Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
b7cbf5f879ed0aaac5968be4d6d01c71_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b7cbf5f879ed0aaac5968be4d6d01c71_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7cbf5f879ed0aaac5968be4d6d01c71_JaffaCakes118.exe
-
Size
156KB
-
MD5
b7cbf5f879ed0aaac5968be4d6d01c71
-
SHA1
9c7c21e74976338fe28b8fe8ada8f566604554db
-
SHA256
f18f7d106e180317dded536bc89c2f9ab594c93ceadad9be47df00e0865ff824
-
SHA512
650f239a12d5ff624de528940eee823b61561fb4569b78f19e286178b352f7aab83488efec3e2fa24399ae230d429a9d6480acbc9ed6b89be3e13f4765f21e58
-
SSDEEP
384:KzZgubkc7owyRaeV74Rf5tTOHqpLoPo9RAp3qYjVOcGJi92pIHOIpHVQyBT5B:sgskZZRD94bRoVqYQ0OPIJVl5B
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" hs8f3m0.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" hs8f3m0.exe -
Deletes itself 1 IoCs
pid Process 2692 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2112 hs8f3m0.exe -
Loads dropped DLL 2 IoCs
pid Process 1628 b7cbf5f879ed0aaac5968be4d6d01c71_JaffaCakes118.exe 1628 b7cbf5f879ed0aaac5968be4d6d01c71_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\n4uhhlivo19uo3w4kd798 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hs8f3m0.exe" b7cbf5f879ed0aaac5968be4d6d01c71_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\jzlnsk4ctlijyclipc1pm1elj1cg2kuel5bryw0 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rsnm9zmw.exe" hs8f3m0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7cbf5f879ed0aaac5968be4d6d01c71_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" hs8f3m0.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Display Inline Images = "no" hs8f3m0.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Display Inline Videos = "no" hs8f3m0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2112 1628 b7cbf5f879ed0aaac5968be4d6d01c71_JaffaCakes118.exe 30 PID 1628 wrote to memory of 2112 1628 b7cbf5f879ed0aaac5968be4d6d01c71_JaffaCakes118.exe 30 PID 1628 wrote to memory of 2112 1628 b7cbf5f879ed0aaac5968be4d6d01c71_JaffaCakes118.exe 30 PID 1628 wrote to memory of 2112 1628 b7cbf5f879ed0aaac5968be4d6d01c71_JaffaCakes118.exe 30 PID 1628 wrote to memory of 2692 1628 b7cbf5f879ed0aaac5968be4d6d01c71_JaffaCakes118.exe 31 PID 1628 wrote to memory of 2692 1628 b7cbf5f879ed0aaac5968be4d6d01c71_JaffaCakes118.exe 31 PID 1628 wrote to memory of 2692 1628 b7cbf5f879ed0aaac5968be4d6d01c71_JaffaCakes118.exe 31 PID 1628 wrote to memory of 2692 1628 b7cbf5f879ed0aaac5968be4d6d01c71_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7cbf5f879ed0aaac5968be4d6d01c71_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b7cbf5f879ed0aaac5968be4d6d01c71_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\hs8f3m0.exeC:\Users\Admin\AppData\Local\Temp\hs8f3m0.exe wwww2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
PID:2112
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\gtseyhbe7.bat" "C:\Users\Admin\AppData\Local\Temp\b7cbf5f879ed0aaac5968be4d6d01c71_JaffaCakes118.exe""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52B
MD58db53e31a3117b405e1abf5ba790bf9e
SHA1242a8834c7c89a12336481b5e2c3264672f9ffc4
SHA256669a10708b8b580ecdb9d50e83c2e2a8826155c1836d27d6e9f418bccf06c87c
SHA512b8bff236a0bb3b161295665db26c9ac597441d2bf19acdeb2a70c1f6c75d8f6268dfa1241926b0400aa98c89b4acebc7ae6216a03558231706480a0dc990499f
-
Filesize
156KB
MD5b7cbf5f879ed0aaac5968be4d6d01c71
SHA19c7c21e74976338fe28b8fe8ada8f566604554db
SHA256f18f7d106e180317dded536bc89c2f9ab594c93ceadad9be47df00e0865ff824
SHA512650f239a12d5ff624de528940eee823b61561fb4569b78f19e286178b352f7aab83488efec3e2fa24399ae230d429a9d6480acbc9ed6b89be3e13f4765f21e58