Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 17:21
Static task
static1
Behavioral task
behavioral1
Sample
4aa7aa248b6739dd1180fa6b10202705_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4aa7aa248b6739dd1180fa6b10202705_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4aa7aa248b6739dd1180fa6b10202705_JaffaCakes118.exe
-
Size
159KB
-
MD5
4aa7aa248b6739dd1180fa6b10202705
-
SHA1
6968491a62396631b4b72978796fd72df9f799ba
-
SHA256
b2d4b62d3216f2b84949b5a1eb063ccab815d389bf9792ff8bb9d5c17770fe7e
-
SHA512
7b4194ca49ed2dc8cd025fe7374c5481a02dad2902ff532d9162d34aa991935f3021b7c9e29c77ba92db2a5320ba1624ea75299628b25a7fd1b1fd62405009b1
-
SSDEEP
3072:Izi+CywNpn18IK8dE55l5Wo/pMwrG8uXOwmqj8ILK4qcsghQ:6ujn1y8e5IwK89WK4rQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1268 CA0A4982EC5.exe 2376 Qiy3E7.exe -
Loads dropped DLL 4 IoCs
pid Process 1628 4aa7aa248b6739dd1180fa6b10202705_JaffaCakes118.exe 1628 4aa7aa248b6739dd1180fa6b10202705_JaffaCakes118.exe 1268 CA0A4982EC5.exe 1268 CA0A4982EC5.exe -
resource yara_rule behavioral1/memory/1628-0-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1628-1-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1628-5-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1628-11-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1268-24-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1268-20-0x0000000000400000-0x000000000045F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\UJ7J2I3XYGVE4G6WPNJ = "C:\\sooi832.bin\\CA0A4982EC5.exe /q" Qiy3E7.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PhishingFilter Qiy3E7.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" Qiy3E7.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" Qiy3E7.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery Qiy3E7.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" Qiy3E7.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1628 4aa7aa248b6739dd1180fa6b10202705_JaffaCakes118.exe 1628 4aa7aa248b6739dd1180fa6b10202705_JaffaCakes118.exe 1268 CA0A4982EC5.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe 2376 Qiy3E7.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1628 4aa7aa248b6739dd1180fa6b10202705_JaffaCakes118.exe Token: SeDebugPrivilege 1628 4aa7aa248b6739dd1180fa6b10202705_JaffaCakes118.exe Token: SeDebugPrivilege 1628 4aa7aa248b6739dd1180fa6b10202705_JaffaCakes118.exe Token: SeDebugPrivilege 1628 4aa7aa248b6739dd1180fa6b10202705_JaffaCakes118.exe Token: SeDebugPrivilege 1268 CA0A4982EC5.exe Token: SeDebugPrivilege 1268 CA0A4982EC5.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe Token: SeDebugPrivilege 2376 Qiy3E7.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1268 1628 4aa7aa248b6739dd1180fa6b10202705_JaffaCakes118.exe 29 PID 1628 wrote to memory of 1268 1628 4aa7aa248b6739dd1180fa6b10202705_JaffaCakes118.exe 29 PID 1628 wrote to memory of 1268 1628 4aa7aa248b6739dd1180fa6b10202705_JaffaCakes118.exe 29 PID 1628 wrote to memory of 1268 1628 4aa7aa248b6739dd1180fa6b10202705_JaffaCakes118.exe 29 PID 1268 wrote to memory of 2376 1268 CA0A4982EC5.exe 30 PID 1268 wrote to memory of 2376 1268 CA0A4982EC5.exe 30 PID 1268 wrote to memory of 2376 1268 CA0A4982EC5.exe 30 PID 1268 wrote to memory of 2376 1268 CA0A4982EC5.exe 30 PID 1268 wrote to memory of 2376 1268 CA0A4982EC5.exe 30 PID 1268 wrote to memory of 2376 1268 CA0A4982EC5.exe 30 PID 2376 wrote to memory of 1628 2376 Qiy3E7.exe 28 PID 2376 wrote to memory of 1628 2376 Qiy3E7.exe 28 PID 2376 wrote to memory of 1628 2376 Qiy3E7.exe 28 PID 2376 wrote to memory of 1628 2376 Qiy3E7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aa7aa248b6739dd1180fa6b10202705_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4aa7aa248b6739dd1180fa6b10202705_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\sooi832.bin\CA0A4982EC5.exe"C:\sooi832.bin\CA0A4982EC5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\Qiy3E7.exe"C:\Users\Admin\AppData\Local\Temp\Qiy3E7.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2376
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD57f9a665ec1dbec7bd974ff537e4cb18c
SHA1d56c208ec63b758b4883b1c378645277f5a4ebf3
SHA256ec28a53affa2e18a0ad9a5414cda7b317a60f3ff01d5179b20a08b6d57da17fb
SHA512a3196350125327029947c368d7aed962f66d9cabce851bcdc6393f454f22da8e951b11484ce16e84caf9189d59122d35b08f6fc158e45574b7b9e94fbc7b3be1
-
Filesize
159KB
MD54aa7aa248b6739dd1180fa6b10202705
SHA16968491a62396631b4b72978796fd72df9f799ba
SHA256b2d4b62d3216f2b84949b5a1eb063ccab815d389bf9792ff8bb9d5c17770fe7e
SHA5127b4194ca49ed2dc8cd025fe7374c5481a02dad2902ff532d9162d34aa991935f3021b7c9e29c77ba92db2a5320ba1624ea75299628b25a7fd1b1fd62405009b1
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be