Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 05:49
Static task
static1
Behavioral task
behavioral1
Sample
772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe
-
Size
476KB
-
MD5
772bc1a33bed6e7a8c3e2b0974ff550a
-
SHA1
4196ddb42254e377e8066d33f6a60be92bc3bd81
-
SHA256
efe438f027c6ff5a6b80a4642176141ddda0c2bdc081ed914999d878e084d066
-
SHA512
e952ab3ef6da8c3703c7a888efe1c081ad85e5e083b3ba4293590e162a80b40976f6777087185107b49e9fc5b87186c59eff11bcb5840cbc8d0e198307c8a420
-
SSDEEP
6144:ckMICtzWkvpia97cVsG9nJdxRh0R0VutL4O3igTVmTqL//VLJRLYOXTSbMyAG:ckmxnpia+1P0R0Vmv37T8TqRJB9XTSbB
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y3417IF5-TD47-XG24-UIO8-6I1V14MSG53J} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y3417IF5-TD47-XG24-UIO8-6I1V14MSG53J}\StubPath = "C:\\Windows\\system32\\System32\\Explorer.exe Restart" explorer.exe -
Loads dropped DLL 3 IoCs
pid Process 308 772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe 308 772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe 308 772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe Picture Format\\Adobe Picture Format\\1.1.2.262\\772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe" 772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\System32\ explorer.exe File created C:\Windows\SysWOW64\System32\logse.dat explorer.exe File opened for modification C:\Windows\SysWOW64\System32\logse.dat explorer.exe File created C:\Windows\SysWOW64\System32\Explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\System32\Explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\System32\plugin.dat explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 308 set thread context of 560 308 772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 560 vbc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2952 explorer.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 560 vbc.exe Token: SeDebugPrivilege 560 vbc.exe Token: SeDebugPrivilege 560 vbc.exe Token: SeDebugPrivilege 560 vbc.exe Token: SeDebugPrivilege 2952 explorer.exe Token: SeDebugPrivilege 2952 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 560 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 308 wrote to memory of 560 308 772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe 31 PID 308 wrote to memory of 560 308 772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe 31 PID 308 wrote to memory of 560 308 772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe 31 PID 308 wrote to memory of 560 308 772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe 31 PID 308 wrote to memory of 560 308 772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe 31 PID 308 wrote to memory of 560 308 772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe 31 PID 308 wrote to memory of 560 308 772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe 31 PID 308 wrote to memory of 560 308 772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe 31 PID 308 wrote to memory of 560 308 772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe 31 PID 308 wrote to memory of 560 308 772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe 31 PID 308 wrote to memory of 560 308 772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe 31 PID 308 wrote to memory of 560 308 772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe 31 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21 PID 560 wrote to memory of 1176 560 vbc.exe 21
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:604
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:1444
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1600
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:684
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:768
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:820
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1128
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:848
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:2172
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:968
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:280
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:1040
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1056
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1116
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:1260
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:1572
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:3012
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:492
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:396
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\772bc1a33bed6e7a8c3e2b0974ff550a_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD55fa07d6c6384d703766d7935de68850e
SHA162f28a572b4d1d359db7017235912ad2599b8c1d
SHA256120e15dcc4a957649553cd92a5477db9dcbfd9a2cd821e1c904044b5a92d726f
SHA5127775375f44e0cb00f9bffc023d797dbdb01ebe8429ccfacd7df57beb04427ef309c192d571051242aad1bc400f721f449f86deeb1e5f5d64b6f516bf24e92cc4