Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 03:48
Static task
static1
Behavioral task
behavioral1
Sample
3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe
-
Size
133KB
-
MD5
3da04a29968c564cb55097de7b874d90
-
SHA1
cdae4b76ea2c79a6ff5f5374cf9c1c331a65f964
-
SHA256
1df52924193d5af41ccee8b20bf0bc991b0e6f57a78fbadb0b4c3d21b145725d
-
SHA512
bfd44a8ba09420585dc5d3104e910d4e795ec3e850b3caf3dc697e7f0f78f764c1f27aa33a4340cdedbc9e8d0846136387d88385089e6db24a0dd7dbcace5f6c
-
SSDEEP
1536:EqPjWlpp/06w6Px9+3cu9V+gKBtU+0Bf/LWPV58i2va8i2v28i2v:EqPK1/7w6ZAs+VBKBtwHLArUQU0U
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Serverx = "C:\\Windows\\system32\\Serverx.exe" 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Serverx.exe 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\SERVERX.EXE 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Serverx.exe 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 24 IoCs
pid Process 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2096 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe Token: SeRestorePrivilege 2096 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe Token: SeBackupPrivilege 2096 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2096 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2096 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe Token: SeRestorePrivilege 2096 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe Token: SeBackupPrivilege 2096 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2096 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2096 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe Token: SeRestorePrivilege 2096 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe Token: SeBackupPrivilege 2096 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2096 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2548 2096 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2548 2096 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2548 2096 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2548 2096 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 30 PID 2548 wrote to memory of 384 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 3 PID 2548 wrote to memory of 384 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 3 PID 2548 wrote to memory of 384 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 3 PID 2548 wrote to memory of 384 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 3 PID 2548 wrote to memory of 384 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 3 PID 2548 wrote to memory of 396 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 4 PID 2548 wrote to memory of 396 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 4 PID 2548 wrote to memory of 396 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 4 PID 2548 wrote to memory of 396 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 4 PID 2548 wrote to memory of 396 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 4 PID 2548 wrote to memory of 432 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 5 PID 2548 wrote to memory of 432 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 5 PID 2548 wrote to memory of 432 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 5 PID 2548 wrote to memory of 432 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 5 PID 2548 wrote to memory of 432 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 5 PID 2548 wrote to memory of 480 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 6 PID 2548 wrote to memory of 480 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 6 PID 2548 wrote to memory of 480 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 6 PID 2548 wrote to memory of 480 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 6 PID 2548 wrote to memory of 480 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 6 PID 2548 wrote to memory of 488 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 7 PID 2548 wrote to memory of 488 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 7 PID 2548 wrote to memory of 488 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 7 PID 2548 wrote to memory of 488 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 7 PID 2548 wrote to memory of 488 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 7 PID 2548 wrote to memory of 496 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 8 PID 2548 wrote to memory of 496 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 8 PID 2548 wrote to memory of 496 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 8 PID 2548 wrote to memory of 496 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 8 PID 2548 wrote to memory of 496 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 8 PID 2548 wrote to memory of 592 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 9 PID 2548 wrote to memory of 592 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 9 PID 2548 wrote to memory of 592 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 9 PID 2548 wrote to memory of 592 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 9 PID 2548 wrote to memory of 592 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 9 PID 2548 wrote to memory of 672 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 10 PID 2548 wrote to memory of 672 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 10 PID 2548 wrote to memory of 672 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 10 PID 2548 wrote to memory of 672 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 10 PID 2548 wrote to memory of 672 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 10 PID 2548 wrote to memory of 744 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 11 PID 2548 wrote to memory of 744 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 11 PID 2548 wrote to memory of 744 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 11 PID 2548 wrote to memory of 744 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 11 PID 2548 wrote to memory of 744 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 11 PID 2548 wrote to memory of 812 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 12 PID 2548 wrote to memory of 812 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 12 PID 2548 wrote to memory of 812 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 12 PID 2548 wrote to memory of 812 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 12 PID 2548 wrote to memory of 812 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 12 PID 2548 wrote to memory of 860 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 13 PID 2548 wrote to memory of 860 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 13 PID 2548 wrote to memory of 860 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 13 PID 2548 wrote to memory of 860 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 13 PID 2548 wrote to memory of 860 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 13 PID 2548 wrote to memory of 964 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 15 PID 2548 wrote to memory of 964 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 15 PID 2548 wrote to memory of 964 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 15 PID 2548 wrote to memory of 964 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 15 PID 2548 wrote to memory of 964 2548 3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe 15
Processes
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:592
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:1792
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1876
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:672
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:744
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:812
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1128
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:860
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:964
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:276
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:1056
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1064
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1180
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:992
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:884
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:2288
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:488
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:496
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:396
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3da04a29968c564cb55097de7b874d90_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD54f1c6d9818bdd156391af805e686aaad
SHA16937abc4055ae60a09df2025aa885d783ee0c744
SHA256d18f52825ff020f9d18f608bba4e7bbadcc9b4f38a2e4afd5d2353178b29ef30
SHA512aca901746aab36802b7a0f19676921d1b37f95fdfa43e9bea798d62b6723e444fa7f409f84df2d635f26d462d6853983c2a6d32bea77de5fa6d369085f1deaf3