Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
5014a1d55631c7325a956a0fe0581170_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5014a1d55631c7325a956a0fe0581170_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5014a1d55631c7325a956a0fe0581170_JaffaCakes118.exe
-
Size
340KB
-
MD5
5014a1d55631c7325a956a0fe0581170
-
SHA1
f10f437b6272b4431f701284c95471351d9aadc3
-
SHA256
b1d271908794f38e87d7cb53e1ae776807e18110024dc021312fcee498f143c2
-
SHA512
6a09476280249c65b33d66d9853c024c2cd773e39861161845b1d4f44a70f76ed3b9a77f917a88bd0030ad936910bb61f793d2d61e38e9291434b95caceb74f9
-
SSDEEP
6144:RxFKhPSLaINj+BGGHq8oPK+WhdfO8mAcaBtaA4PDd6ESqYWke:coGINj+BZqh5MO8mF0EpDdfSqYWk
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 2664 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2200 set thread context of 2024 2200 5014a1d55631c7325a956a0fe0581170_JaffaCakes118.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5014a1d55631c7325a956a0fe0581170_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2024 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2200 5014a1d55631c7325a956a0fe0581170_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2024 explorer.exe Token: SeShutdownPrivilege 2024 explorer.exe Token: SeShutdownPrivilege 2024 explorer.exe Token: SeShutdownPrivilege 2024 explorer.exe Token: SeShutdownPrivilege 2024 explorer.exe Token: SeShutdownPrivilege 2024 explorer.exe Token: SeShutdownPrivilege 2024 explorer.exe Token: SeShutdownPrivilege 2024 explorer.exe Token: SeShutdownPrivilege 2024 explorer.exe Token: SeShutdownPrivilege 2024 explorer.exe Token: SeShutdownPrivilege 2024 explorer.exe Token: SeShutdownPrivilege 2024 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe 2024 explorer.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2024 2200 5014a1d55631c7325a956a0fe0581170_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2024 2200 5014a1d55631c7325a956a0fe0581170_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2024 2200 5014a1d55631c7325a956a0fe0581170_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2024 2200 5014a1d55631c7325a956a0fe0581170_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2024 2200 5014a1d55631c7325a956a0fe0581170_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2024 2200 5014a1d55631c7325a956a0fe0581170_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2024 2200 5014a1d55631c7325a956a0fe0581170_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2664 2200 5014a1d55631c7325a956a0fe0581170_JaffaCakes118.exe 31 PID 2200 wrote to memory of 2664 2200 5014a1d55631c7325a956a0fe0581170_JaffaCakes118.exe 31 PID 2200 wrote to memory of 2664 2200 5014a1d55631c7325a956a0fe0581170_JaffaCakes118.exe 31 PID 2200 wrote to memory of 2664 2200 5014a1d55631c7325a956a0fe0581170_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2560 2664 cmd.exe 33 PID 2664 wrote to memory of 2560 2664 cmd.exe 33 PID 2664 wrote to memory of 2560 2664 cmd.exe 33 PID 2664 wrote to memory of 2560 2664 cmd.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2560 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5014a1d55631c7325a956a0fe0581170_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5014a1d55631c7325a956a0fe0581170_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2024
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\259425809.bat" "C:\Users\Admin\AppData\Local\Temp\5014a1d55631c7325a956a0fe0581170_JaffaCakes118.exe""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\5014a1d55631c7325a956a0fe0581170_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5e1c30a4f5084b217774b952f152e2608
SHA1c2a309b1a4ae166e11009cd2f42d74c990a474ae
SHA25652e1a8973d25c34d7a92a1b43c92e739c1b057a1025cff3a0617edb73c955acb
SHA512542a4ba050891f55f261aa7864198813d7600c5a782f60b2919b19d41826e7e747adf77cb48c8a8081b4c92fbba9ab177a48bcf6b8412074062d069ac6519e3c