Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 14:15
Static task
static1
Behavioral task
behavioral1
Sample
c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe
-
Size
246KB
-
MD5
c0eab8b2073c248b6eb0e66d1f0087d5
-
SHA1
268a8a4db8564bf37d51a614d573b58b8ad7b5c8
-
SHA256
d888a8434a665552b7185834f727f252d382fe7410079c2a8e272f9873c8cd5e
-
SHA512
0396765f0d3e03fff182df2d1341d672f90962f5166aa9df60f9b88979efdf37cdb8791079d9a303e57c4c6edc488691c15b347d15bfb2adb60aaf04bdbf6aa3
-
SSDEEP
6144:/gJoEtEJP2gpjG6grfHUds56EMvVktn7WyT05:NEcJpjG6afHVQEMC73G
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\C0EAB8~1.EXE," c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\C0EAB8~1.EXE" c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\eb54032d = "Ìîƒ\n˜Â\x0f<\x01¶\x03ÊÚ#à\x16üÏ\x02^ßÒç\x10øµæ¿ê[2®¥\x13'C\x10>©\x1c½¶þ¼ŒÄ¡?Ì\fUB\x1dWV\rÕ@²ñSSŒ<»9D…2e0\u00adÜ-øŽo–Å\x0e±B$bããw,OÔ¤“¼k¤6dÛ#<ïKKÕüG\asO›µ\x0eëÜO¥\x1c\vç¯lG\x1b4Σ\x1dc“ÄÞ\x7f]\u009dçã=÷·Ö<‡¥W•ç³¥ŸMc\x0eG·k¼\r3óoeŸ\\G/MEç“ï\x03];†œ»&<kdÛ7öûw®Ö\fßd\u008f\a½†\x1cÿ·'Õ|“œ,·7\x03ì\x0fŸÝ\x04T\x13o3ãŒõCg\x1bœ#ÜÎËþ;\f;\\V?ÇMÇÜ\u008d¾5;Ëí_Ä×Þmóä.Õk\x1f¯7Dvüe" c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\C0EAB8~1.EXE" c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe Token: SeSecurityPrivilege 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe Token: SeSecurityPrivilege 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe Token: SeSecurityPrivilege 3020 c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c0eab8b2073c248b6eb0e66d1f0087d5_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020