Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe
-
Size
196KB
-
MD5
5d85d71be02948694ea0d07bba6e329b
-
SHA1
d8eeddcced6f59b582ecefda5f3d6ef0d74f2bbb
-
SHA256
0366c69735d1f7504da1b8f50f2c74d27297f116653be232cded3d4d925c8c18
-
SHA512
6a91d97658d66d12eb4f519bddfd05a5ccdc66862c13bfee2e427889b383aeabe5d8d5edff19b58be63c01567867513308295aa38829516d768112245025a43a
-
SSDEEP
3072:mA+YHMDqHNma8yzw1aBOR5OE1EM2jASY1atZgn37zpnop2WtXvs3RA/FLpcuR:mA+YHqyM1ay92NgvpnoJtEhANLpd
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2bf41070-b2b1-21d1-b5c1-0305f4055515}\StubPath = "C:\\windows\\svcr.exe" svcr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2bf41070-b2b1-21d1-b5c1-0305f4055515} svcr.exe -
Deletes itself 1 IoCs
pid Process 2248 svcr.exe -
Executes dropped EXE 1 IoCs
pid Process 2248 svcr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\svcr.exe" 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\svcr.exe" 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 svcr.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\svcr.exe 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe File created C:\Windows\svcr.exe 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 484 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe 2248 svcr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2248 svcr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 484 wrote to memory of 2480 484 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe 31 PID 484 wrote to memory of 2480 484 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe 31 PID 484 wrote to memory of 2480 484 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe 31 PID 484 wrote to memory of 2480 484 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe 31 PID 484 wrote to memory of 2248 484 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe 32 PID 484 wrote to memory of 2248 484 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe 32 PID 484 wrote to memory of 2248 484 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe 32 PID 484 wrote to memory of 2248 484 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe 32 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33 PID 2248 wrote to memory of 2828 2248 svcr.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2480
-
-
C:\Windows\svcr.exe"C:\Windows\svcr.exe" "C:\Users\Admin\AppData\Local\Temp\5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Deletes itself
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\NOTEPAD.EXENOTEPAD.EXE3⤵PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD55d85d71be02948694ea0d07bba6e329b
SHA1d8eeddcced6f59b582ecefda5f3d6ef0d74f2bbb
SHA2560366c69735d1f7504da1b8f50f2c74d27297f116653be232cded3d4d925c8c18
SHA5126a91d97658d66d12eb4f519bddfd05a5ccdc66862c13bfee2e427889b383aeabe5d8d5edff19b58be63c01567867513308295aa38829516d768112245025a43a