Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
34caecbcc1f4ad64fb054ddf2b32fab4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
34caecbcc1f4ad64fb054ddf2b32fab4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
34caecbcc1f4ad64fb054ddf2b32fab4_JaffaCakes118.exe
-
Size
188KB
-
MD5
34caecbcc1f4ad64fb054ddf2b32fab4
-
SHA1
5aeda637b7e8468954d5f616efc3d2cef711a543
-
SHA256
805b99227471151ce4b9c8b34891bd8c6991465f82e7f0cdbc8f6872df5462c5
-
SHA512
7c8178ce57bd417c298d6f65886d51702f2a7f63f5d8b8c8363edbe4d7416dc5dc5aab95723f6b271c63e3368507026a7c4e9ae2798a814c8e99c215ed159ac1
-
SSDEEP
3072:6j4VOBQqQ7b4zxMJsSmJ6nTQFlKRilqoq6v/i:RVqM4zk0cqfMoty
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" sbqow.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 34caecbcc1f4ad64fb054ddf2b32fab4_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2692 sbqow.exe -
Loads dropped DLL 2 IoCs
pid Process 1900 34caecbcc1f4ad64fb054ddf2b32fab4_JaffaCakes118.exe 1900 34caecbcc1f4ad64fb054ddf2b32fab4_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /o" 34caecbcc1f4ad64fb054ddf2b32fab4_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /B" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /n" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /p" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /b" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /L" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /W" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /y" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /Q" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /j" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /g" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /e" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /N" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /d" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /i" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /f" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /C" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /R" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /T" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /A" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /m" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /q" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /I" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /c" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /k" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /w" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /S" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /O" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /H" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /J" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /Y" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /X" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /E" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /P" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /K" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /a" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /o" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /t" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /l" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /v" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /x" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /M" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /u" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /h" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /r" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /s" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /G" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /D" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /F" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /Z" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /z" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /V" sbqow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbqow = "C:\\Users\\Admin\\sbqow.exe /U" sbqow.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1900 34caecbcc1f4ad64fb054ddf2b32fab4_JaffaCakes118.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe 2692 sbqow.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1900 34caecbcc1f4ad64fb054ddf2b32fab4_JaffaCakes118.exe 2692 sbqow.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2692 1900 34caecbcc1f4ad64fb054ddf2b32fab4_JaffaCakes118.exe 31 PID 1900 wrote to memory of 2692 1900 34caecbcc1f4ad64fb054ddf2b32fab4_JaffaCakes118.exe 31 PID 1900 wrote to memory of 2692 1900 34caecbcc1f4ad64fb054ddf2b32fab4_JaffaCakes118.exe 31 PID 1900 wrote to memory of 2692 1900 34caecbcc1f4ad64fb054ddf2b32fab4_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\34caecbcc1f4ad64fb054ddf2b32fab4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\34caecbcc1f4ad64fb054ddf2b32fab4_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\sbqow.exe"C:\Users\Admin\sbqow.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188KB
MD5845061b7999b05634ef789d0a68f6fe9
SHA199e4faa8f11cc8f0db8b438fe6737af36a8542e7
SHA25650b3f0e71fe465504e933c977e4e6c5b23c230345b2a523879aaa37a7012e82f
SHA51287694d06a231f042af40b9ef2239a93a86c5ff7d9bb67f10820c8e08bc1ed26610417ac8318ec751f4b21cefc3ef0b7456a91ff66fe9f1ae97127c9c2d623f8e