Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 12:07
Behavioral task
behavioral1
Sample
cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe
-
Size
220KB
-
MD5
cf7e798677be88a8d57f1a70b08c51ac
-
SHA1
127bb8d556878e51d2ff532aa9fb2a025038a087
-
SHA256
4ce532ca66f52be999e1ae651a14245d00c70deaab4ef89fc2788c50c0ff0621
-
SHA512
6260873f5d4a4f4c0d159c79a52f0eda0a856c880189398e86d83ef8db4e9774ef006257d9716640cbb16f71ea8230cef6386993dc739567277a2598710834c9
-
SSDEEP
3072:DOLZB4qxV8LfZnsveixlaLqaMa/kX4JrBwPfCf2VIoIIfwUM2TUF:yLZB4UV8hsTxlaLHMQkXIrBVf6xP0
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1260 B6232F3ACDF.exe 2860 B6232F3ACDF.exe 2324 YhW9E04.exe -
Loads dropped DLL 4 IoCs
pid Process 2404 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe 2404 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe 2860 B6232F3ACDF.exe 2860 B6232F3ACDF.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2108-0-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/2404-5-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2404-6-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2404-9-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2404-11-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2404-19-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2404-18-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2404-16-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2404-15-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2404-14-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2404-13-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2108-12-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/files/0x0009000000016ea4-33.dat upx behavioral1/memory/2404-39-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2860-61-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1260-60-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/2860-69-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2860-65-0x0000000000400000-0x0000000000460000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\4Y3Y0C3AYF7W1ZYVFBGOWUP = "C:\\Recycle.Bin\\B6232F3ACDF.exe /q" YhW9E04.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2108 set thread context of 2404 2108 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe 30 PID 1260 set thread context of 2860 1260 B6232F3ACDF.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YhW9E04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B6232F3ACDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B6232F3ACDF.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" YhW9E04.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PhishingFilter YhW9E04.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" YhW9E04.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery YhW9E04.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" YhW9E04.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2404 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe 2404 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe 2860 B6232F3ACDF.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe 2324 YhW9E04.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2404 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe Token: SeDebugPrivilege 2404 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe Token: SeDebugPrivilege 2404 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe Token: SeDebugPrivilege 2404 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe Token: SeDebugPrivilege 2860 B6232F3ACDF.exe Token: SeDebugPrivilege 2860 B6232F3ACDF.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe Token: SeDebugPrivilege 2324 YhW9E04.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2108 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe 1260 B6232F3ACDF.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2404 2108 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2404 2108 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2404 2108 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2404 2108 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2404 2108 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2404 2108 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2404 2108 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2404 2108 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe 30 PID 2404 wrote to memory of 1260 2404 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe 31 PID 2404 wrote to memory of 1260 2404 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe 31 PID 2404 wrote to memory of 1260 2404 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe 31 PID 2404 wrote to memory of 1260 2404 cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe 31 PID 1260 wrote to memory of 2860 1260 B6232F3ACDF.exe 32 PID 1260 wrote to memory of 2860 1260 B6232F3ACDF.exe 32 PID 1260 wrote to memory of 2860 1260 B6232F3ACDF.exe 32 PID 1260 wrote to memory of 2860 1260 B6232F3ACDF.exe 32 PID 1260 wrote to memory of 2860 1260 B6232F3ACDF.exe 32 PID 1260 wrote to memory of 2860 1260 B6232F3ACDF.exe 32 PID 1260 wrote to memory of 2860 1260 B6232F3ACDF.exe 32 PID 1260 wrote to memory of 2860 1260 B6232F3ACDF.exe 32 PID 2860 wrote to memory of 2324 2860 B6232F3ACDF.exe 33 PID 2860 wrote to memory of 2324 2860 B6232F3ACDF.exe 33 PID 2860 wrote to memory of 2324 2860 B6232F3ACDF.exe 33 PID 2860 wrote to memory of 2324 2860 B6232F3ACDF.exe 33 PID 2860 wrote to memory of 2324 2860 B6232F3ACDF.exe 33 PID 2860 wrote to memory of 2324 2860 B6232F3ACDF.exe 33 PID 2324 wrote to memory of 2404 2324 YhW9E04.exe 30 PID 2324 wrote to memory of 2404 2324 YhW9E04.exe 30 PID 2324 wrote to memory of 2404 2324 YhW9E04.exe 30 PID 2324 wrote to memory of 2404 2324 YhW9E04.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cf7e798677be88a8d57f1a70b08c51ac_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Recycle.Bin\B6232F3ACDF.exe"C:\Recycle.Bin\B6232F3ACDF.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Recycle.Bin\B6232F3ACDF.exe"C:\Recycle.Bin\B6232F3ACDF.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\YhW9E04.exe"C:\Users\Admin\AppData\Local\Temp\YhW9E04.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD58e8ecd5b98d5b1120fa611c06b864f5f
SHA1239f2aff03002b5b604310fe8949be15da65bc30
SHA2566b43d03e0a39957461deba724c38ab63484bd48d818aad087f00e10268aa4a9e
SHA51202156e9d68eee579a4f1463ea525a5be13b7242ee9d34ca340a215a998830e5e087eed5a35609e7c885d64c4835b021b514d86151cf0ae12f8388be5443e1410
-
Filesize
220KB
MD5cf7e798677be88a8d57f1a70b08c51ac
SHA1127bb8d556878e51d2ff532aa9fb2a025038a087
SHA2564ce532ca66f52be999e1ae651a14245d00c70deaab4ef89fc2788c50c0ff0621
SHA5126260873f5d4a4f4c0d159c79a52f0eda0a856c880189398e86d83ef8db4e9774ef006257d9716640cbb16f71ea8230cef6386993dc739567277a2598710834c9
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be