Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 13:59
Static task
static1
Behavioral task
behavioral1
Sample
745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe
-
Size
136KB
-
MD5
745a7a6c8b8bc9b6e10935c3fd31db95
-
SHA1
2007ef79c3b956fa067102806c6ae9ad5f68f1ec
-
SHA256
477dff5aa00b7265bef41c758066f82aef602ba8cd372141bb598166c01bb2b2
-
SHA512
570fbca287fced0ccf231aa470fe7ccc952fc9307e6ecb81adce7a7679cb7e820d69e0d648430b49639137f256ff9606b2e76df6d0a2a6bbbedc25af989a0dac
-
SSDEEP
3072:p2YMS8wER7PaQtPkTgBEU+G9Me2kmvxtEqdLuhxFbO79gM:3ER7PasPkTgBEzG9Me2kmvcXQ7
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistrytools = "1" 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2892 livemessenger.exe 2512 livemessenger.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Update = "livemessenger.exe" 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Microsoft Update = "livemessenger.exe" 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 livemessenger.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2292 set thread context of 2808 2292 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe 30 PID 2892 set thread context of 2512 2892 livemessenger.exe 32 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\livemessenger.exe 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe File opened for modification C:\Windows\livemessenger.exe 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe File created C:\Windows\admintxt.txt livemessenger.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language livemessenger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language livemessenger.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2292 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe 2892 livemessenger.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2808 2292 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2808 2292 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2808 2292 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2808 2292 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2808 2292 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2808 2292 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2808 2292 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2808 2292 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2808 2292 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe 30 PID 2808 wrote to memory of 2892 2808 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2892 2808 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2892 2808 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2892 2808 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe 31 PID 2892 wrote to memory of 2512 2892 livemessenger.exe 32 PID 2892 wrote to memory of 2512 2892 livemessenger.exe 32 PID 2892 wrote to memory of 2512 2892 livemessenger.exe 32 PID 2892 wrote to memory of 2512 2892 livemessenger.exe 32 PID 2892 wrote to memory of 2512 2892 livemessenger.exe 32 PID 2892 wrote to memory of 2512 2892 livemessenger.exe 32 PID 2892 wrote to memory of 2512 2892 livemessenger.exe 32 PID 2892 wrote to memory of 2512 2892 livemessenger.exe 32 PID 2892 wrote to memory of 2512 2892 livemessenger.exe 32 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistrytools = "1" 745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\745a7a6c8b8bc9b6e10935c3fd31db95_JaffaCakes118.exe"2⤵
- Disables RegEdit via registry modification
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2808 -
C:\Windows\livemessenger.exe"C:\Windows\livemessenger.exe"3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\livemessenger.exe"C:\Windows\livemessenger.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2512
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5745a7a6c8b8bc9b6e10935c3fd31db95
SHA12007ef79c3b956fa067102806c6ae9ad5f68f1ec
SHA256477dff5aa00b7265bef41c758066f82aef602ba8cd372141bb598166c01bb2b2
SHA512570fbca287fced0ccf231aa470fe7ccc952fc9307e6ecb81adce7a7679cb7e820d69e0d648430b49639137f256ff9606b2e76df6d0a2a6bbbedc25af989a0dac