Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
6s -
max time network
6s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 22:13 UTC
Static task
static1
Behavioral task
behavioral1
Sample
bf8558123bcfe9ff5ea425b24dedbf70_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bf8558123bcfe9ff5ea425b24dedbf70_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
bf8558123bcfe9ff5ea425b24dedbf70_JaffaCakes118.exe
-
Size
86KB
-
MD5
bf8558123bcfe9ff5ea425b24dedbf70
-
SHA1
a102bdceaa77fe06f974ce77a08641cda5311fa1
-
SHA256
e222ab35df0216d423817ddf8c5b9f6559400d5014b20d1e9ff118695b9e1735
-
SHA512
f205d39d1aa3f673adc8de3707f75b06abc56ca2241bd7db3dc490906a3e8545fc3b73d67037afbe03e760a8ca68bc4408954a2e3d79e67b73f907a4173b178f
-
SSDEEP
1536:bZujnwAg92SgzXidW9SHapTwsORQs7LXAXCbGXOrAxA91VC3:bZujwAFhKW469wsO6uSCb9AxArA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2540 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\19202713 = "C:\\Users\\Admin\\19202713.exe" reg.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf8558123bcfe9ff5ea425b24dedbf70_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier bf8558123bcfe9ff5ea425b24dedbf70_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2652 bf8558123bcfe9ff5ea425b24dedbf70_JaffaCakes118.exe Token: SeShutdownPrivilege 2700 shutdown.exe Token: SeRemoteShutdownPrivilege 2700 shutdown.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2780 2652 bf8558123bcfe9ff5ea425b24dedbf70_JaffaCakes118.exe 30 PID 2652 wrote to memory of 2780 2652 bf8558123bcfe9ff5ea425b24dedbf70_JaffaCakes118.exe 30 PID 2652 wrote to memory of 2780 2652 bf8558123bcfe9ff5ea425b24dedbf70_JaffaCakes118.exe 30 PID 2652 wrote to memory of 2780 2652 bf8558123bcfe9ff5ea425b24dedbf70_JaffaCakes118.exe 30 PID 2780 wrote to memory of 2808 2780 cmd.exe 32 PID 2780 wrote to memory of 2808 2780 cmd.exe 32 PID 2780 wrote to memory of 2808 2780 cmd.exe 32 PID 2780 wrote to memory of 2808 2780 cmd.exe 32 PID 2652 wrote to memory of 2700 2652 bf8558123bcfe9ff5ea425b24dedbf70_JaffaCakes118.exe 33 PID 2652 wrote to memory of 2700 2652 bf8558123bcfe9ff5ea425b24dedbf70_JaffaCakes118.exe 33 PID 2652 wrote to memory of 2700 2652 bf8558123bcfe9ff5ea425b24dedbf70_JaffaCakes118.exe 33 PID 2652 wrote to memory of 2700 2652 bf8558123bcfe9ff5ea425b24dedbf70_JaffaCakes118.exe 33 PID 2652 wrote to memory of 2540 2652 bf8558123bcfe9ff5ea425b24dedbf70_JaffaCakes118.exe 35 PID 2652 wrote to memory of 2540 2652 bf8558123bcfe9ff5ea425b24dedbf70_JaffaCakes118.exe 35 PID 2652 wrote to memory of 2540 2652 bf8558123bcfe9ff5ea425b24dedbf70_JaffaCakes118.exe 35 PID 2652 wrote to memory of 2540 2652 bf8558123bcfe9ff5ea425b24dedbf70_JaffaCakes118.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf8558123bcfe9ff5ea425b24dedbf70_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bf8558123bcfe9ff5ea425b24dedbf70_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\cmd.execmd.exe /c REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 19202713 /t REG_SZ /d "%userprofile%\19202713.exe" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 19202713 /t REG_SZ /d "C:\Users\Admin\19202713.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2808
-
-
-
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" /r /f /t 32⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\BF8558~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2540
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2552
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:320