Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 08:17
Static task
static1
Behavioral task
behavioral1
Sample
0ebec8be6baced04447b22d80a1dd6c9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ebec8be6baced04447b22d80a1dd6c9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0ebec8be6baced04447b22d80a1dd6c9_JaffaCakes118.exe
-
Size
260KB
-
MD5
0ebec8be6baced04447b22d80a1dd6c9
-
SHA1
4384a46721f9fece5bd7bad407d4e2471787041d
-
SHA256
b66ba044beb550f600684299e907634f0eff0fa7b0f70c3f982b5af3d340fc52
-
SHA512
9b0e887d14abad601bdd22f22ea2b27b8a6daad7959d5e309f2577e1e9cb0a4885b034c2387faa2f782af5a99a8a15e3c2fe36c416ac349eb69f6f90d079c392
-
SSDEEP
3072:vgfAlNNvh25n/kZoSUjMqXnpWAkpAmTSrMaIOYt/jo7LAtPhjjtZnfHFEoWBfGVn:vdUgTSrMaIl/jcLijfHFEHWzXvjT85R
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" keour.exe -
Executes dropped EXE 1 IoCs
pid Process 1628 keour.exe -
Loads dropped DLL 2 IoCs
pid Process 2488 0ebec8be6baced04447b22d80a1dd6c9_JaffaCakes118.exe 2488 0ebec8be6baced04447b22d80a1dd6c9_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /u" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /K" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /n" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /r" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /q" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /N" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /Z" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /v" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /i" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /H" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /o" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /W" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /g" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /S" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /Q" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /M" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /l" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /t" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /A" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /Y" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /e" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /C" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /b" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /I" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /j" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /R" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /P" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /J" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /T" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /d" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /x" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /V" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /X" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /y" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /B" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /F" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /z" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /p" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /O" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /w" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /f" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /h" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /s" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /U" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /a" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /c" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /k" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /L" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /D" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /E" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /m" keour.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\keour = "C:\\Users\\Admin\\keour.exe /G" keour.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ebec8be6baced04447b22d80a1dd6c9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keour.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe 1628 keour.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2488 0ebec8be6baced04447b22d80a1dd6c9_JaffaCakes118.exe 1628 keour.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 1628 2488 0ebec8be6baced04447b22d80a1dd6c9_JaffaCakes118.exe 30 PID 2488 wrote to memory of 1628 2488 0ebec8be6baced04447b22d80a1dd6c9_JaffaCakes118.exe 30 PID 2488 wrote to memory of 1628 2488 0ebec8be6baced04447b22d80a1dd6c9_JaffaCakes118.exe 30 PID 2488 wrote to memory of 1628 2488 0ebec8be6baced04447b22d80a1dd6c9_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ebec8be6baced04447b22d80a1dd6c9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0ebec8be6baced04447b22d80a1dd6c9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\keour.exe"C:\Users\Admin\keour.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1628
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD58ebcd89e9a0d49f9111f72c2d9afe22b
SHA1c6fdc3e2c6db14ffe26587064d7d6d121228a0e9
SHA25635b049d1a4c7c83f90ced1bd126af1779db40625cb89fb3794f4886ca352974d
SHA5126ce12d863df946f57afda5c5057fda1e9eb5997f22fc93408776d7e686b30dd57f89fcdf7ce74f5bc06ad63363c7f75665e54b7a12e5e10e88bbe53825ab32f1