Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
8adf7065d68094ef07aa0db11b17f0d2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8adf7065d68094ef07aa0db11b17f0d2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8adf7065d68094ef07aa0db11b17f0d2_JaffaCakes118.exe
-
Size
96KB
-
MD5
8adf7065d68094ef07aa0db11b17f0d2
-
SHA1
4e2bfb6d1ebc9175db44bb7a1715af6d59c40ea9
-
SHA256
342d93caf217f2963a5d1891ba24f1f36019b330c0a8f50f2ecf5b6ae3d89131
-
SHA512
b5fae43f446ec173450813265825c6f5a783b9916f316a6775036da1f3d17f4e4194b257540d9d658fae5b9ac26769950875788e340fe607e374bd4165f6221b
-
SSDEEP
1536:fhtEg52q49tyVQO8P8ychiwjj3RJNEo/knRzdnynE7RldNEP8lijOe/NIjP:fPE/9elychDzR3Ek65Rldq/CP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8adf7065d68094ef07aa0db11b17f0d2_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" leisoom.exe -
Executes dropped EXE 1 IoCs
pid Process 2488 leisoom.exe -
Loads dropped DLL 2 IoCs
pid Process 1996 8adf7065d68094ef07aa0db11b17f0d2_JaffaCakes118.exe 1996 8adf7065d68094ef07aa0db11b17f0d2_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /w" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /x" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /h" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /P" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /i" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /l" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /b" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /a" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /Q" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /V" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /E" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /S" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /q" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /A" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /B" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /R" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /m" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /L" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /I" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /F" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /K" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /G" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /T" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /z" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /X" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /r" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /e" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /M" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /H" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /o" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /g" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /k" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /u" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /C" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /D" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /p" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /W" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /Y" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /n" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /t" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /O" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /j" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /Z" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /f" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /s" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /c" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /d" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /h" 8adf7065d68094ef07aa0db11b17f0d2_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /y" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /v" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /N" leisoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\leisoom = "C:\\Users\\Admin\\leisoom.exe /J" leisoom.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8adf7065d68094ef07aa0db11b17f0d2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language leisoom.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1996 8adf7065d68094ef07aa0db11b17f0d2_JaffaCakes118.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe 2488 leisoom.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1996 8adf7065d68094ef07aa0db11b17f0d2_JaffaCakes118.exe 2488 leisoom.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2488 1996 8adf7065d68094ef07aa0db11b17f0d2_JaffaCakes118.exe 29 PID 1996 wrote to memory of 2488 1996 8adf7065d68094ef07aa0db11b17f0d2_JaffaCakes118.exe 29 PID 1996 wrote to memory of 2488 1996 8adf7065d68094ef07aa0db11b17f0d2_JaffaCakes118.exe 29 PID 1996 wrote to memory of 2488 1996 8adf7065d68094ef07aa0db11b17f0d2_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8adf7065d68094ef07aa0db11b17f0d2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8adf7065d68094ef07aa0db11b17f0d2_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\leisoom.exe"C:\Users\Admin\leisoom.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD55423c3de9ebb7087499817d394db019a
SHA1cb1aab3631f9382ee8e72bed3fa8bde63c469704
SHA256fbab48cc7e5d9f9781d50b18081a8288806dbd7b965ff421219aab59d27074e3
SHA5129953a451b6893f36b2c506d80276adca14defa916d1ce98b7561767f44a754a9f0891e615f7020e4fb971f15918bd6e8616384d4539d35aac72a7ea8f613212e