Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
112s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe
-
Size
259KB
-
MD5
0b2cf9abc1b88e6db894191bdae4a95f
-
SHA1
22c2765d188b5e1780fdd732a361fbd732e8441e
-
SHA256
34f30c88f787108b49a07c2f36ffae92d8c337dfdaeaf4266683c711832a06e1
-
SHA512
b660f78cc3e1064094060c868cac14e01909d2f1e9cfedc032ebc62df49f562bbee0702c7ad00db987db7bd951cfe5fd2992e604ad17746f4e271a992ddd64f6
-
SSDEEP
6144:uSaBurd4ixUO3crX87b09HVVw+YOEB/gSlK7KOwb2:V/mybcQXUm+YOe2wb2
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 18 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\GloballyOpenPorts Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\AuthorizedApplications Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Configurable\System Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Configurable Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static\System Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\GloballyOpenPorts Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging Process not Found -
Modifies security service 2 TTPs 22 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Type = "32" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\DeleteFlag = "1" Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\RPC-EPMap Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\IPTLSOut Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Parameters 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\TriggerInfo 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Start = "4" Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\IPTLSIn Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Type = "32" Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\Teredo Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\ErrorControl = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\DeleteFlag = "1" Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Parameters Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Security Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Security 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\TriggerInfo\0 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\ErrorControl = "0" Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Security Process not Found -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\etadpug\ImagePath = "\"C:\\Program Files (x86)\\Google\\Desktop\\Install\\{df1a425b-aff8-7a3e-8255-85ec0105cb73}\\ \\...\\\u202eﯹ๛\\{df1a425b-aff8-7a3e-8255-85ec0105cb73}\\GoogleUpdate.exe\" <" 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 784 cmd.exe -
Unexpected DNS network traffic destination 11 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Update = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Desktop\\Install\\{df1a425b-aff8-7a3e-8255-85ec0105cb73}\\❤≸⋙\\Ⱒ☠⍨\\\u202eﯹ๛\\{df1a425b-aff8-7a3e-8255-85ec0105cb73}\\GoogleUpdate.exe\" >" 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created \systemroot\assembly\GAC_64\Desktop.ini Process not Found File created \systemroot\assembly\GAC_32\Desktop.ini Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2364 set thread context of 784 2364 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe 29 -
Drops file in Program Files directory 22 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\MpClient.dll:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MpSvc.dll:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\de-DE:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MpAsDesc.dll:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MpEvMsg.dll:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MsMpCom.dll:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MsMpLics.dll:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File created C:\Program Files (x86)\Google\Desktop\Install\{df1a425b-aff8-7a3e-8255-85ec0105cb73}\ \...\ﯹ๛\{df1a425b-aff8-7a3e-8255-85ec0105cb73}\GoogleUpdate.exe 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File created C:\Program Files (x86)\Google\Desktop\Install\{df1a425b-aff8-7a3e-8255-85ec0105cb73}\ \...\ﯹ๛\{df1a425b-aff8-7a3e-8255-85ec0105cb73}\@ 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\en-US:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MpOAV.dll:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MsMpRes.dll:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\es-ES:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\it-IT:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\ja-JP:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MpCommu.dll:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MpRTP.dll:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Google\Desktop\Install\{df1a425b-aff8-7a3e-8255-85ec0105cb73}\ \...\ﯹ๛\{df1a425b-aff8-7a3e-8255-85ec0105cb73}\@ Process not Found File opened for modification C:\Program Files (x86)\Google\Desktop\Install\{df1a425b-aff8-7a3e-8255-85ec0105cb73}\ \...\ﯹ๛\{df1a425b-aff8-7a3e-8255-85ec0105cb73}\@\:@ Process not Found File opened for modification C:\Program Files\Windows Defender\fr-FR:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
NTFS ADS 19 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\de-DE:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MpClient.dll:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MpOAV.dll:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\en-US:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\es-ES:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\fr-FR:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MpEvMsg.dll:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MpRTP.dll:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MpSvc.dll:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MsMpLics.dll:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MsMpCom.dll:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Google\Desktop\Install\{df1a425b-aff8-7a3e-8255-85ec0105cb73}\ \...\ﯹ๛\{df1a425b-aff8-7a3e-8255-85ec0105cb73}\@\:@ Process not Found File opened for modification C:\Program Files\Windows Defender\it-IT:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\ja-JP:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MpAsDesc.dll:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MpCommu.dll:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Defender\MsMpRes.dll:! 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2364 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe 2364 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe 2364 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe 2364 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe 472 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2364 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe 2364 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeRestorePrivilege 2364 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe Token: SeDebugPrivilege 2364 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe Token: SeDebugPrivilege 2364 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe Token: SeRestorePrivilege 2364 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe Token: SeBackupPrivilege 472 Process not Found Token: SeRestorePrivilege 472 Process not Found Token: SeSecurityPrivilege 472 Process not Found Token: SeTakeOwnershipPrivilege 472 Process not Found Token: SeBackupPrivilege 472 Process not Found Token: SeRestorePrivilege 472 Process not Found Token: SeSecurityPrivilege 472 Process not Found Token: SeTakeOwnershipPrivilege 472 Process not Found Token: SeBackupPrivilege 472 Process not Found Token: SeRestorePrivilege 472 Process not Found Token: SeSecurityPrivilege 472 Process not Found Token: SeTakeOwnershipPrivilege 472 Process not Found Token: SeBackupPrivilege 472 Process not Found Token: SeRestorePrivilege 472 Process not Found Token: SeSecurityPrivilege 472 Process not Found Token: SeTakeOwnershipPrivilege 472 Process not Found Token: SeBackupPrivilege 472 Process not Found Token: SeRestorePrivilege 472 Process not Found Token: SeSecurityPrivilege 472 Process not Found Token: SeTakeOwnershipPrivilege 472 Process not Found Token: SeBackupPrivilege 472 Process not Found Token: SeRestorePrivilege 472 Process not Found Token: SeSecurityPrivilege 472 Process not Found Token: SeTakeOwnershipPrivilege 472 Process not Found Token: SeBackupPrivilege 472 Process not Found Token: SeRestorePrivilege 472 Process not Found Token: SeSecurityPrivilege 472 Process not Found Token: SeTakeOwnershipPrivilege 472 Process not Found Token: SeBackupPrivilege 472 Process not Found Token: SeRestorePrivilege 472 Process not Found Token: SeSecurityPrivilege 472 Process not Found Token: SeTakeOwnershipPrivilege 472 Process not Found Token: SeDebugPrivilege 472 Process not Found -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2364 wrote to memory of 784 2364 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe 29 PID 2364 wrote to memory of 784 2364 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe 29 PID 2364 wrote to memory of 784 2364 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe 29 PID 2364 wrote to memory of 784 2364 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe 29 PID 2364 wrote to memory of 784 2364 0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0b2cf9abc1b88e6db894191bdae4a95f_JaffaCakes118.exe"1⤵
- Modifies security service
- Sets service image path in registry
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:784
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Google\Desktop\Install\{df1a425b-aff8-7a3e-8255-85ec0105cb73}\ \...\ﯹ๛\{df1a425b-aff8-7a3e-8255-85ec0105cb73}\@
Filesize2KB
MD5e9583687fdb1522ee75a3ccc9d77ec18
SHA181963d263a50e15b4b2047a6f458e0805bc32f6d
SHA256d3c29b2b88e10a2ddf01d98d6e0d7ea2395d36fcb27c49afee7472eb4bd7c048
SHA5124a469b07284ae76b77a10ab338e8716fd709c1cb4800b9619e1a7af9263bd10bfb426456e439e93b10b2c4e74094084b002dee5de74098a55e0999c7cd691a98