Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe
-
Size
253KB
-
MD5
8c528b50796053319916cc3758f7d3f1
-
SHA1
0bb99b6b280616a490648606dcba4f0ce6b16fcf
-
SHA256
13894d0a49af6483baf3fd2cf72e43cd18f7823b5ed42fd36df7c655fe579b28
-
SHA512
e0171b625a02b0c0351c62a016398fd5df2f39fc931e31e239905aa759951c4785610c219f932b10bd40c5fe8a4ef8e7a5592d11273954755322541e9ccf3760
-
SSDEEP
6144:53UaFS58Q+Sij0nVGtnQfNmPvwQ5rQidwByQotV:535E2FjTnOCIQ5rn3QoP
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\8C528B~1.EXE," 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8C528B~1.EXE" 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\3eecf498 = "\x1c\rÇ-ø^ŽœÖÞ\x1b§®\"ûÞh ¾NÌ“ëV\\ÔaàxwÕ?[Ãßwv\x12Ÿ@\x1d'\u00a00•\u008f!\x1cAIÖ\u009d;Y4´B#ïÿÖØ3¼\x16QˆVÀ±Ùp¬¦Ô†\x04º3áö¹G™È'9ÛYÜ?ô²#Áß‚+\x12C·\bZSˆã\a!D\f÷\tW\u008fCk€\vÁ`ø¤¨\u008f*¿×è¡+ój(ß¼\x1f·ÃWRGZÏ\x03¬Ãl\f\x02ÿ\nŸë{o77\x1a§\x139\a+ë‹pÇÛŸ;TÀ‹÷lsÜc\x11²·Ø‡ ÷\x7f_\b\x17\v\tg<Ï€\x12T¿—GA7d\x10„à?\a‡Aß'¼qHÁ€G·c_ñ\\‡Ûÿ@éá’Z\u008fŒÇ)Rb\x12qÿ§É—ØÉi‡17Ó{Ÿ”Tš\"²ù—\x1f" 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8C528B~1.EXE" 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe Token: SeSecurityPrivilege 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe Token: SeSecurityPrivilege 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe Token: SeSecurityPrivilege 2564 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564