Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31/12/2024, 06:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe
-
Size
288KB
-
MD5
07ec8b6e8c148b2847a910f6b5c63c2d
-
SHA1
7a2b2e33a88a8fc6b132de6bd833387438279824
-
SHA256
62dc18f7d85f9c5009ea692618f650c51859ec71c2e5116c1a791f076cdac8b6
-
SHA512
d1610d4a7d24302ee938bebb8ac5df0dbe0ecb0ebba0742cef3c97531438f157f26a28b24be40f448aa0da20472cf6981b20c053eca8112902ee372bae35d123
-
SSDEEP
3072:tmJ+bNK6/M9WdT55ojgkSluk3zKNTaaHw7Koj4rtzf9EpvOBdts58n1bdctEPAnE:t1b86k9MVkSENPUvodK8YtEP++UsZ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\Users\\Admin\\AppData\\Local\\lrbmkuxa\\tusyuuhq.exe" svchost.exe -
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" ldqtwwgw.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" ldqtwwgw.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" ldqtwwgw.exe -
Modifies security service 2 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Start = "4" svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" ldqtwwgw.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" ldqtwwgw.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" ldqtwwgw.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Start = "4" ldqtwwgw.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" svchost.exe -
Ramnit family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ldqtwwgw.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ldqtwwgw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ldqtwwgw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ldqtwwgw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ldqtwwgw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" ldqtwwgw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ldqtwwgw.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tusyuuhq.exe svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tusyuuhq.exe svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 2936 ldqtwwgw.exe 2648 ldqtwwgw.exe -
Loads dropped DLL 4 IoCs
pid Process 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 2572 cmd.exe 2572 cmd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ldqtwwgw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ldqtwwgw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ldqtwwgw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ldqtwwgw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ldqtwwgw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" ldqtwwgw.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\TusYuuhq = "C:\\Users\\Admin\\AppData\\Local\\lrbmkuxa\\tusyuuhq.exe" svchost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ldqtwwgw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ldqtwwgw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ldqtwwgw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2056 svchost.exe 2056 svchost.exe 2648 ldqtwwgw.exe 2648 ldqtwwgw.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 472 Process not Found -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeSecurityPrivilege 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe Token: SeDebugPrivilege 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe Token: SeSecurityPrivilege 2348 svchost.exe Token: SeSecurityPrivilege 2056 svchost.exe Token: SeDebugPrivilege 2056 svchost.exe Token: SeDebugPrivilege 2056 svchost.exe Token: SeDebugPrivilege 2056 svchost.exe Token: SeRestorePrivilege 2056 svchost.exe Token: SeBackupPrivilege 2056 svchost.exe Token: SeSecurityPrivilege 2936 ldqtwwgw.exe Token: SeSecurityPrivilege 2648 ldqtwwgw.exe Token: SeLoadDriverPrivilege 2648 ldqtwwgw.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2348 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 31 PID 2896 wrote to memory of 2348 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 31 PID 2896 wrote to memory of 2348 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 31 PID 2896 wrote to memory of 2348 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 31 PID 2896 wrote to memory of 2348 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 31 PID 2896 wrote to memory of 2348 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 31 PID 2896 wrote to memory of 2348 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 31 PID 2896 wrote to memory of 2348 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 31 PID 2896 wrote to memory of 2348 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 31 PID 2896 wrote to memory of 2348 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 31 PID 2896 wrote to memory of 2348 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 31 PID 2896 wrote to memory of 2056 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 32 PID 2896 wrote to memory of 2056 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 32 PID 2896 wrote to memory of 2056 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 32 PID 2896 wrote to memory of 2056 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 32 PID 2896 wrote to memory of 2056 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 32 PID 2896 wrote to memory of 2056 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 32 PID 2896 wrote to memory of 2056 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 32 PID 2896 wrote to memory of 2056 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 32 PID 2896 wrote to memory of 2056 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 32 PID 2896 wrote to memory of 2056 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 32 PID 2896 wrote to memory of 2056 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 32 PID 2896 wrote to memory of 2936 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 33 PID 2896 wrote to memory of 2936 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 33 PID 2896 wrote to memory of 2936 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 33 PID 2896 wrote to memory of 2936 2896 JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe 33 PID 2936 wrote to memory of 2572 2936 ldqtwwgw.exe 34 PID 2936 wrote to memory of 2572 2936 ldqtwwgw.exe 34 PID 2936 wrote to memory of 2572 2936 ldqtwwgw.exe 34 PID 2936 wrote to memory of 2572 2936 ldqtwwgw.exe 34 PID 2572 wrote to memory of 2648 2572 cmd.exe 36 PID 2572 wrote to memory of 2648 2572 cmd.exe 36 PID 2572 wrote to memory of 2648 2572 cmd.exe 36 PID 2572 wrote to memory of 2648 2572 cmd.exe 36 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ldqtwwgw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_07ec8b6e8c148b2847a910f6b5c63c2d.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Modifies security service
- UAC bypass
- Windows security bypass
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Users\Admin\AppData\Local\Temp\ldqtwwgw.exe"C:\Users\Admin\AppData\Local\Temp\ldqtwwgw.exe" elevate2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\ldqtwwgw.exe"" admin3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\ldqtwwgw.exe"C:\Users\Admin\AppData\Local\Temp\ldqtwwgw.exe" admin4⤵
- Modifies firewall policy service
- Modifies security service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2648
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD507ec8b6e8c148b2847a910f6b5c63c2d
SHA17a2b2e33a88a8fc6b132de6bd833387438279824
SHA25662dc18f7d85f9c5009ea692618f650c51859ec71c2e5116c1a791f076cdac8b6
SHA512d1610d4a7d24302ee938bebb8ac5df0dbe0ecb0ebba0742cef3c97531438f157f26a28b24be40f448aa0da20472cf6981b20c053eca8112902ee372bae35d123