Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 10:07
Static task
static1
Behavioral task
behavioral1
Sample
d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe
-
Size
314KB
-
MD5
d61982cb8ec501a9d20cb14e9b3fc0e9
-
SHA1
af0a6f77b520d5744a055c1f89aa68957f1014de
-
SHA256
d94cd4f80b2d5356f3c4879c1b12d279d7e7df650317b7285c72fe51e2c51e06
-
SHA512
769c45249b65cd9bd6cbd136d83bf8dd789983a20c90d41ddc5ac5ba59bf23d071818dc8ddae7ce7bb36437289f417a21666a2b3d20fdec8a12a3cf0a2d68977
-
SSDEEP
6144:Tz+92mh7MJ/cPl3itVRsHHtXJ07l70a37YiteLKSh:TK2mh7MJ/cPlAYntCl7UGSh
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2744 slidebar.exe -
Loads dropped DLL 3 IoCs
pid Process 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1952-1-0x0000000001F50000-0x0000000002FDE000-memory.dmp upx behavioral1/memory/1952-6-0x0000000001F50000-0x0000000002FDE000-memory.dmp upx behavioral1/memory/1952-8-0x0000000001F50000-0x0000000002FDE000-memory.dmp upx behavioral1/memory/1952-3-0x0000000001F50000-0x0000000002FDE000-memory.dmp upx behavioral1/memory/1952-10-0x0000000001F50000-0x0000000002FDE000-memory.dmp upx behavioral1/memory/1952-9-0x0000000001F50000-0x0000000002FDE000-memory.dmp upx behavioral1/memory/1952-7-0x0000000001F50000-0x0000000002FDE000-memory.dmp upx behavioral1/memory/1952-5-0x0000000001F50000-0x0000000002FDE000-memory.dmp upx behavioral1/memory/1952-4-0x0000000001F50000-0x0000000002FDE000-memory.dmp upx behavioral1/memory/1952-11-0x0000000001F50000-0x0000000002FDE000-memory.dmp upx behavioral1/memory/1952-27-0x0000000001F50000-0x0000000002FDE000-memory.dmp upx behavioral1/memory/1952-28-0x0000000001F50000-0x0000000002FDE000-memory.dmp upx behavioral1/memory/1952-56-0x0000000001F50000-0x0000000002FDE000-memory.dmp upx behavioral1/memory/1952-55-0x0000000001F50000-0x0000000002FDE000-memory.dmp upx behavioral1/memory/1952-41-0x0000000001F50000-0x0000000002FDE000-memory.dmp upx -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\slidebar = "C:\\WINDOWS\\system32\\CatRoot2\\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\\slidebar.exe" slidebar.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\CatRoot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\slidebar.exe slidebar.exe File created C:\WINDOWS\system32\CatRoot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\slidebar.exe slidebar.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language slidebar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2852 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe Token: SeDebugPrivilege 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2852 WINWORD.EXE 2852 WINWORD.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1108 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe 19 PID 1952 wrote to memory of 1156 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe 20 PID 1952 wrote to memory of 1188 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe 21 PID 1952 wrote to memory of 1552 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe 25 PID 1952 wrote to memory of 2852 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe 30 PID 1952 wrote to memory of 2852 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe 30 PID 1952 wrote to memory of 2852 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe 30 PID 1952 wrote to memory of 2852 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe 30 PID 1952 wrote to memory of 2852 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe 30 PID 1952 wrote to memory of 2852 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe 30 PID 1952 wrote to memory of 2852 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe 30 PID 1952 wrote to memory of 2744 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe 31 PID 1952 wrote to memory of 2744 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe 31 PID 1952 wrote to memory of 2744 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe 31 PID 1952 wrote to memory of 2744 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe 31 PID 1952 wrote to memory of 2744 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe 31 PID 1952 wrote to memory of 2744 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe 31 PID 1952 wrote to memory of 2744 1952 d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe 31 PID 2852 wrote to memory of 1604 2852 WINWORD.EXE 34 PID 2852 wrote to memory of 1604 2852 WINWORD.EXE 34 PID 2852 wrote to memory of 1604 2852 WINWORD.EXE 34 PID 2852 wrote to memory of 1604 2852 WINWORD.EXE 34 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1156
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d61982cb8ec501a9d20cb14e9b3fc0e9_JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1952 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Win\drivers\ISPR Clarification.doc"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122884⤵PID:1604
-
-
-
C:\Win\drivers\slidebar.exe"C:\Win\drivers\slidebar.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2744
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1552
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238KB
MD513619025a126c56c3097d533414f2230
SHA10f449570cbc93aef78838ead799fae3c3b7cf93e
SHA2565deb2dab773cffc3be4ffa62d1a60a892c8fa629dba756d7ba3ad2fa20d7fce3
SHA512278599ebf194c371eec789da6a7eb0bb5ed71bc330c2ab93d30458176ba6523bc2fa7ff347c6fdf65c1ba5d9d8e74f0add5757d5441478c1e1d700ffb29fe4a1
-
Filesize
19KB
MD5454221bf7f6ff95b167b9691661a1b53
SHA1fca81fdafe7575e6a9b7ad87f4688919916257ff
SHA256498b76eb4309780a84a7b8e45795d6f1e1743eba9892e7b166a72d5a12da916e
SHA51271d998294690cea273ff1c17475e6e2f53d947ec2c7acec080152e595548de8d79378cb4ebe27b5748e7349b3baf5852be1479d5a074790b5758e12ef52639da
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
109KB
MD53ff101716f3a78ac2846ff0387bc0812
SHA1362c9112a1ec9fc82ec34a9fbeb46506a24e97c3
SHA256f48dcd0ebfb91d4e126c91ea8c6f85d2d8b7aca25af66ed7233b21570d46bb84
SHA5129f1c337fb79c6ea918a304f17d9d7869c00500e1bbcc9846583727ad3f1bbf5dfa78144b6937d9663a06950843b4907baf405008c8d3c204450b4a720e0a8b00
-
Filesize
72KB
MD5734e552fe9ffd1ffdea3434c62dd2e4b
SHA107263f4cb2c12ec4cad6ecae0dfae4e45731c4da
SHA256a84fc65fef7bad1496a406bdef35ece5c0a25e9acdc2002915513f6dbb1ce20a
SHA5129a0b90412476f8c24f0834284b9e14cd170cde96c61e8774833868034a2745783870440f8632861077944bd8ffe72e2b721693507a817874ad2b9e7683cbd2d3