Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
7208b2e0febb4512e57dee42a720f003_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7208b2e0febb4512e57dee42a720f003_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7208b2e0febb4512e57dee42a720f003_JaffaCakes118.exe
-
Size
176KB
-
MD5
7208b2e0febb4512e57dee42a720f003
-
SHA1
5cfc1be0a2e5d8206900e818f1159910d4059ebe
-
SHA256
3fbf5d8fa784adb5e5414d703973fb84d9c5007f6ccb78a0fb2de354da97aa12
-
SHA512
e1932915b18998e0a25ec0dcc00f8a2479195bc947eb1276850a3e37fb99c47cf679db3cbc087704e4723a0dc6686c9c5794d9a84fccd8279d85bd0926cb91a6
-
SSDEEP
3072:iGvJwJqqME7dxrGi3npQjPBHiuTmWy1qgAtjQ7vK8JLXeZ2eJj3jKp/oL9M:iRqq97LrGiZQjPBHiuTmWy1qgAtjQ7vq
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cubof.exe -
Executes dropped EXE 1 IoCs
pid Process 836 cubof.exe -
Loads dropped DLL 2 IoCs
pid Process 1508 7208b2e0febb4512e57dee42a720f003_JaffaCakes118.exe 1508 7208b2e0febb4512e57dee42a720f003_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /O" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /a" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /y" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /E" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /m" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /C" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /x" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /Q" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /P" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /q" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /Z" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /r" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /v" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /T" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /F" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /B" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /S" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /W" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /l" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /V" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /i" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /M" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /K" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /D" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /w" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /g" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /Y" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /k" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /J" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /p" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /t" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /N" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /X" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /j" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /n" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /z" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /c" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /G" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /U" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /H" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /e" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /f" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /s" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /R" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /A" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /L" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /I" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /h" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /d" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /o" cubof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\cubof = "C:\\Users\\Admin\\cubof.exe /u" cubof.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7208b2e0febb4512e57dee42a720f003_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cubof.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe 836 cubof.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1508 7208b2e0febb4512e57dee42a720f003_JaffaCakes118.exe 836 cubof.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1508 wrote to memory of 836 1508 7208b2e0febb4512e57dee42a720f003_JaffaCakes118.exe 29 PID 1508 wrote to memory of 836 1508 7208b2e0febb4512e57dee42a720f003_JaffaCakes118.exe 29 PID 1508 wrote to memory of 836 1508 7208b2e0febb4512e57dee42a720f003_JaffaCakes118.exe 29 PID 1508 wrote to memory of 836 1508 7208b2e0febb4512e57dee42a720f003_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7208b2e0febb4512e57dee42a720f003_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7208b2e0febb4512e57dee42a720f003_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\cubof.exe"C:\Users\Admin\cubof.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:836
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD55339ab880258893d0e885939c995ed51
SHA134047afcd7de03ac43168870bf543bc348d21000
SHA256d2e8f5c541a559e7c93828b5449cbc0d8563c51806c7e3835056384ecbbec8a4
SHA5127df8f5e6021ebe48a68ca1bf7ae42750452df9edfb345249ac9b5f57168c4278e05a0906468532026ab2330fe933ff9e9abfa02385f579e545478911123a9e55