Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/02/2025, 21:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe
-
Size
883KB
-
MD5
0e3fb02e7dfea66abd48e45f5690c87d
-
SHA1
7d3e2c7d2b76055a4e7419680754a5554368df2e
-
SHA256
68bf1663ef3b3c2434e7e015f637d864b8ba3ca53b3eceab69f80a11e60fbbe2
-
SHA512
4f3690b1b36ae8772ce17fbc230235ce5b4d58a6a66d56d1a030f217c6d2d6d367e6e42ea2ef52593c5eeb97f673b418ca2de378a3c5e848dfaf2a4e2d9a151e
-
SSDEEP
24576:4JWgXVxGJ1IC3ovkKWy9+6axHUzDNyrzPrRxmT41a+iSe:89XDGzhmkK05U/NAbrPmU1a+iT
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 5 IoCs
resource yara_rule behavioral1/memory/2764-13-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades behavioral1/memory/2764-18-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades behavioral1/memory/2764-19-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades behavioral1/memory/2764-20-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades behavioral1/memory/2764-22-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2196 set thread context of 2764 2196 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 31 -
resource yara_rule behavioral1/memory/2764-6-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2764-5-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2764-1-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2764-14-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2764-13-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2764-18-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2764-19-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2764-20-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2764-22-0x0000000000400000-0x0000000000474000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2620 reg.exe 2668 reg.exe 2608 reg.exe 2576 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeCreateTokenPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeAssignPrimaryTokenPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeLockMemoryPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeIncreaseQuotaPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeMachineAccountPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeTcbPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeSecurityPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeTakeOwnershipPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeLoadDriverPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeSystemProfilePrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeSystemtimePrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeProfSingleProcessPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeIncBasePriorityPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeCreatePagefilePrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeCreatePermanentPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeBackupPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeRestorePrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeShutdownPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeDebugPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeAuditPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeSystemEnvironmentPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeChangeNotifyPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeRemoteShutdownPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeUndockPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeSyncAgentPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeEnableDelegationPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeManageVolumePrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeImpersonatePrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeCreateGlobalPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: 31 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: 32 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: 33 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: 34 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: 35 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeDebugPrivilege 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2764 2196 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 31 PID 2196 wrote to memory of 2764 2196 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 31 PID 2196 wrote to memory of 2764 2196 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 31 PID 2196 wrote to memory of 2764 2196 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 31 PID 2196 wrote to memory of 2764 2196 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 31 PID 2196 wrote to memory of 2764 2196 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 31 PID 2196 wrote to memory of 2764 2196 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 31 PID 2196 wrote to memory of 2764 2196 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 31 PID 2196 wrote to memory of 2764 2196 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 31 PID 2196 wrote to memory of 2764 2196 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 31 PID 2196 wrote to memory of 2764 2196 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 31 PID 2764 wrote to memory of 2792 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 32 PID 2764 wrote to memory of 2792 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 32 PID 2764 wrote to memory of 2792 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 32 PID 2764 wrote to memory of 2792 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 32 PID 2764 wrote to memory of 2664 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 33 PID 2764 wrote to memory of 2664 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 33 PID 2764 wrote to memory of 2664 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 33 PID 2764 wrote to memory of 2664 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 33 PID 2764 wrote to memory of 2188 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 35 PID 2764 wrote to memory of 2188 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 35 PID 2764 wrote to memory of 2188 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 35 PID 2764 wrote to memory of 2188 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 35 PID 2764 wrote to memory of 2568 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 37 PID 2764 wrote to memory of 2568 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 37 PID 2764 wrote to memory of 2568 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 37 PID 2764 wrote to memory of 2568 2764 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 37 PID 2792 wrote to memory of 2668 2792 cmd.exe 42 PID 2792 wrote to memory of 2668 2792 cmd.exe 42 PID 2792 wrote to memory of 2668 2792 cmd.exe 42 PID 2792 wrote to memory of 2668 2792 cmd.exe 42 PID 2664 wrote to memory of 2620 2664 cmd.exe 43 PID 2664 wrote to memory of 2620 2664 cmd.exe 43 PID 2664 wrote to memory of 2620 2664 cmd.exe 43 PID 2664 wrote to memory of 2620 2664 cmd.exe 43 PID 2568 wrote to memory of 2576 2568 cmd.exe 40 PID 2568 wrote to memory of 2576 2568 cmd.exe 40 PID 2568 wrote to memory of 2576 2568 cmd.exe 40 PID 2568 wrote to memory of 2576 2568 cmd.exe 40 PID 2188 wrote to memory of 2608 2188 cmd.exe 41 PID 2188 wrote to memory of 2608 2188 cmd.exe 41 PID 2188 wrote to memory of 2608 2188 cmd.exe 41 PID 2188 wrote to memory of 2608 2188 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe"1⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2620
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2608
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2576
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33B
MD5fa98b4e0a38f9744f404ac81d7d80097
SHA1ff6e03c232ad031d84db90e0c658c35133e0c3a6
SHA25679b3c50917d02cf28ccc209536cfc6a6b73f65735368de462d7a1b72a54897bd
SHA5122db762317cfa6e7390a8b0c9fc870f54b87dee9466537f4a428dbbd9ee1168fc868f714272ed0c62cbb39d45474b053500dc9eb43b39077e5f258a9122c961b8