Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 17:51
Static task
static1
Behavioral task
behavioral1
Sample
c759da9e85b72037b8d0441f546835d9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c759da9e85b72037b8d0441f546835d9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c759da9e85b72037b8d0441f546835d9_JaffaCakes118.exe
-
Size
290KB
-
MD5
c759da9e85b72037b8d0441f546835d9
-
SHA1
31882a1ddd5b9d5267517049fe0a2749bdec49ea
-
SHA256
3464063b9c8b733a0f8ae882264eaab806da3fd106d454fb9db9cb8155e4190e
-
SHA512
0ee2086aa8f9aaa0ddf7e89ba109f39be807e38a48ce348f9a90b7d073ba44c064241412650f9732243a0fa9ab44ee3ccb7c0cceea9dc7328dd2aaa0e36c5bef
-
SSDEEP
6144:lpyBV6C2NpyADglnrL8mJB/OsUJCYrWHxd:lpy02AD2rvdUJDrWH
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2736 mta.exe -
Executes dropped EXE 1 IoCs
pid Process 2736 mta.exe -
Loads dropped DLL 2 IoCs
pid Process 2208 c759da9e85b72037b8d0441f546835d9_JaffaCakes118.exe 2208 c759da9e85b72037b8d0441f546835d9_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c759da9e85b72037b8d0441f546835d9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mta.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2208 c759da9e85b72037b8d0441f546835d9_JaffaCakes118.exe 2208 c759da9e85b72037b8d0441f546835d9_JaffaCakes118.exe 2208 c759da9e85b72037b8d0441f546835d9_JaffaCakes118.exe 2208 c759da9e85b72037b8d0441f546835d9_JaffaCakes118.exe 2208 c759da9e85b72037b8d0441f546835d9_JaffaCakes118.exe 2208 c759da9e85b72037b8d0441f546835d9_JaffaCakes118.exe 2208 c759da9e85b72037b8d0441f546835d9_JaffaCakes118.exe 2208 c759da9e85b72037b8d0441f546835d9_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2824 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2736 2208 c759da9e85b72037b8d0441f546835d9_JaffaCakes118.exe 30 PID 2208 wrote to memory of 2736 2208 c759da9e85b72037b8d0441f546835d9_JaffaCakes118.exe 30 PID 2208 wrote to memory of 2736 2208 c759da9e85b72037b8d0441f546835d9_JaffaCakes118.exe 30 PID 2208 wrote to memory of 2736 2208 c759da9e85b72037b8d0441f546835d9_JaffaCakes118.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c759da9e85b72037b8d0441f546835d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c759da9e85b72037b8d0441f546835d9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\mta.exe"C:\Users\Admin\AppData\Local\mta.exe" -gav C:\Users\Admin\AppData\Local\Temp\c759da9e85b72037b8d0441f546835d9_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
290KB
MD5c759da9e85b72037b8d0441f546835d9
SHA131882a1ddd5b9d5267517049fe0a2749bdec49ea
SHA2563464063b9c8b733a0f8ae882264eaab806da3fd106d454fb9db9cb8155e4190e
SHA5120ee2086aa8f9aaa0ddf7e89ba109f39be807e38a48ce348f9a90b7d073ba44c064241412650f9732243a0fa9ab44ee3ccb7c0cceea9dc7328dd2aaa0e36c5bef