Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
35ee2341f375946b8a443c5fe92deeb2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
35ee2341f375946b8a443c5fe92deeb2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
35ee2341f375946b8a443c5fe92deeb2_JaffaCakes118.exe
-
Size
100KB
-
MD5
35ee2341f375946b8a443c5fe92deeb2
-
SHA1
3ce3876dc104349fed9d482bca45a390c4e62887
-
SHA256
650f482b03b649e52a666d25a8d27cf0c6bea33e1bd9c228ab10806caf11bc7e
-
SHA512
6c777976a9cba345a81d60ee7717b1f09ded1e274f33fec149ca16b2435f52bb2f451d7eadf812aef052ebdb95efed70d9d84c6bea036c26a77677e095e32c02
-
SSDEEP
1536:s1tGt82NTzwYMGAc4ohrPXo+73Rez8b0SysNIjP:VwHurPX7CsCP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 35ee2341f375946b8a443c5fe92deeb2_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zoiic.exe -
Executes dropped EXE 1 IoCs
pid Process 2680 zoiic.exe -
Loads dropped DLL 2 IoCs
pid Process 2756 35ee2341f375946b8a443c5fe92deeb2_JaffaCakes118.exe 2756 35ee2341f375946b8a443c5fe92deeb2_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /Q" 35ee2341f375946b8a443c5fe92deeb2_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /A" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /p" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /D" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /Y" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /O" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /j" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /E" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /H" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /d" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /w" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /u" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /Z" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /L" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /q" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /h" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /x" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /I" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /l" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /J" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /P" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /T" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /B" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /g" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /i" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /m" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /V" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /Q" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /X" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /v" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /n" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /c" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /r" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /k" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /S" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /y" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /e" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /b" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /f" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /s" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /M" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /t" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /N" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /U" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /R" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /C" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /o" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /K" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /G" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /F" zoiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoiic = "C:\\Users\\Admin\\zoiic.exe /a" zoiic.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2756 35ee2341f375946b8a443c5fe92deeb2_JaffaCakes118.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe 2680 zoiic.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2756 35ee2341f375946b8a443c5fe92deeb2_JaffaCakes118.exe 2680 zoiic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2680 2756 35ee2341f375946b8a443c5fe92deeb2_JaffaCakes118.exe 31 PID 2756 wrote to memory of 2680 2756 35ee2341f375946b8a443c5fe92deeb2_JaffaCakes118.exe 31 PID 2756 wrote to memory of 2680 2756 35ee2341f375946b8a443c5fe92deeb2_JaffaCakes118.exe 31 PID 2756 wrote to memory of 2680 2756 35ee2341f375946b8a443c5fe92deeb2_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\35ee2341f375946b8a443c5fe92deeb2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\35ee2341f375946b8a443c5fe92deeb2_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\zoiic.exe"C:\Users\Admin\zoiic.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5cbd918718898ee2c3c0df9fdc32264f4
SHA1c2b0d374e7c817f6876989fe91ad69fc6e62b3af
SHA256b239b430777903271d8154e9b13262dee0bb12d5401fea0308694c3bf83b6d11
SHA51272a35e20f271545dce188958820496318832722bf30859f118b92fa063c590d77cd5ee8135a10a1b8db4e9c0f42601222e069e1c8153d3eeb64cf17ce7fca9c3