Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/01/2025, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_617c0618203542d377000e452828f790.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_617c0618203542d377000e452828f790.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_617c0618203542d377000e452828f790.exe
-
Size
952KB
-
MD5
617c0618203542d377000e452828f790
-
SHA1
79a66972ca16b3b43723e26aaf1701a36668746e
-
SHA256
ca8fe5d792569f5e866d1a5b173de5fc9158b4e597e416fab89600abd7ac485c
-
SHA512
eead965c2929d0b52cf823d7d08ce9c16c2ab4bcd579236266f0d2695060c2c4c6c6d310e9b82746436fc04d69c78d70caff0edebd72be272091ad1490857ec1
-
SSDEEP
12288:byyy7Z3z4I8NXOGjwwG/ZjXsAHHz79p9NM5Tz103j2CF4TxQUOfhVPOSAE//VAci:baCI2OewFJN4mkxyHnnew1SatLRzD
Malware Config
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
pid Process 3520 micoffice.exe 408 micoffice.exe 3172 micoffice.exe -
Loads dropped DLL 7 IoCs
pid Process 3288 JaffaCakes118_617c0618203542d377000e452828f790.exe 3288 JaffaCakes118_617c0618203542d377000e452828f790.exe 3288 JaffaCakes118_617c0618203542d377000e452828f790.exe 3288 JaffaCakes118_617c0618203542d377000e452828f790.exe 3288 JaffaCakes118_617c0618203542d377000e452828f790.exe 3520 micoffice.exe 3520 micoffice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\msoffice = "C:\\Users\\Admin\\AppData\\Roaming\\MicrosoftOffice\\micoffice.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2788 set thread context of 3288 2788 JaffaCakes118_617c0618203542d377000e452828f790.exe 30 PID 3520 set thread context of 408 3520 micoffice.exe 35 PID 3520 set thread context of 3172 3520 micoffice.exe 36 -
resource yara_rule behavioral1/memory/3288-432-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3288-445-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3288-443-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3288-437-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3288-430-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3288-1036-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/408-1043-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_617c0618203542d377000e452828f790.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_617c0618203542d377000e452828f790.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micoffice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micoffice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micoffice.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3172 micoffice.exe Token: SeSecurityPrivilege 3172 micoffice.exe Token: SeTakeOwnershipPrivilege 3172 micoffice.exe Token: SeLoadDriverPrivilege 3172 micoffice.exe Token: SeSystemProfilePrivilege 3172 micoffice.exe Token: SeSystemtimePrivilege 3172 micoffice.exe Token: SeProfSingleProcessPrivilege 3172 micoffice.exe Token: SeIncBasePriorityPrivilege 3172 micoffice.exe Token: SeCreatePagefilePrivilege 3172 micoffice.exe Token: SeBackupPrivilege 3172 micoffice.exe Token: SeRestorePrivilege 3172 micoffice.exe Token: SeShutdownPrivilege 3172 micoffice.exe Token: SeDebugPrivilege 3172 micoffice.exe Token: SeSystemEnvironmentPrivilege 3172 micoffice.exe Token: SeChangeNotifyPrivilege 3172 micoffice.exe Token: SeRemoteShutdownPrivilege 3172 micoffice.exe Token: SeUndockPrivilege 3172 micoffice.exe Token: SeManageVolumePrivilege 3172 micoffice.exe Token: SeImpersonatePrivilege 3172 micoffice.exe Token: SeCreateGlobalPrivilege 3172 micoffice.exe Token: 33 3172 micoffice.exe Token: 34 3172 micoffice.exe Token: 35 3172 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe Token: SeDebugPrivilege 408 micoffice.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2788 JaffaCakes118_617c0618203542d377000e452828f790.exe 3288 JaffaCakes118_617c0618203542d377000e452828f790.exe 3520 micoffice.exe 408 micoffice.exe 3172 micoffice.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2788 wrote to memory of 3288 2788 JaffaCakes118_617c0618203542d377000e452828f790.exe 30 PID 2788 wrote to memory of 3288 2788 JaffaCakes118_617c0618203542d377000e452828f790.exe 30 PID 2788 wrote to memory of 3288 2788 JaffaCakes118_617c0618203542d377000e452828f790.exe 30 PID 2788 wrote to memory of 3288 2788 JaffaCakes118_617c0618203542d377000e452828f790.exe 30 PID 2788 wrote to memory of 3288 2788 JaffaCakes118_617c0618203542d377000e452828f790.exe 30 PID 2788 wrote to memory of 3288 2788 JaffaCakes118_617c0618203542d377000e452828f790.exe 30 PID 2788 wrote to memory of 3288 2788 JaffaCakes118_617c0618203542d377000e452828f790.exe 30 PID 2788 wrote to memory of 3288 2788 JaffaCakes118_617c0618203542d377000e452828f790.exe 30 PID 3288 wrote to memory of 3444 3288 JaffaCakes118_617c0618203542d377000e452828f790.exe 31 PID 3288 wrote to memory of 3444 3288 JaffaCakes118_617c0618203542d377000e452828f790.exe 31 PID 3288 wrote to memory of 3444 3288 JaffaCakes118_617c0618203542d377000e452828f790.exe 31 PID 3288 wrote to memory of 3444 3288 JaffaCakes118_617c0618203542d377000e452828f790.exe 31 PID 3444 wrote to memory of 3496 3444 cmd.exe 33 PID 3444 wrote to memory of 3496 3444 cmd.exe 33 PID 3444 wrote to memory of 3496 3444 cmd.exe 33 PID 3444 wrote to memory of 3496 3444 cmd.exe 33 PID 3288 wrote to memory of 3520 3288 JaffaCakes118_617c0618203542d377000e452828f790.exe 34 PID 3288 wrote to memory of 3520 3288 JaffaCakes118_617c0618203542d377000e452828f790.exe 34 PID 3288 wrote to memory of 3520 3288 JaffaCakes118_617c0618203542d377000e452828f790.exe 34 PID 3288 wrote to memory of 3520 3288 JaffaCakes118_617c0618203542d377000e452828f790.exe 34 PID 3520 wrote to memory of 408 3520 micoffice.exe 35 PID 3520 wrote to memory of 408 3520 micoffice.exe 35 PID 3520 wrote to memory of 408 3520 micoffice.exe 35 PID 3520 wrote to memory of 408 3520 micoffice.exe 35 PID 3520 wrote to memory of 408 3520 micoffice.exe 35 PID 3520 wrote to memory of 408 3520 micoffice.exe 35 PID 3520 wrote to memory of 408 3520 micoffice.exe 35 PID 3520 wrote to memory of 408 3520 micoffice.exe 35 PID 3520 wrote to memory of 3172 3520 micoffice.exe 36 PID 3520 wrote to memory of 3172 3520 micoffice.exe 36 PID 3520 wrote to memory of 3172 3520 micoffice.exe 36 PID 3520 wrote to memory of 3172 3520 micoffice.exe 36 PID 3520 wrote to memory of 3172 3520 micoffice.exe 36 PID 3520 wrote to memory of 3172 3520 micoffice.exe 36 PID 3520 wrote to memory of 3172 3520 micoffice.exe 36 PID 3520 wrote to memory of 3172 3520 micoffice.exe 36 PID 3520 wrote to memory of 3172 3520 micoffice.exe 36 PID 3520 wrote to memory of 3172 3520 micoffice.exe 36 PID 3520 wrote to memory of 3172 3520 micoffice.exe 36 PID 3520 wrote to memory of 3172 3520 micoffice.exe 36 PID 3520 wrote to memory of 3172 3520 micoffice.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_617c0618203542d377000e452828f790.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_617c0618203542d377000e452828f790.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_617c0618203542d377000e452828f790.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_617c0618203542d377000e452828f790.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\TCOSP.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "msoffice" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3496
-
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:408
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3172
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
155B
MD5f07b93136766adced3c6f0d74d869da0
SHA1787c530f33687d758b41295e01d7a9a1bba3a467
SHA256cd603067047c028fe12d4b099d13b3681dd698d25bc32474184e9d8edd3ed701
SHA512050105a5f14939a37f653421b24959cc90cb082b20df5bb1a81335fd0ad5e70c740b43f1d6df0fc7324551425894668acc3af0c533c7d90ff149d84e844c2d10
-
Filesize
952KB
MD5f7de25ea2e0533ff495e626e2f252ba9
SHA121a8bc4ef453f0b97a941ea17a59d506e9d722dd
SHA2563f6382d7ecfc5d9ed87ce4c8b02846f1aaa75c5971944f72fa1aeceb5ed6166e
SHA5128d90443097efaa19af0476e7f8417d5ca511cb115ec662e972497a2a0d8d7d65751e0abf3a0bd5ddee82c16bf829aa58b4f63b2afaced0a22869875c64e4ba33