Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 14:10
Static task
static1
Behavioral task
behavioral1
Sample
5c467a6d63e504bddb4874f2a6d0f3ac_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5c467a6d63e504bddb4874f2a6d0f3ac_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5c467a6d63e504bddb4874f2a6d0f3ac_JaffaCakes118.exe
-
Size
394KB
-
MD5
5c467a6d63e504bddb4874f2a6d0f3ac
-
SHA1
3dbf2b46825b95ad38d8623b95ba63eea66e971b
-
SHA256
69ac0a2c71ff729a68c58620cacf1a9c56656684c6a3080b887518247becc1a1
-
SHA512
73f49bcfb1348e5af205d0626d389f7833bfae912bf4ea558839cfa64062f556accbd13127734a07642231157dddc1817df10fe35f09047f4a61e480cb148349
-
SSDEEP
6144:4a+yKkmd5SJhSTAlXBQUBImCdkXbx0DlI14XyIhIsC9Gvim:F3wd5shST8BQUvCEbOGUhIsmGq
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 043A6A5B00014973000BF73CB4EB2331.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000BF73CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000BF73CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000BF73CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000BF73CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000BF73CB4EB2331.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2976 043A6A5B00014973000BF73CB4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 2976 043A6A5B00014973000BF73CB4EB2331.exe -
Loads dropped DLL 1 IoCs
pid Process 2028 5c467a6d63e504bddb4874f2a6d0f3ac_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000BF73CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000BF73CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000BF73CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000BF73CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000BF73CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000BF73CB4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000BF73CB4EB2331.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 043A6A5B00014973000BF73CB4EB2331.exe -
Modifies registry class 22 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe 043A6A5B00014973000BF73CB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\043A6\shell\open 043A6A5B00014973000BF73CB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\043A6\shell\start\command\IsolatedCommand = "\"%1\" %*" 043A6A5B00014973000BF73CB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\043A6\shell\runas\command 043A6A5B00014973000BF73CB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\043A6\shell\runas 043A6A5B00014973000BF73CB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\043A6 043A6A5B00014973000BF73CB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\043A6\DefaultIcon 043A6A5B00014973000BF73CB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\043A6\shell 043A6A5B00014973000BF73CB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\043A6\shell\start\command\ = "\"%1\" %*" 043A6A5B00014973000BF73CB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\043A6\ = "Application" 043A6A5B00014973000BF73CB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\043A6\Content Type = "application/x-msdownload" 043A6A5B00014973000BF73CB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\043A6\shell\open\command\ = "\"C:\\ProgramData\\043A6A5B00014973000BF73CB4EB2331\\043A6A5B00014973000BF73CB4EB2331.exe\" -s \"%1\" %*" 043A6A5B00014973000BF73CB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\043A6\shell\start\command 043A6A5B00014973000BF73CB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\043A6\shell\start 043A6A5B00014973000BF73CB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\043A6\shell\runas\command\IsolatedCommand = "\"%1\" %*" 043A6A5B00014973000BF73CB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\043A6\shell\runas\command\ = "\"%1\" %*" 043A6A5B00014973000BF73CB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\ = "043A6" 043A6A5B00014973000BF73CB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\%s 043A6A5B00014973000BF73CB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\%s\ = "043A6" 043A6A5B00014973000BF73CB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\043A6\DefaultIcon\ = "%1" 043A6A5B00014973000BF73CB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\043A6\shell\open\command 043A6A5B00014973000BF73CB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\043A6\shell\open\command\IsolatedCommand = "\"%1\" %*" 043A6A5B00014973000BF73CB4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2028 5c467a6d63e504bddb4874f2a6d0f3ac_JaffaCakes118.exe 2976 043A6A5B00014973000BF73CB4EB2331.exe 2976 043A6A5B00014973000BF73CB4EB2331.exe 2976 043A6A5B00014973000BF73CB4EB2331.exe 2976 043A6A5B00014973000BF73CB4EB2331.exe 2976 043A6A5B00014973000BF73CB4EB2331.exe 2976 043A6A5B00014973000BF73CB4EB2331.exe 2976 043A6A5B00014973000BF73CB4EB2331.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2976 043A6A5B00014973000BF73CB4EB2331.exe 2976 043A6A5B00014973000BF73CB4EB2331.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2976 043A6A5B00014973000BF73CB4EB2331.exe 2976 043A6A5B00014973000BF73CB4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2976 043A6A5B00014973000BF73CB4EB2331.exe 2976 043A6A5B00014973000BF73CB4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2976 2028 5c467a6d63e504bddb4874f2a6d0f3ac_JaffaCakes118.exe 30 PID 2028 wrote to memory of 2976 2028 5c467a6d63e504bddb4874f2a6d0f3ac_JaffaCakes118.exe 30 PID 2028 wrote to memory of 2976 2028 5c467a6d63e504bddb4874f2a6d0f3ac_JaffaCakes118.exe 30 PID 2028 wrote to memory of 2976 2028 5c467a6d63e504bddb4874f2a6d0f3ac_JaffaCakes118.exe 30 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 043A6A5B00014973000BF73CB4EB2331.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c467a6d63e504bddb4874f2a6d0f3ac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5c467a6d63e504bddb4874f2a6d0f3ac_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\ProgramData\043A6A5B00014973000BF73CB4EB2331\043A6A5B00014973000BF73CB4EB2331.exe"C:\ProgramData\043A6A5B00014973000BF73CB4EB2331\043A6A5B00014973000BF73CB4EB2331.exe" -d "C:\Users\Admin\AppData\Local\Temp\5c467a6d63e504bddb4874f2a6d0f3ac_JaffaCakes118.exe"2⤵
- UAC bypass
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328B
MD587c3c4686a9e06665d82d192f0fdd9b4
SHA1a67b3cc504c98829c3b7817c9c0f62de62d77007
SHA2561be4347f19855dc9c9bdb0c8131c98f575494e80c0c226067a63c220319872fd
SHA51231113355ae35136dcd19fe3d0e7571d20090e826f2cc3031d76a90991bf1da1e70fe3142c091aaf479125f519c680d1f1a4c1d0847d3310524df4be8089581c5
-
Filesize
394KB
MD55c467a6d63e504bddb4874f2a6d0f3ac
SHA13dbf2b46825b95ad38d8623b95ba63eea66e971b
SHA25669ac0a2c71ff729a68c58620cacf1a9c56656684c6a3080b887518247becc1a1
SHA51273f49bcfb1348e5af205d0626d389f7833bfae912bf4ea558839cfa64062f556accbd13127734a07642231157dddc1817df10fe35f09047f4a61e480cb148349