Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 17:44
Static task
static1
Behavioral task
behavioral1
Sample
d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe
-
Size
528KB
-
MD5
d01b80759402a4c6f5e8b610acc0e682
-
SHA1
3bd8f379b178333540077d478051a8b9421cb436
-
SHA256
781445a71a9a94d19b25870851af0d4e8290ed0341a72aa6978adcd1a0fce873
-
SHA512
5c4056a3b45c90c64a23a3207b8348e6b797add9ebbb5c8dc096f153aefa9abcf70b5f249280bd17b80c422b22b5e48398ca0bab63b47c69e087d90cdab21344
-
SSDEEP
12288:uVV7Cg6GTkT6keQZqq3Q/Kg9Ok/FUsTyAOonF:u7H+hNZLQbVTyApF
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\rundll32 = "C:\\Users\\Admin\\AppData\\Roaming\\rundll32.exe" rundll32.eXe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2808 attrib.exe 2616 attrib.exe -
Executes dropped EXE 3 IoCs
pid Process 3056 abc1.exe 2756 rundll32.eXe 2968 rundll32.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rundll32 = "C:\\Users\\Admin\\AppData\\Roaming\\rundll32.exe" rundll32.eXe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Lass = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe" d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\1A = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\Defaut.exe" abc1.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\rundll32 = "C:\\Users\\Admin\\AppData\\Roaming\\rundll32.exe" rundll32.eXe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\rundll32 = "C:\\Users\\Admin\\AppData\\Roaming\\rundll32.exe" rundll32.eXe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\rundll32 = "C:\\Users\\Admin\\AppData\\Roaming\\rundll32.exe" rundll32.eXe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\desktop.ini d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3056 set thread context of 2896 3056 abc1.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe Token: SeDebugPrivilege 2756 rundll32.eXe Token: SeDebugPrivilege 2968 rundll32.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 2180 wrote to memory of 3056 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 29 PID 2180 wrote to memory of 3056 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 29 PID 2180 wrote to memory of 3056 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 29 PID 2180 wrote to memory of 2756 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2756 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2756 2180 d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe 30 PID 3056 wrote to memory of 2668 3056 abc1.exe 31 PID 3056 wrote to memory of 2668 3056 abc1.exe 31 PID 3056 wrote to memory of 2668 3056 abc1.exe 31 PID 3056 wrote to memory of 2896 3056 abc1.exe 32 PID 3056 wrote to memory of 2896 3056 abc1.exe 32 PID 3056 wrote to memory of 2896 3056 abc1.exe 32 PID 3056 wrote to memory of 2896 3056 abc1.exe 32 PID 3056 wrote to memory of 2896 3056 abc1.exe 32 PID 3056 wrote to memory of 2896 3056 abc1.exe 32 PID 3056 wrote to memory of 2896 3056 abc1.exe 32 PID 3056 wrote to memory of 2896 3056 abc1.exe 32 PID 3056 wrote to memory of 2896 3056 abc1.exe 32 PID 3056 wrote to memory of 2896 3056 abc1.exe 32 PID 2756 wrote to memory of 2820 2756 rundll32.eXe 33 PID 2756 wrote to memory of 2820 2756 rundll32.eXe 33 PID 2756 wrote to memory of 2820 2756 rundll32.eXe 33 PID 2820 wrote to memory of 2808 2820 cmd.exe 35 PID 2820 wrote to memory of 2808 2820 cmd.exe 35 PID 2820 wrote to memory of 2808 2820 cmd.exe 35 PID 2756 wrote to memory of 2484 2756 rundll32.eXe 36 PID 2756 wrote to memory of 2484 2756 rundll32.eXe 36 PID 2756 wrote to memory of 2484 2756 rundll32.eXe 36 PID 2756 wrote to memory of 2556 2756 rundll32.eXe 38 PID 2756 wrote to memory of 2556 2756 rundll32.eXe 38 PID 2756 wrote to memory of 2556 2756 rundll32.eXe 38 PID 2556 wrote to memory of 2616 2556 cmd.exe 40 PID 2556 wrote to memory of 2616 2556 cmd.exe 40 PID 2556 wrote to memory of 2616 2556 cmd.exe 40 PID 2756 wrote to memory of 2968 2756 rundll32.eXe 41 PID 2756 wrote to memory of 2968 2756 rundll32.eXe 41 PID 2756 wrote to memory of 2968 2756 rundll32.eXe 41 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2808 attrib.exe 2616 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d01b80759402a4c6f5e8b610acc0e682_JaffaCakes118.exe"1⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\abc1.exe"C:\Users\Admin\AppData\Local\Temp\abc1.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\system32\winlogon.exewinlogon3⤵PID:2668
-
-
C:\Windows\system32\winlogon.exewinlogon3⤵PID:2896
-
-
-
C:\Users\Admin\AppData\Local\Temp\rundll32.eXe"C:\Users\Admin\AppData\Local\Temp\rundll32.eXe"2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +r +s +h +i "C:\Users\Admin\AppData\Roaming\MSNMessengerAPI.dll"3⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\system32\attrib.exeattrib +r +s +h +i "C:\Users\Admin\AppData\Roaming\MSNMessengerAPI.dll"4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2808
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\rundll32.eXe" "C:\Users\Admin\AppData\Roaming\rundll32.exe"3⤵PID:2484
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +r +s +h +i "C:\Users\Admin\AppData\Roaming\rundll32.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\system32\attrib.exeattrib +r +s +h +i "C:\Users\Admin\AppData\Roaming\rundll32.exe"4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2616
-
-
-
C:\Users\Admin\AppData\Roaming\rundll32.exe"C:\Users\Admin\AppData\Roaming\rundll32.exe" new3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
332KB
MD599fcd0a304510e52fc20df8cd4971779
SHA1706c4188ac5f2b3ec3794acc7cb527f4fb150e62
SHA256665f893f3a8f6f82e795fdc619aa2a8af0333e7e12ef4bc43eca740411bbda18
SHA512bf0b6828b86ff0018f485de49e23ebff0fa8ed90e1717461ec80bcf0f33a62b3b772a931902635f6093fe079e665adc5247fd46470d53a346c6ea93c0c0ac6ea
-
Filesize
152KB
MD549b1dfc49432bbe9b8a311113d20efd7
SHA179c030ae82d4b3a670b6bc1745c5bcba1a826172
SHA2567bede7449f9c39ed911f8aef7fb1f13af8111cd630e9509a9e75a332f689e8fd
SHA512963948b6ad785537c85798906635d1a3f670c2a88af3ace5259cf8443610d782f1d65dd36aa77c88032326fe23c287b67f0efe9bebd10c6dcb2f21a853d96f3e
-
Filesize
56KB
MD523eb031b6159df31ac9cb64fed550e73
SHA1aaa8d925d7d9f94192b9b54589b948d61fb329a6
SHA256eb454b56713fdf8003be674a7da3ea63c24473f8c6f6ee274ec8db55900f2732
SHA5124263ece29f6dcd886d5da436653c2bf4f9ccca99aca364635ca672234efc49ec0a6317517687d9a349fc80e7a44e89133c00d9ad82ac515328f1283595eee985