Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 12:57
Static task
static1
Behavioral task
behavioral1
Sample
c0caf585abf8dc99b2213cff3458ebc3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c0caf585abf8dc99b2213cff3458ebc3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c0caf585abf8dc99b2213cff3458ebc3_JaffaCakes118.exe
-
Size
368KB
-
MD5
c0caf585abf8dc99b2213cff3458ebc3
-
SHA1
92ab7b7a7b836fea54c19644d88da751f6e8a330
-
SHA256
465b9f076a577f1449dc9ae3e902e668e11125132e4c29b031222c9101925a13
-
SHA512
b7b6e0b833e44e6fc3f9bc297f695d9d28b5d9440c00403e64a0387b2ca38d0cc70e3b821c9093c3ace26b391e214f269b7e9ffa5a1fd038098e0480ae555f09
-
SSDEEP
6144:GgYiFP5seg8Oyl1J8Gf0Md5GNwIa1CvbYf/:j7skOQPem6c
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xotaw.exe -
Executes dropped EXE 1 IoCs
pid Process 2684 xotaw.exe -
Loads dropped DLL 2 IoCs
pid Process 2372 c0caf585abf8dc99b2213cff3458ebc3_JaffaCakes118.exe 2372 c0caf585abf8dc99b2213cff3458ebc3_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /L" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /e" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /H" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /S" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /P" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /o" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /j" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /i" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /F" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /y" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /m" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /G" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /J" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /a" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /r" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /d" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /v" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /U" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /C" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /s" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /z" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /u" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /Y" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /n" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /c" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /W" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /I" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /D" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /Q" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /X" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /p" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /t" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /N" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /x" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /w" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /M" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /O" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /f" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /R" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /V" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /b" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /l" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /k" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /K" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /T" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /g" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /E" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /A" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /Z" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /q" xotaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\xotaw = "C:\\Users\\Admin\\xotaw.exe /B" xotaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0caf585abf8dc99b2213cff3458ebc3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xotaw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe 2684 xotaw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2372 c0caf585abf8dc99b2213cff3458ebc3_JaffaCakes118.exe 2684 xotaw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2684 2372 c0caf585abf8dc99b2213cff3458ebc3_JaffaCakes118.exe 30 PID 2372 wrote to memory of 2684 2372 c0caf585abf8dc99b2213cff3458ebc3_JaffaCakes118.exe 30 PID 2372 wrote to memory of 2684 2372 c0caf585abf8dc99b2213cff3458ebc3_JaffaCakes118.exe 30 PID 2372 wrote to memory of 2684 2372 c0caf585abf8dc99b2213cff3458ebc3_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29 PID 2684 wrote to memory of 2372 2684 xotaw.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0caf585abf8dc99b2213cff3458ebc3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c0caf585abf8dc99b2213cff3458ebc3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\xotaw.exe"C:\Users\Admin\xotaw.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
368KB
MD5d1698fe20f312e76495d8c53029e9605
SHA10ae86746e368654544d08e6571046ba37b51dfa0
SHA25640d53cbe7622857f64a333e30ceccbfad6cfbc9a48de5d0f7a9106acdc9b7fa4
SHA5125b7e8d89ba87add01a497663bae0286e5abb789040b98b6d4a87f8503d933c72579b74c26dd33eefec99ae73473256a78901236a72c151c0d173626879a2ccda