Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
29d561be6a08a4a4970b5371bc63e9a2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
29d561be6a08a4a4970b5371bc63e9a2_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
29d561be6a08a4a4970b5371bc63e9a2_JaffaCakes118.exe
-
Size
205KB
-
MD5
29d561be6a08a4a4970b5371bc63e9a2
-
SHA1
52418ac111b7da8c0c9f2d414a9e920a6acb7935
-
SHA256
e60cfaa791c003a183ad787fb0287925360cd2a4dc75c72c5721d4fe7d6895d1
-
SHA512
faaae58a9aa5e2a7b37dff772b54610b4031d3b59990213ffeea962d7e1fa6930fd8ddb7f4c9f548361be3610ce407c8da3e77887c2121a6da462f42168f0f5c
-
SSDEEP
6144:vW8Ixnn5g5x6Yt+QRY2zlF1gwczQb2zuZCv5kT:vRI5Ox6YtRR/f15b2CZCRS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2540 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2388 29d561be6a08a4a4970b5371bc63e9a2_JaffaCakes118.exe 2388 29d561be6a08a4a4970b5371bc63e9a2_JaffaCakes118.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\586ea3af = "Ož!\x13\x1f\x10éYàZòOéÝ\x14¼à\x1fùùM`Ìw\u0081Å\x12È䧰&ù\x0fI\x0eD¥\x0f\x06]¾\tŸ…îá¤^ÌÎá™÷Œ©ôœÙT•UŒÌ\x17ñÆÍIùd¶5á\x15l™µ†ŽAyÖ§Ä.^DUNŽ!‰–Éi\x11$qÍ.Å\x17Î)Uޜɵv\x06ìñÏ\x17\x0e\x1e,öŒÌ.©\x15Võä\x0fÕå‘ö7ŽÆ…v!]äÁ^¾Æå©]\r\x04æ\x04´îž¾Ý凟%Ž\x04É=y§Ünî´¡a&¾¦Ÿ\x11ý¡¾´\x19Œ\\ße·mÅ%É>o'ù‘NmÑ!¬\u0081Ý™.\x1e\u008d߬ŒM&~±Ÿ†5Ö\u00ad4\x0e\u008d^äí¤÷vþÝ=\x06¾®þ5±1!&yž‡Ü9‡¬ÙO/\fÑ\x0fLÙ¹&å}" 29d561be6a08a4a4970b5371bc63e9a2_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\586ea3af = "Ož!\x13\x1f\x10éYàZòOéÝ\x14¼à\x1fùùM`Ìw\u0081Å\x12È䧰&ù\x0fI\x0eD¥\x0f\x06]¾\tŸ…îá¤^ÌÎá™÷Œ©ôœÙT•UŒÌ\x17ñÆÍIùd¶5á\x15l™µ†ŽAyÖ§Ä.^DUNŽ!‰–Éi\x11$qÍ.Å\x17Î)Uޜɵv\x06ìñÏ\x17\x0e\x1e,öŒÌ.©\x15Võä\x0fÕå‘ö7ŽÆ…v!]äÁ^¾Æå©]\r\x04æ\x04´îž¾Ý凟%Ž\x04É=y§Ünî´¡a&¾¦Ÿ\x11ý¡¾´\x19Œ\\ße·mÅ%É>o'ù‘NmÑ!¬\u0081Ý™.\x1e\u008d߬ŒM&~±Ÿ†5Ö\u00ad4\x0e\u008d^äí¤÷vþÝ=\x06¾®þ5±1!&yž‡Ü9‡¬ÙO/\fÑ\x0fLÙ¹&å}" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 29d561be6a08a4a4970b5371bc63e9a2_JaffaCakes118.exe File opened for modification C:\Windows\apppatch\svchost.exe 29d561be6a08a4a4970b5371bc63e9a2_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2388 29d561be6a08a4a4970b5371bc63e9a2_JaffaCakes118.exe 2388 29d561be6a08a4a4970b5371bc63e9a2_JaffaCakes118.exe 2388 29d561be6a08a4a4970b5371bc63e9a2_JaffaCakes118.exe 2388 29d561be6a08a4a4970b5371bc63e9a2_JaffaCakes118.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2388 29d561be6a08a4a4970b5371bc63e9a2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2540 2388 29d561be6a08a4a4970b5371bc63e9a2_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2540 2388 29d561be6a08a4a4970b5371bc63e9a2_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2540 2388 29d561be6a08a4a4970b5371bc63e9a2_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2540 2388 29d561be6a08a4a4970b5371bc63e9a2_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\29d561be6a08a4a4970b5371bc63e9a2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29d561be6a08a4a4970b5371bc63e9a2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b9c80c4218cb8652b5e3f7ea3a25b8d
SHA142c88ded78515ff5717eb2210d86258131d5fa68
SHA2569450c7b2087ca8befbf74e252a283a7b6af80be8d7fb65fca338c1042cf8ce2b
SHA512413fd138f8598c3d0e77b936d9ba79d8d867386f043602cec05d30ac0c4c7c9ccec1213e56e448eff31c2f404a5ce83a3385d4edc9661cf945bb574ccea8a17f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NIUC9X25\login[1].htm
Filesize168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
2KB
MD58205cc8bbaf1b7ff62153d60deb4b4f3
SHA1f40cd737c1b1b1964c46b07f1879812311b1b825
SHA256804f565984e989250d75c82d37cb608f0a95383637b3648fdd116a5faf24a470
SHA512dc26bc8f56984fb8ed32b49c24ef587fca0643422fcc64b5188fd6f59bddd94450cd3e28060a378cf473648a6d54c80ed0b3c054de7336649b0b453542c748c5
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
23KB
MD5cad763e802bb4a60628cff7b5e2b8f0a
SHA17e93c7d52373da4f544acadd936a99a7be401cfa
SHA25620bf1ac9d4f5d0c2426206ead1e3030140829e3d8582a65857575d86790af526
SHA512e0077b4961c55b721630cffc8c3a4e921a2907ed11bca7413ad5d707e404c09207eab1f109759fdbef5535d5426b1d12ac041e715d148349e35fe958557e9545
-
Filesize
1KB
MD54bff9da6f2384eec6e98df6dfcb813c6
SHA106c17e36e81e3dc81d3277dcf595431f9b198049
SHA2561020cab9697a2f9e4382172c3503323452800b8f48888d9ec49752f4e6c6b0a3
SHA512e7c7d47300dd31106ebe6e56fef3409ab52974b46791af24678087fed8bf74ca0a96f805a9a07acb42bef44567f76f62b494ad2c37dd0f45bd46e04313b34c1c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
23KB
MD547bf1f4d187b955dab3f9fb19947d7b5
SHA11974bff3d9036257ba2db71c000ed31811b2c8df
SHA256f15a8429d24ffa7de9f95aca2e5c7686958de7aaf361b080fe26b89889a7542a
SHA512dda91bda937a01e30c7dfa7d56053e5e2ce36658bf36f00a68bba7686f6c8c5fd3144e8d8e58e2eb1723b57fb5271b93edbc2b82f8209cb7bc3c2460dc6413cb
-
Filesize
2KB
MD5d5732a72d35553c40f7fa53ea861194f
SHA177d5754e1cae25ae4a7e9cdaf8b142556a8952f7
SHA2568fa97b9d7795a6606f309a43f2636082d5462fd7e98755a5732522ff4b5bd2b4
SHA5123240bb395e45f2bba7af64d933028e1f4a4e8d6d25b58d09c55e29d25fd09e62fe29b66c5bfcf35c2a7935e6ed663c2e4e1573dc061027440b00ce3be465517f
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
205KB
MD55e67c9c7fb5ef6d951acaeeb38939b56
SHA12cae1c906a3c4068bc4652ab8e210189f7473f86
SHA25684609f11f1185ec851a46f844896312230d035d54701c55bca5775a50dfa42b8
SHA51288705b7032589ff603c67fd49a244712627227502ae795560f2831fd550bd0c75fccf3c85fe5c715f7e98a245c6f83d582dfa5a40ad9af924a6e8d958ee18e89