Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 00:58
Behavioral task
behavioral1
Sample
622513edf201e66ea38937a35e93850a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
622513edf201e66ea38937a35e93850a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
622513edf201e66ea38937a35e93850a_JaffaCakes118.exe
-
Size
82KB
-
MD5
622513edf201e66ea38937a35e93850a
-
SHA1
e19867b650d564dfa019f211ce6e3d266e315d09
-
SHA256
db23ba0bbd66a759e3c3632cf8bc63f478175e4369be73db633d7b1cb7ab2898
-
SHA512
aefb09d5d38d1929e95b756ab264b889809b846e73d4d30167f3173fefe1f20bd0898a3647a60584c4fe7ddeeac9bbc8d0005f35e1bfa9ad74d1c2398a11cae5
-
SSDEEP
1536:CKl29a7899OpF5vRhKlDshO5+ZaU2ZF1eFz0Kaam15p0NJnyk8Ta0GvJ/KfN:Jl2EI9Oz5ShshOjU2IFz0Yyk8Tsx/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\622513edf201e66ea38937a35e93850a_JaffaCakes118.exe" 622513edf201e66ea38937a35e93850a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\622513edf201e66ea38937a35e93850a_JaffaCakes118.exe" 622513edf201e66ea38937a35e93850a_JaffaCakes118.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe 622513edf201e66ea38937a35e93850a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "calc.exe" 622513edf201e66ea38937a35e93850a_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 622513edf201e66ea38937a35e93850a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\622513edf201e66ea38937a35e93850a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\622513edf201e66ea38937a35e93850a_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Event Triggered Execution: Image File Execution Options Injection
- Suspicious use of FindShellTrayWindow
PID:1740
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Event Triggered Execution
1Image File Execution Options Injection
1