Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 12:21 UTC
Static task
static1
Behavioral task
behavioral1
Sample
29f8d6102eeae3c9864ee958081ce7ef_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
29f8d6102eeae3c9864ee958081ce7ef_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
29f8d6102eeae3c9864ee958081ce7ef_JaffaCakes118.exe
-
Size
384KB
-
MD5
29f8d6102eeae3c9864ee958081ce7ef
-
SHA1
2b463d285559fdbe61c213ae0254c5ce0a54ef73
-
SHA256
3c002ac95b57e2a7597b4fda5b82a317bb5f60d66dbcb06b0b6d290e34306c6d
-
SHA512
5d55b23ccaad544605002202ff6ac16ed85aa8aaad929b4c72e938b9ca7f7dd969dbf340fb0afaaa9218bb966063c2e98961963f4ba670a427ef4f7f6c1796ac
-
SSDEEP
12288:R4/kOVG3MjYXrM08apXYT0zXAspwGD6pq2p:R4/XG3Mj6pIT0l2GD65
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 043A6AEB00014973000BD86DB4EB2331.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000BD86DB4EB2331.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2196 043A6AEB00014973000BD86DB4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 2196 043A6AEB00014973000BD86DB4EB2331.exe -
Loads dropped DLL 1 IoCs
pid Process 2388 29f8d6102eeae3c9864ee958081ce7ef_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000BD86DB4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000BD86DB4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000BD86DB4EB2331.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 043A6AEB00014973000BD86DB4EB2331.exe -
Modifies registry class 22 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\043A6\shell\runas\command\IsolatedCommand = "\"%1\" %*" 043A6AEB00014973000BD86DB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.exe 043A6AEB00014973000BD86DB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\%s\ = "043A6" 043A6AEB00014973000BD86DB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\043A6 043A6AEB00014973000BD86DB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\043A6\DefaultIcon 043A6AEB00014973000BD86DB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\043A6\shell\runas\command 043A6AEB00014973000BD86DB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\%s 043A6AEB00014973000BD86DB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\043A6\shell\open\command\ = "\"C:\\ProgramData\\043A6AEB00014973000BD86DB4EB2331\\043A6AEB00014973000BD86DB4EB2331.exe\" -s \"%1\" %*" 043A6AEB00014973000BD86DB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\043A6\shell\start\command\ = "\"%1\" %*" 043A6AEB00014973000BD86DB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\043A6\shell\start\command\IsolatedCommand = "\"%1\" %*" 043A6AEB00014973000BD86DB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\043A6\shell\runas\command\ = "\"%1\" %*" 043A6AEB00014973000BD86DB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.exe\ = "043A6" 043A6AEB00014973000BD86DB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\043A6\ = "Application" 043A6AEB00014973000BD86DB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\043A6\Content Type = "application/x-msdownload" 043A6AEB00014973000BD86DB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\043A6\DefaultIcon\ = "%1" 043A6AEB00014973000BD86DB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\043A6\shell\open 043A6AEB00014973000BD86DB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\043A6\shell\runas 043A6AEB00014973000BD86DB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\043A6\shell\open\command 043A6AEB00014973000BD86DB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\043A6\shell 043A6AEB00014973000BD86DB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\043A6\shell\open\command\IsolatedCommand = "\"%1\" %*" 043A6AEB00014973000BD86DB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\043A6\shell\start\command 043A6AEB00014973000BD86DB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\043A6\shell\start 043A6AEB00014973000BD86DB4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2388 29f8d6102eeae3c9864ee958081ce7ef_JaffaCakes118.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2196 043A6AEB00014973000BD86DB4EB2331.exe 2196 043A6AEB00014973000BD86DB4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2196 2388 29f8d6102eeae3c9864ee958081ce7ef_JaffaCakes118.exe 29 PID 2388 wrote to memory of 2196 2388 29f8d6102eeae3c9864ee958081ce7ef_JaffaCakes118.exe 29 PID 2388 wrote to memory of 2196 2388 29f8d6102eeae3c9864ee958081ce7ef_JaffaCakes118.exe 29 PID 2388 wrote to memory of 2196 2388 29f8d6102eeae3c9864ee958081ce7ef_JaffaCakes118.exe 29 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 043A6AEB00014973000BD86DB4EB2331.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\29f8d6102eeae3c9864ee958081ce7ef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29f8d6102eeae3c9864ee958081ce7ef_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\ProgramData\043A6AEB00014973000BD86DB4EB2331\043A6AEB00014973000BD86DB4EB2331.exe"C:\ProgramData\043A6AEB00014973000BD86DB4EB2331\043A6AEB00014973000BD86DB4EB2331.exe" -d "C:\Users\Admin\AppData\Local\Temp\29f8d6102eeae3c9864ee958081ce7ef_JaffaCakes118.exe"2⤵
- UAC bypass
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2196
-
Network
- No results found
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328B
MD523f5309ce3857892fbcba42c7d9ca1de
SHA1c45c729ae006292701a59382bf5b936543f43bce
SHA25656529e6f6bf3dbe5febbd6f0679c96682ce41a2bc6db237a3233b16887e7096c
SHA512a5c5048c3da2875808a3041184be8bc1f5c0e29c9ed7d244226daf4db59716ce65336e460bcd10532355153bc02179873bd03684f9cbbce7fea265e6838c1d07
-
Filesize
384KB
MD529f8d6102eeae3c9864ee958081ce7ef
SHA12b463d285559fdbe61c213ae0254c5ce0a54ef73
SHA2563c002ac95b57e2a7597b4fda5b82a317bb5f60d66dbcb06b0b6d290e34306c6d
SHA5125d55b23ccaad544605002202ff6ac16ed85aa8aaad929b4c72e938b9ca7f7dd969dbf340fb0afaaa9218bb966063c2e98961963f4ba670a427ef4f7f6c1796ac