Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe
-
Size
340KB
-
MD5
eeae11c12bcea6d64c9e6494bbba7419
-
SHA1
3f4bda888c84f9fd1574180d66f67cd1d6eefc0b
-
SHA256
1cb302b2f3042969c7e6ee872a6296cb1094c0b50462e3b4c578eb6d34e6f151
-
SHA512
879826370136730c63cf522a9ad8e1e06605e423e3cc9e8630b6b936f0d06aa01aea14b07a4f32122b54fb976ae63d146f1538755d86bd363fbbf10be024d10d
-
SSDEEP
6144:u2/pimD94XFi8VkGAByIe7jRbugOkyWYYYo4XtCsHWKjN/pwT:PZ4XFiqkdDUR1yWDYokC4r
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2576 teu.exe -
Executes dropped EXE 1 IoCs
pid Process 2576 teu.exe -
Loads dropped DLL 2 IoCs
pid Process 3032 eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe 3032 eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe -
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\start\command teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\DefaultIcon\ = "%1" teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\open teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\open\command teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\teu.exe\" -a \"%1\" %*" teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\start teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\Content Type = "application/x-msdownload" teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\runas teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\ = "Application" teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\DefaultIcon teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\runas\command teu.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" teu.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language teu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe -
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\open teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\runas\command teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\start\command teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\open\command teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\start teu.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\ = "exefile" teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\teu.exe\" -a \"%1\" %*" teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\ = "Application" teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\DefaultIcon\ = "%1" teu.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell\runas teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\Content Type = "application/x-msdownload" teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell\runas\command teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell\open\command teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\Content Type = "application/x-msdownload" teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell\start teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\teu.exe\" -a \"%1\" %*" teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\runas teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\DefaultIcon teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\DefaultIcon teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\DefaultIcon\ = "%1" teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell\open teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" teu.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell\start\command teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" teu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" teu.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3032 eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe 3032 eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe 3032 eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe 3032 eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe 3032 eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe 3032 eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe 3032 eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe 3032 eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe 3032 eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe 2576 teu.exe 2576 teu.exe 2576 teu.exe 2576 teu.exe 2576 teu.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2692 explorer.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 2576 teu.exe 2576 teu.exe 2576 teu.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2576 teu.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2576 teu.exe 2576 teu.exe 2692 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2576 teu.exe 2692 explorer.exe 2692 explorer.exe 2576 teu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2576 teu.exe 2576 teu.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2576 3032 eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2576 3032 eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2576 3032 eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2576 3032 eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\teu.exe"C:\Users\Admin\AppData\Local\teu.exe" -gav C:\Users\Admin\AppData\Local\Temp\eeae11c12bcea6d64c9e6494bbba7419_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2576
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2692
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD5eeae11c12bcea6d64c9e6494bbba7419
SHA13f4bda888c84f9fd1574180d66f67cd1d6eefc0b
SHA2561cb302b2f3042969c7e6ee872a6296cb1094c0b50462e3b4c578eb6d34e6f151
SHA512879826370136730c63cf522a9ad8e1e06605e423e3cc9e8630b6b936f0d06aa01aea14b07a4f32122b54fb976ae63d146f1538755d86bd363fbbf10be024d10d