Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe
-
Size
47KB
-
MD5
bbcf0544525372a48cb7d39285974c90
-
SHA1
ab8c843a6a622b5e6a8ca5715f287460b06d20d7
-
SHA256
b8ebdf1a108a3dd19cc95242a0165cb13ede88008d8f75867f91862dde4334b5
-
SHA512
431e6a9e00211c5a5f63e53c137e7674f028a903e1245805f0a4c318fe0f6641df4bb6d0470369f2e2ee55b0ff32257d8bdef3eea71a40952964e0ae640e60df
-
SSDEEP
768:RagDcvogUQd2Z9hAOfdvNX9s3SZDGY8yX3S9Blz4p/p:RPoa9hNvNncyX32/I/p
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exeC:\\Users\\Admin\\AppData\\Roaming\\appconf32.exe," TSTheme.exe -
Deletes itself 1 IoCs
pid Process 2340 TSTheme.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 TSTheme.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TSTheme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" TSTheme.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" TSTheme.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main TSTheme.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe 2340 TSTheme.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1496 wrote to memory of 2340 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 30 PID 1496 wrote to memory of 2340 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 30 PID 1496 wrote to memory of 2340 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 30 PID 1496 wrote to memory of 2340 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 30 PID 1496 wrote to memory of 2340 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 30 PID 1496 wrote to memory of 2340 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 30 PID 1496 wrote to memory of 2340 1496 bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe 30 PID 2340 wrote to memory of 2708 2340 TSTheme.exe 31 PID 2340 wrote to memory of 2708 2340 TSTheme.exe 31 PID 2340 wrote to memory of 2708 2340 TSTheme.exe 31 PID 2340 wrote to memory of 2708 2340 TSTheme.exe 31 PID 2340 wrote to memory of 3040 2340 TSTheme.exe 32 PID 2340 wrote to memory of 3040 2340 TSTheme.exe 32 PID 2340 wrote to memory of 3040 2340 TSTheme.exe 32 PID 2340 wrote to memory of 3040 2340 TSTheme.exe 32 PID 2340 wrote to memory of 3040 2340 TSTheme.exe 32 PID 2340 wrote to memory of 3040 2340 TSTheme.exe 32 PID 2340 wrote to memory of 3040 2340 TSTheme.exe 32 PID 2340 wrote to memory of 3040 2340 TSTheme.exe 32 PID 2340 wrote to memory of 3040 2340 TSTheme.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bbcf0544525372a48cb7d39285974c90_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\TSTheme.exeC:\Windows\system32\TSTheme.exe2⤵
- Modifies WinLogon for persistence
- Deletes itself
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2708
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:3040
-
-