Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 00:24
Static task
static1
Behavioral task
behavioral1
Sample
eeb9f42ba23b420e2d232ab6b4a645ba_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eeb9f42ba23b420e2d232ab6b4a645ba_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eeb9f42ba23b420e2d232ab6b4a645ba_JaffaCakes118.exe
-
Size
96KB
-
MD5
eeb9f42ba23b420e2d232ab6b4a645ba
-
SHA1
4754ee6fbb9d0eb9c9a4474a07395f276911262e
-
SHA256
0073b7b93ec0cef874a3fbf594c2e12926477d93bbf40e02fa9cc3c101604710
-
SHA512
2ad4d4bdf60ce2eb19ff029f9862483e5d80446ddb3ba0ff718a3de71015c7f7e6dee64beecc0aafb33110abfadf3bd4278b56ce04301242b8a5fecef2b4db08
-
SSDEEP
1536:P5LEg52Y9tyVQO8P8ychaFwjj3RJNEo/knRzdnynE7RldNEP8lijOe/NIjnZKI:PZE/YelychrzR3Ek65Rldq/Cn4I
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" eeb9f42ba23b420e2d232ab6b4a645ba_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yuuem.exe -
Executes dropped EXE 1 IoCs
pid Process 2332 yuuem.exe -
Loads dropped DLL 2 IoCs
pid Process 2720 eeb9f42ba23b420e2d232ab6b4a645ba_JaffaCakes118.exe 2720 eeb9f42ba23b420e2d232ab6b4a645ba_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /Y" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /e" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /D" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /d" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /b" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /l" eeb9f42ba23b420e2d232ab6b4a645ba_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /n" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /J" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /F" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /t" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /W" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /A" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /O" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /R" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /q" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /m" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /j" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /M" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /p" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /k" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /a" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /s" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /L" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /H" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /y" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /N" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /B" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /P" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /f" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /g" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /E" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /C" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /T" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /V" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /h" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /l" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /w" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /S" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /c" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /X" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /Q" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /Z" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /u" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /I" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /o" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /i" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /K" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /x" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /z" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /U" yuuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuem = "C:\\Users\\Admin\\yuuem.exe /r" yuuem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeb9f42ba23b420e2d232ab6b4a645ba_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yuuem.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2720 eeb9f42ba23b420e2d232ab6b4a645ba_JaffaCakes118.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe 2332 yuuem.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2720 eeb9f42ba23b420e2d232ab6b4a645ba_JaffaCakes118.exe 2332 yuuem.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2332 2720 eeb9f42ba23b420e2d232ab6b4a645ba_JaffaCakes118.exe 29 PID 2720 wrote to memory of 2332 2720 eeb9f42ba23b420e2d232ab6b4a645ba_JaffaCakes118.exe 29 PID 2720 wrote to memory of 2332 2720 eeb9f42ba23b420e2d232ab6b4a645ba_JaffaCakes118.exe 29 PID 2720 wrote to memory of 2332 2720 eeb9f42ba23b420e2d232ab6b4a645ba_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\eeb9f42ba23b420e2d232ab6b4a645ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eeb9f42ba23b420e2d232ab6b4a645ba_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\yuuem.exe"C:\Users\Admin\yuuem.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5887e1778f88f4215c63fef7d1e65702b
SHA1115006b6769b1d805dcf601d3e712e08462375d1
SHA2560b973f3c7f0d5130e870ec3a82b5cb2082ef2ad3553177e1bf6f4f090e2fff1a
SHA5127ec6fa536ec74d3c3af7c25764d528bbd8c36055c4fa00a704c67cbfdd5b07ce7494a962ea3307af8411c261d50504b47e54418d189616d3760119ed2200f951