Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
4b88861f7732ba0068245b5fb5e3d996_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4b88861f7732ba0068245b5fb5e3d996_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4b88861f7732ba0068245b5fb5e3d996_JaffaCakes118.exe
-
Size
152KB
-
MD5
4b88861f7732ba0068245b5fb5e3d996
-
SHA1
be17fe5248bc7c86cbb216108ecb2897b4adc329
-
SHA256
60d41ddac1da88f5274a1ba1bcf7f6db9be6c41f21f06da52f7c240f5013e00a
-
SHA512
56599c385748d44c0fcea15291ff05815ef28241a40f2ee2621a50ff7aa0776bef45794440fbc4ab84c239e49a69b8f23c74a9d9ca9cb0bdfa8b43227231880e
-
SSDEEP
3072:P9bEcyZ0N5BdKxmSI7Dc/19h83AiPa2fWwkWlKYRNYqXbChk4QFrQuyNRSKsmX:1o0SxmH4/19S3AiScWnWlKYRNhbkyFU2
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4b88861f7732ba0068245b5fb5e3d996_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nooif.exe -
Executes dropped EXE 1 IoCs
pid Process 2788 nooif.exe -
Loads dropped DLL 2 IoCs
pid Process 2780 4b88861f7732ba0068245b5fb5e3d996_JaffaCakes118.exe 2780 4b88861f7732ba0068245b5fb5e3d996_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /B" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /h" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /j" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /g" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /r" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /y" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /s" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /n" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /f" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /v" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /D" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /K" 4b88861f7732ba0068245b5fb5e3d996_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /H" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /A" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /S" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /G" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /x" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /t" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /d" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /C" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /Z" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /l" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /o" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /k" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /q" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /X" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /i" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /P" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /V" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /m" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /W" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /b" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /I" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /e" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /u" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /T" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /p" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /w" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /a" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /J" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /M" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /c" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /z" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /N" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /O" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /Q" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /Y" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /K" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /R" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /E" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /U" nooif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooif = "C:\\Users\\Admin\\nooif.exe /L" nooif.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2780 4b88861f7732ba0068245b5fb5e3d996_JaffaCakes118.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe 2788 nooif.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2780 4b88861f7732ba0068245b5fb5e3d996_JaffaCakes118.exe 2788 nooif.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2788 2780 4b88861f7732ba0068245b5fb5e3d996_JaffaCakes118.exe 30 PID 2780 wrote to memory of 2788 2780 4b88861f7732ba0068245b5fb5e3d996_JaffaCakes118.exe 30 PID 2780 wrote to memory of 2788 2780 4b88861f7732ba0068245b5fb5e3d996_JaffaCakes118.exe 30 PID 2780 wrote to memory of 2788 2780 4b88861f7732ba0068245b5fb5e3d996_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b88861f7732ba0068245b5fb5e3d996_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b88861f7732ba0068245b5fb5e3d996_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\nooif.exe"C:\Users\Admin\nooif.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5a7e7c5623e99ac513a1feb025fa29db4
SHA10d79772ab50d8ddb1bab011deb757552acb438d3
SHA256547369f4e20d851f135f254b783b63415cd4e1daa880b0e40d0b314849b2fe66
SHA51287352e85360e47a8da61ee6de6f5f6b0d5f0e118735464c81723df9bc9a944207a867c22ba9a79fba15e9a48d48b78bd2d1e15ae05eeceacad0d13fd29535867