Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe
-
Size
180KB
-
MD5
5d3b4d49ca54858fcaf4fef968dfb455
-
SHA1
c6d2a51b5c2a1c686b5eb2449df37019b7ae6f16
-
SHA256
907f8085b7d94dd5d66ecef1f4a39e5d9026dea04d41a90ba3f1111ecb381309
-
SHA512
0ce53efe18952f33a5847f464d17d6ba413cffbc0e57c174b3ea4b3e7ae85ced7235e08a8ab811863a7fd48497bac2d3e93834d121e1f4e473226e275e3c6c20
-
SSDEEP
1536:tDX1ldcxKc8NMgeGU4AeGL0TxpKwmf8y0IpWur+2RPFYSUxBphFLji:FlfcSg4dgxkcrhRVUHFLO
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xijew.exe -
Executes dropped EXE 1 IoCs
pid Process 2820 xijew.exe -
Loads dropped DLL 2 IoCs
pid Process 2248 5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe 2248 5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /Q" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /T" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /x" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /B" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /H" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /q" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /C" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /v" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /r" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /J" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /e" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /a" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /u" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /z" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /k" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /L" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /R" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /Y" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /n" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /l" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /P" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /M" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /E" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /f" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /X" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /F" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /K" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /Z" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /U" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /D" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /c" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /w" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /S" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /O" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /A" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /b" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /g" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /d" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /V" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /I" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /j" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /m" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /t" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /N" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /o" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /p" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /y" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /G" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /i" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /W" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /s" xijew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xijew = "C:\\Users\\Admin\\xijew.exe /h" xijew.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe 2820 xijew.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2248 5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe 2820 xijew.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2820 2248 5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2820 2248 5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2820 2248 5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2820 2248 5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe 31 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30 PID 2820 wrote to memory of 2248 2820 xijew.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d3b4d49ca54858fcaf4fef968dfb455_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\xijew.exe"C:\Users\Admin\xijew.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5d06e3b3a7a646a42be76e2e8bc6e1f9a
SHA1f0e457b0c0f6e1d41da18fba113a7b02ad18bcce
SHA256519549f05000d860df9ee63f148f7a3e0decc5627e14f2d1d7d673dd21bed3fc
SHA51222fe95fb57e54d4436c27ba6a4cecf4019d2f75a9ffc9cf6ee32024f60cc209bca554d66dfc7c8e86d31ee45d20ddc0cbd47fa6dc307a43fc3044668ad75c0aa