3947ccedc5e375b676b958_JaffaCakes118.exe -
Modifies data under HKEY_USERS 28 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BBA010D1-6925-4011-A9BE-2F3BBC9AB011}\52-a4-6c-d2-f4-72 Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-a4-6c-d2-f4-72\WpadDecision = "0" Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BBA010D1-6925-4011-A9BE-2F3BBC9AB011}\WpadDecision = "0" Hacker.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BBA010D1-6925-4011-A9BE-2F3BBC9AB011}\WpadDecisionReason = "1" Hacker.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BBA010D1-6925-4011-A9BE-2F3BBC9AB011}\WpadNetworkName = "Network 3" Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0026000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-a4-6c-d2-f4-72\WpadDecisionTime = 406fa7c94dceda01 Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-a4-6c-d2-f4-72\WpadDecisionReason = "1" Hacker.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BBA010D1-6925-4011-A9BE-2F3BBC9AB011} Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BBA010D1-6925-4011-A9BE-2F3BBC9AB011}\WpadDecisionTime = e025d4824dceda01 Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-a4-6c-d2-f4-72 Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0026000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-a4-6c-d2-f4-72\WpadDecisionTime = e025d4824dceda01 Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BBA010D1-6925-4011-A9BE-2F3BBC9AB011}\WpadDecisionTime = 406fa7c94dceda01 Hacker.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Hacker.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-a4-6c-d2-f4-72\WpadDetectedUrl Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Hacker.com.cn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2284 261736c56c3947ccedc5e375b676b958_JaffaCakes118.exe Token: SeDebugPrivilege 2508 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2508 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2508 wrote to memory of 3052 2508 Hacker.com.cn.exe 29 PID 2508 wrote to memory of 3052 2508 Hacker.com.cn.exe 29 PID 2508 wrote to memory of 3052 2508 Hacker.com.cn.exe 29 PID 2508 wrote to memory of 3052 2508 Hacker.com.cn.exe 29 PID 2284 wrote to memory of 1468 2284 261736c56c3947ccedc5e375b676b958_JaffaCakes118.exe 30 PID 2284 wrote to memory of 1468 2284 261736c56c3947ccedc5e375b676b958_JaffaCakes118.exe 30 PID 2284 wrote to memory of 1468 2284 261736c56c3947ccedc5e375b676b958_JaffaCakes118.exe 30 PID 2284 wrote to memory of 1468 2284 261736c56c3947ccedc5e375b676b958_JaffaCakes118.exe 30 PID 2284 wrote to memory of 1468 2284 261736c56c3947ccedc5e375b676b958_JaffaCakes118.exe 30 PID 2284 wrote to memory of 1468 2284 261736c56c3947ccedc5e375b676b958_JaffaCakes118.exe 30 PID 2284 wrote to memory of 1468 2284 261736c56c3947ccedc5e375b676b958_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\261736c56c3947ccedc5e375b676b958_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\261736c56c3947ccedc5e375b676b958_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat2⤵
- Deletes itself
PID:1468
-
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:3052
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
876KB
MD5261736c56c3947ccedc5e375b676b958
SHA19c4051e84983495ad136525222f82590a8d6b046
SHA25662b9848f9eb468669b45b9f8daf1d2a6e89e279e7f7265c923ca4ce04f6e03cb
SHA5121ff784ad21a9f31278ccc6fe17098b39264a15454bbbd28674786085c2ef196c6e3a87e1ba6a1f3cde198ba7e20f41845b613cfebc06db652613163fec506f50
-
Filesize
218B
MD548376054a18caafe119bb48ac8bdee81
SHA17f03fb4fb039ff54814d9a489bdf9e91b8f30f85
SHA256ac2655c74d9dff0b2b448ec63c67c594b65108fdd9ca6ee5fada487afa7a847d
SHA5121ee3732aa7eedc94b559e87c1f35763158efa83a9388d2d8cb346b33ab6fda01109eae69783f29adfab78698799f24cc21c577f4536f4486de87e38d0e68f295