Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe
-
Size
272KB
-
MD5
86e6b6eb7857d6affaf7cf5ccbd0b175
-
SHA1
10535ad0df1a4eef3c0fdc640f28b349e04641d6
-
SHA256
2310be0d099f38166b4a4831d2a183eb7cf750e07c346429c7ac75a747fd4877
-
SHA512
e63e460ae58cacac97016ca69702a9233580728155f0beefd63e385dde6aa48e002b76706cbfc637e1f12d7330b28240fb82e66d1210ae98071951b40cbb7fe3
-
SSDEEP
6144:+AA0qfdcpUwtyla3MZ9Ic/aw0kkv15WlEbZteHr8zTIw:+rbFcpUIylV9IkDkv14CneHgAw
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\86E6B6~1.EXE," 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\86E6B6~1.EXE" 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\a62ccefc = "«m;™ZìÕ\x04<\x18\x15Z¥Z³6Ì©]ù°\x15ô-¾\x02\x0e\u008d³\x1c‚½¤ý\x11ú¬\x7fÓy\x1a²žÄ4\u008fœJåñÿ¥Ïð«F¹ï³¶\\HŠŽVªGB¾§:\x1e\x03\u00ad÷Éš\u009d(˜Ê]ÌÄÐ÷hè\b\x1c©Éñ©÷Øðððx`aˆ€À_iH0„ù ¸¹„xÙà\tñX¼X0\fL¯ÔˆpØX¹©©àÐX÷`ÉwAðéé0'\u00a0\u008f\x01àèÏ!\x7f\x1fÁŒ\u008f̗ȉ±è\b\bH\x01Ô¼\u00a0ÿèø`ÏtÏ'\u00a08É\t¸Gè\u0081Ày‡,¹ÐPPqÿpÀ\u00a0H§\x04\b(àð¼\f0€Ï)? \x18\x10×øÇiàÇa\x18Ù$11çpèH8×$Ðy\u0090\u00a0¤\x1fa" 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\86E6B6~1.EXE" 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe Token: SeSecurityPrivilege 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe Token: SeSecurityPrivilege 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe Token: SeSecurityPrivilege 2000 86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\86e6b6eb7857d6affaf7cf5ccbd0b175_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000