Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 09:49
Static task
static1
Behavioral task
behavioral1
Sample
77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe
-
Size
483KB
-
MD5
77bc20e83552b7c917260d0a670e4a4e
-
SHA1
58c83895800950e3dd30f4f6ead78ba4c3edf9a9
-
SHA256
2da2aee37a4a5f8a99bc7e94f589ce5cf5adde5bc8e68178d76bf17cba032210
-
SHA512
53ff5780b115e7a17e471e42ce791fa99e26b18a14792d4bc162363782038f3495688b7f67727285620d72de82142f79243bd493bc87eb9510922957c8701858
-
SSDEEP
12288:Ae9+seuKtK4H+/g/PTavuEBAJuuaFRXBU:Ae+sMH+/g/WGESzuRXBU
Malware Config
Signatures
-
Executes dropped EXE 20 IoCs
pid Process 2632 winupdate.exe 2404 winupdate.exe 612 winupdate.exe 2780 winupdate.exe 1096 winupdate.exe 1848 winupdate.exe 1988 winupdate.exe 1832 winupdate.exe 1972 winupdate.exe 1984 winupdate.exe 440 winupdate.exe 832 winupdate.exe 820 winupdate.exe 2256 winupdate.exe 2132 winupdate.exe 3044 winupdate.exe 2480 winupdate.exe 3004 winupdate.exe 2896 winupdate.exe 2712 winupdate.exe -
Loads dropped DLL 20 IoCs
pid Process 2488 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 2632 winupdate.exe 2404 winupdate.exe 612 winupdate.exe 2780 winupdate.exe 1096 winupdate.exe 1848 winupdate.exe 1988 winupdate.exe 1832 winupdate.exe 1972 winupdate.exe 1984 winupdate.exe 440 winupdate.exe 832 winupdate.exe 820 winupdate.exe 2256 winupdate.exe 2132 winupdate.exe 3044 winupdate.exe 2480 winupdate.exe 3004 winupdate.exe 2896 winupdate.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 2092 set thread context of 2488 2092 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 30 PID 2632 set thread context of 2404 2632 winupdate.exe 32 PID 612 set thread context of 2780 612 winupdate.exe 35 PID 1096 set thread context of 1848 1096 winupdate.exe 37 PID 1988 set thread context of 1832 1988 winupdate.exe 39 PID 1972 set thread context of 1984 1972 winupdate.exe 41 PID 440 set thread context of 832 440 winupdate.exe 43 PID 820 set thread context of 2256 820 winupdate.exe 45 PID 2132 set thread context of 3044 2132 winupdate.exe 47 PID 2480 set thread context of 3004 2480 winupdate.exe 49 PID 2896 set thread context of 2712 2896 winupdate.exe 51 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2092 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 2632 winupdate.exe 612 winupdate.exe 1096 winupdate.exe 1988 winupdate.exe 1972 winupdate.exe 440 winupdate.exe 820 winupdate.exe 2132 winupdate.exe 2480 winupdate.exe 2896 winupdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2488 2092 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2488 2092 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2488 2092 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2488 2092 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2488 2092 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2488 2092 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2488 2092 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2488 2092 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2488 2092 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2488 2092 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2488 2092 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2632 2488 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2632 2488 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2632 2488 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2632 2488 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2632 2488 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2632 2488 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2632 2488 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 31 PID 2632 wrote to memory of 2404 2632 winupdate.exe 32 PID 2632 wrote to memory of 2404 2632 winupdate.exe 32 PID 2632 wrote to memory of 2404 2632 winupdate.exe 32 PID 2632 wrote to memory of 2404 2632 winupdate.exe 32 PID 2632 wrote to memory of 2404 2632 winupdate.exe 32 PID 2632 wrote to memory of 2404 2632 winupdate.exe 32 PID 2632 wrote to memory of 2404 2632 winupdate.exe 32 PID 2632 wrote to memory of 2404 2632 winupdate.exe 32 PID 2632 wrote to memory of 2404 2632 winupdate.exe 32 PID 2632 wrote to memory of 2404 2632 winupdate.exe 32 PID 2632 wrote to memory of 2404 2632 winupdate.exe 32 PID 2632 wrote to memory of 2404 2632 winupdate.exe 32 PID 2632 wrote to memory of 2404 2632 winupdate.exe 32 PID 2632 wrote to memory of 2404 2632 winupdate.exe 32 PID 2404 wrote to memory of 612 2404 winupdate.exe 34 PID 2404 wrote to memory of 612 2404 winupdate.exe 34 PID 2404 wrote to memory of 612 2404 winupdate.exe 34 PID 2404 wrote to memory of 612 2404 winupdate.exe 34 PID 2404 wrote to memory of 612 2404 winupdate.exe 34 PID 2404 wrote to memory of 612 2404 winupdate.exe 34 PID 2404 wrote to memory of 612 2404 winupdate.exe 34 PID 612 wrote to memory of 2780 612 winupdate.exe 35 PID 612 wrote to memory of 2780 612 winupdate.exe 35 PID 612 wrote to memory of 2780 612 winupdate.exe 35 PID 612 wrote to memory of 2780 612 winupdate.exe 35 PID 612 wrote to memory of 2780 612 winupdate.exe 35 PID 612 wrote to memory of 2780 612 winupdate.exe 35 PID 612 wrote to memory of 2780 612 winupdate.exe 35 PID 612 wrote to memory of 2780 612 winupdate.exe 35 PID 612 wrote to memory of 2780 612 winupdate.exe 35 PID 612 wrote to memory of 2780 612 winupdate.exe 35 PID 612 wrote to memory of 2780 612 winupdate.exe 35 PID 612 wrote to memory of 2780 612 winupdate.exe 35 PID 612 wrote to memory of 2780 612 winupdate.exe 35 PID 612 wrote to memory of 2780 612 winupdate.exe 35 PID 2780 wrote to memory of 1096 2780 winupdate.exe 36 PID 2780 wrote to memory of 1096 2780 winupdate.exe 36 PID 2780 wrote to memory of 1096 2780 winupdate.exe 36 PID 2780 wrote to memory of 1096 2780 winupdate.exe 36 PID 2780 wrote to memory of 1096 2780 winupdate.exe 36 PID 2780 wrote to memory of 1096 2780 winupdate.exe 36 PID 2780 wrote to memory of 1096 2780 winupdate.exe 36 PID 1096 wrote to memory of 1848 1096 winupdate.exe 37 PID 1096 wrote to memory of 1848 1096 winupdate.exe 37 PID 1096 wrote to memory of 1848 1096 winupdate.exe 37 PID 1096 wrote to memory of 1848 1096 winupdate.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe 464 "C:\Users\Admin\AppData\Local\Temp\77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\SysWOW64\winupdate.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe 524 "C:\Windows\SysWOW64\winupdate.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\SysWOW64\winupdate.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe 524 "C:\Windows\SysWOW64\winupdate.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\SysWOW64\winupdate.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1848 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe 524 "C:\Windows\SysWOW64\winupdate.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1988 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\SysWOW64\winupdate.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1832 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe 524 "C:\Windows\SysWOW64\winupdate.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1972 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\SysWOW64\winupdate.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1984 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe 524 "C:\Windows\SysWOW64\winupdate.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:440 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\SysWOW64\winupdate.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:832 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe 524 "C:\Windows\SysWOW64\winupdate.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:820 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\SysWOW64\winupdate.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe 524 "C:\Windows\SysWOW64\winupdate.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2132 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\SysWOW64\winupdate.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3044 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe 524 "C:\Windows\SysWOW64\winupdate.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2480 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\SysWOW64\winupdate.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe 528 "C:\Windows\SysWOW64\winupdate.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2896 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\SysWOW64\winupdate.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2712
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
483KB
MD577bc20e83552b7c917260d0a670e4a4e
SHA158c83895800950e3dd30f4f6ead78ba4c3edf9a9
SHA2562da2aee37a4a5f8a99bc7e94f589ce5cf5adde5bc8e68178d76bf17cba032210
SHA51253ff5780b115e7a17e471e42ce791fa99e26b18a14792d4bc162363782038f3495688b7f67727285620d72de82142f79243bd493bc87eb9510922957c8701858