Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
9s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 13:19
Static task
static1
Behavioral task
behavioral1
Sample
964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe
-
Size
456KB
-
MD5
964235d04d10d68df7746ccd30a79f3e
-
SHA1
7f58617aeabaea54da9cf55cbf91a904ced6a50b
-
SHA256
8c272c354cbf966638be30e835527a45e99f1bf5859cefcdd3960584fa8dadbd
-
SHA512
86bfbc78b4bbbfea35221a473f1cbf54908817ed248d5eb68d4df4785ed420c96b82fc68ac5038beb1ec6cff6ca66735eab04b2fcbd2983c3a1a44e7e8b7e2c3
-
SSDEEP
12288:jEVXKpmok/if4JgTIoq43H2cE05nMx11DGkfb7i:jEtR3iAJgMe3H2cJCx1YOb7i
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" iAsD8zgo9sJlU4T4lK.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" moopao.exe -
Executes dropped EXE 5 IoCs
pid Process 2668 iAsD8zgo9sJlU4T4lK.exe 2892 moopao.exe 1380 txhost.exe 816 txhost.exe 2772 uxhost.exe -
Loads dropped DLL 8 IoCs
pid Process 1376 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 1376 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 2668 iAsD8zgo9sJlU4T4lK.exe 2668 iAsD8zgo9sJlU4T4lK.exe 1376 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 1376 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 1376 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 1376 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\moopao = "C:\\Users\\Admin\\moopao.exe /f" iAsD8zgo9sJlU4T4lK.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\moopao = "C:\\Users\\Admin\\moopao.exe /B" moopao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\moopao = "C:\\Users\\Admin\\moopao.exe /d" moopao.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 uxhost.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2528 tasklist.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2140 set thread context of 1376 2140 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 30 PID 1380 set thread context of 816 1380 txhost.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iAsD8zgo9sJlU4T4lK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language moopao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language txhost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2668 iAsD8zgo9sJlU4T4lK.exe 2668 iAsD8zgo9sJlU4T4lK.exe 816 txhost.exe 2892 moopao.exe 2892 moopao.exe 2892 moopao.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2528 tasklist.exe Token: SeShutdownPrivilege 2772 uxhost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1376 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 2668 iAsD8zgo9sJlU4T4lK.exe 2892 moopao.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2140 wrote to memory of 1376 2140 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 30 PID 2140 wrote to memory of 1376 2140 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 30 PID 2140 wrote to memory of 1376 2140 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 30 PID 2140 wrote to memory of 1376 2140 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 30 PID 2140 wrote to memory of 1376 2140 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 30 PID 2140 wrote to memory of 1376 2140 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 30 PID 2140 wrote to memory of 1376 2140 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 30 PID 2140 wrote to memory of 1376 2140 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 30 PID 2140 wrote to memory of 1376 2140 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 30 PID 1376 wrote to memory of 2668 1376 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 31 PID 1376 wrote to memory of 2668 1376 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 31 PID 1376 wrote to memory of 2668 1376 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 31 PID 1376 wrote to memory of 2668 1376 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 31 PID 2668 wrote to memory of 2892 2668 iAsD8zgo9sJlU4T4lK.exe 32 PID 2668 wrote to memory of 2892 2668 iAsD8zgo9sJlU4T4lK.exe 32 PID 2668 wrote to memory of 2892 2668 iAsD8zgo9sJlU4T4lK.exe 32 PID 2668 wrote to memory of 2892 2668 iAsD8zgo9sJlU4T4lK.exe 32 PID 2668 wrote to memory of 2564 2668 iAsD8zgo9sJlU4T4lK.exe 33 PID 2668 wrote to memory of 2564 2668 iAsD8zgo9sJlU4T4lK.exe 33 PID 2668 wrote to memory of 2564 2668 iAsD8zgo9sJlU4T4lK.exe 33 PID 2668 wrote to memory of 2564 2668 iAsD8zgo9sJlU4T4lK.exe 33 PID 2564 wrote to memory of 2528 2564 cmd.exe 35 PID 2564 wrote to memory of 2528 2564 cmd.exe 35 PID 2564 wrote to memory of 2528 2564 cmd.exe 35 PID 2564 wrote to memory of 2528 2564 cmd.exe 35 PID 1376 wrote to memory of 1380 1376 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 37 PID 1376 wrote to memory of 1380 1376 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 37 PID 1376 wrote to memory of 1380 1376 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 37 PID 1376 wrote to memory of 1380 1376 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 37 PID 1380 wrote to memory of 816 1380 txhost.exe 38 PID 1380 wrote to memory of 816 1380 txhost.exe 38 PID 1380 wrote to memory of 816 1380 txhost.exe 38 PID 1380 wrote to memory of 816 1380 txhost.exe 38 PID 1380 wrote to memory of 816 1380 txhost.exe 38 PID 1380 wrote to memory of 816 1380 txhost.exe 38 PID 1380 wrote to memory of 816 1380 txhost.exe 38 PID 1380 wrote to memory of 816 1380 txhost.exe 38 PID 1380 wrote to memory of 816 1380 txhost.exe 38 PID 1380 wrote to memory of 816 1380 txhost.exe 38 PID 1380 wrote to memory of 816 1380 txhost.exe 38 PID 1376 wrote to memory of 2772 1376 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 39 PID 1376 wrote to memory of 2772 1376 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 39 PID 1376 wrote to memory of 2772 1376 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 39 PID 1376 wrote to memory of 2772 1376 964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe964235d04d10d68df7746ccd30a79f3e_JaffaCakes118.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\iAsD8zgo9sJlU4T4lK.exeC:\Users\Admin\iAsD8zgo9sJlU4T4lK.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\moopao.exe"C:\Users\Admin\moopao.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2892
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del iAsD8zgo9sJlU4T4lK.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
-
-
C:\Users\Admin\txhost.exeC:\Users\Admin\txhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\txhost.exetxhost.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:816
-
-
-
C:\Users\Admin\uxhost.exeC:\Users\Admin\uxhost.exe3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5c1ca4a842399156d6ce56df9fe167158
SHA1c24482b800d11e8f0238df3d950b745f38c245e7
SHA256197d8be66fca12a1c137e920a49610b38f29756c7b7473ec1962c6499918f15a
SHA512a89f3170db1de6f296b12c42059495821ef6e9b03a8e3e58aafcfa5cfab8cc0f996e5498476f638a80f604a2c2d6b7d626bd621b35b0c4502b6916aa1380e1c9
-
Filesize
156KB
MD5187caf711d5009bbbd02b9eb62f8e666
SHA1d6e9ee37f0f3ab51322c5e3033b2999be06b197f
SHA256732ffc5738a449f56b15c68a15a7e61a075399d4f6e178314c86dacee535e531
SHA512ef9ff7152c7e62c5601ef481543401ae213dbbf535641a632b89e7ebda847f593eee45ed6c85252b72d7516c4b274932df904ed02a7eb3f66ccbe1d538170c6a
-
Filesize
146KB
MD518c83c689100e66caedb1c76ed87bd95
SHA1901c0f6c4757d37d5a2e357704344aeb31a9cadb
SHA25637d78483538af016b7646678df08893badea86d7b5f4317b99393bbcd3c172b9
SHA512e87c6aeaa1cc7a69f390c57d4cbcc1efa3cb5349a445831f822f7843b3a3d850f9793818d4e1e7fe011a5af0e99bbdb7cf8a5ec13541dedb8431fc47ef9f33b1
-
Filesize
219KB
MD5861e3902ecc188eba323032a88d1e56e
SHA16c6265be666d9c93acd6ddc55e94a9de8580191c
SHA25679ae1f344b550f57a9f03ec18894df1b9b255b865b5872801d0f043c1b77eb84
SHA512044f284dd78b7aad2f733628c901d7bd1067436d76c4b3fad3bf024f8faecaaf38e453053431daf7afa8c8b14f5eea6fe4f75148b8923ac2441f966ac118cec4