Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe
-
Size
160KB
-
MD5
34e9c01cecfeb8bc0d49135599a35e55
-
SHA1
0944aba286cf170f8c14fd35b010c21dd9ed4017
-
SHA256
2d00386773d1a46b640690e54486e66aa7e00192a5f87ad3827dd005835aca41
-
SHA512
60b1e8deb24e0e26bcc9357d0bc75a96e1207e56565bd797cf400847f83bb2e263c34398702731ab4b3fe9e2d2a35efe6d9efed114331428132ffaaca2f42f0c
-
SSDEEP
3072:JJ37wWMULJBHBFc5REPDrpJcgrVG/Q7Fk8UZB9Gb:TxE5REPBJbVGo7i8kjG
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\spoolsv.exe\"" 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\spoolsv.exe\"" spoolsv.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 344 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 2676 spoolsv.exe 1972 spoolsv.exe -
Loads dropped DLL 3 IoCs
pid Process 2932 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe 2932 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe 2676 spoolsv.exe -
resource yara_rule behavioral1/memory/2932-2-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2932-4-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2932-12-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2932-15-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2932-11-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2932-10-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2932-9-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2932-156-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1972-175-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1972-176-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1972-178-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1972-181-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1972-184-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1972-187-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\spoolsv.exe\"" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\spoolsv.exe\"" 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\spoolsv.exe\"" 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\spoolsv.exe\"" spoolsv.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2160 set thread context of 2932 2160 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe 30 PID 2676 set thread context of 1972 2676 spoolsv.exe 35 -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2932 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe 1972 spoolsv.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2932 2160 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2932 2160 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2932 2160 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2932 2160 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2932 2160 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2932 2160 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2932 2160 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2932 2160 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe 30 PID 2932 wrote to memory of 344 2932 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe 31 PID 2932 wrote to memory of 344 2932 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe 31 PID 2932 wrote to memory of 344 2932 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe 31 PID 2932 wrote to memory of 344 2932 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe 31 PID 2932 wrote to memory of 2676 2932 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe 33 PID 2932 wrote to memory of 2676 2932 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe 33 PID 2932 wrote to memory of 2676 2932 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe 33 PID 2932 wrote to memory of 2676 2932 34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe 33 PID 2676 wrote to memory of 1972 2676 spoolsv.exe 35 PID 2676 wrote to memory of 1972 2676 spoolsv.exe 35 PID 2676 wrote to memory of 1972 2676 spoolsv.exe 35 PID 2676 wrote to memory of 1972 2676 spoolsv.exe 35 PID 2676 wrote to memory of 1972 2676 spoolsv.exe 35 PID 2676 wrote to memory of 1972 2676 spoolsv.exe 35 PID 2676 wrote to memory of 1972 2676 spoolsv.exe 35 PID 2676 wrote to memory of 1972 2676 spoolsv.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\spoolsv.exe" CityScape Enable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:344
-
-
C:\Users\Admin\AppData\Roaming\spoolsv.exe/d C:\Users\Admin\AppData\Local\Temp\34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Roaming\spoolsv.exe/d C:\Users\Admin\AppData\Local\Temp\34e9c01cecfeb8bc0d49135599a35e55_JaffaCakes118.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1972
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a027dcedf29b81cfcec731bf88fc9fb
SHA12325676e62d6b9a6760327c11e82fed03106d3f7
SHA25608e0ca434b737fcacc3a73d76e84ca438e0822f80997d45e900a378b294905a9
SHA512f1b32afee0e3179d6829907e03beef8e8fe70970e3d89465bbb9d3f918c0606fdd2049c075a3024027c12124c2f4591c74b5077e402fce133ffdfe355fa234fe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
160KB
MD526828de6510596828a7d78f981822e50
SHA17a05314ed0bcd75baac6b37487add117804215f2
SHA2564e6a61e468ddb58becbc26a7939a75954b5549ea94357cdd6a61f7ba85e7a23b
SHA512d6cf89bb0acb6b6eb8c9fac7cea888b57d8688c0b75bf6dcdce6c10877e44dedf79446ef42617f193456580fdea03069823c3cb0282bf594f0d0516dbf50064a