Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 07:37
Behavioral task
behavioral1
Sample
2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe
-
Size
1014KB
-
MD5
2b803dc365187f856d2531cba23ad60a
-
SHA1
289c51338f2f20c982156630cf4d1f47118165bc
-
SHA256
31b5cc2975dcb1382dbdacfa0a29c0a38af106e724fc6e46a22d5167fcffb2cc
-
SHA512
7cf05df0f07bb58cf02a36756fe63da20b2ee807f107d977a84c01246aa22c67a1a1341650556088d9adefa57ae41daaa20b162b14c82c852d4859688f98f3d2
-
SSDEEP
24576:GrR3eEVNyIP52Wzlh6/poYe2VAyJIuUg:Grpf/PsWD6BDJ0
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2460-1-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-3-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-15-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-33-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-48-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-6-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-17-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-42-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-40-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-38-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-47-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-36-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-54-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-51-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-49-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-30-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-28-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-26-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-24-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-21-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-13-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-11-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-9-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-7-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-5-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-4-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2460-69-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\SkinH_EL.dll 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: 33 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: 33 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: 33 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: 33 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: 33 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: 33 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: 33 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: 33 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: 33 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: 33 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: 33 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: 33 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: 33 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: 33 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: 33 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: 33 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: 33 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: 33 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: 33 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe 2460 2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2b803dc365187f856d2531cba23ad60a_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2460