Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
22s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
471d7cdaf5830f993a0ed2f735939336_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
471d7cdaf5830f993a0ed2f735939336_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
471d7cdaf5830f993a0ed2f735939336_JaffaCakes118.exe
-
Size
197KB
-
MD5
471d7cdaf5830f993a0ed2f735939336
-
SHA1
74a07388c3a9203c33cc8be2a30b7cd49630ffec
-
SHA256
b2e9cc8c707eba04dbf172a2a2fc99a2b05e51bbc95a10272a7818cc666c0935
-
SHA512
ed853db678a24604dfd826637a911ead03425f19dea1e1bc3336a40e284b86eb352dd5968f578f7c0a33884808321e5948eabaeda270fade11ead63997fbdfcb
-
SSDEEP
3072:IQY/X0OCbGxI8PfdgvUrWCTdrzW//0tWPdM:IQYc2js9+WUIVM
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmom.exe = "C:\\WINDOWS\\Resources\\Themes\\Lunastyle.exe" reg.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\WINDOWS\Resources\Themes\Lunastyle.exe 471d7cdaf5830f993a0ed2f735939336_JaffaCakes118.exe File created C:\WINDOWS\Resources\Themes\Lunastyle.exe 471d7cdaf5830f993a0ed2f735939336_JaffaCakes118.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 664 reg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2388 471d7cdaf5830f993a0ed2f735939336_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2388 wrote to memory of 664 2388 471d7cdaf5830f993a0ed2f735939336_JaffaCakes118.exe 29 PID 2388 wrote to memory of 664 2388 471d7cdaf5830f993a0ed2f735939336_JaffaCakes118.exe 29 PID 2388 wrote to memory of 664 2388 471d7cdaf5830f993a0ed2f735939336_JaffaCakes118.exe 29 PID 2388 wrote to memory of 2052 2388 471d7cdaf5830f993a0ed2f735939336_JaffaCakes118.exe 30 PID 2388 wrote to memory of 2052 2388 471d7cdaf5830f993a0ed2f735939336_JaffaCakes118.exe 30 PID 2388 wrote to memory of 2052 2388 471d7cdaf5830f993a0ed2f735939336_JaffaCakes118.exe 30 PID 2052 wrote to memory of 2108 2052 cmd.exe 33 PID 2052 wrote to memory of 2108 2052 cmd.exe 33 PID 2052 wrote to memory of 2108 2052 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\471d7cdaf5830f993a0ed2f735939336_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\471d7cdaf5830f993a0ed2f735939336_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\system32\reg.exereg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- UAC bypass
- Modifies registry key
PID:664
-
-
C:\Windows\system32\cmd.execmd.exe /c reg add Hkey_Current_User\Software\Microsoft\Windows\CurrentVersion\Run /v ctfmom.exe /t REG_SZ /d C:\WINDOWS\Resources\Themes\Lunastyle.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\system32\reg.exereg add Hkey_Current_User\Software\Microsoft\Windows\CurrentVersion\Run /v ctfmom.exe /t REG_SZ /d C:\WINDOWS\Resources\Themes\Lunastyle.exe /f3⤵
- Adds Run key to start application
PID:2108
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1