Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/02/2025, 22:53
Behavioral task
behavioral1
Sample
JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe
-
Size
336KB
-
MD5
1cc6566540cf786721e35e57aa8280eb
-
SHA1
76e9d90cd58116ce8d8644c35a89e0f6ea475de0
-
SHA256
f06547f5cddbc1fefc9e6eccbf0ac75edce601b2b20b1de5bd8bc540194fc94a
-
SHA512
3ef503ea01fe738cf3c6e474fd9f690fcd3ece5dc1451073ad5e81995647da54381ccdb92986f3a1f3dc2561a17c1dc453b6341be866720a2f8865d1228a54c6
-
SSDEEP
6144:JG78LjzOANvSAsQLqF9pXMiY3sGB6UduRfLtc:g7kmAN6omFMb3sGB6UduRfLa
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 3008 reg.exe 2980 reg.exe 2992 reg.exe 2856 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeCreateTokenPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeAssignPrimaryTokenPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeLockMemoryPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeIncreaseQuotaPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeMachineAccountPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeTcbPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeSecurityPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeTakeOwnershipPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeLoadDriverPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeSystemProfilePrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeSystemtimePrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeProfSingleProcessPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeIncBasePriorityPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeCreatePagefilePrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeCreatePermanentPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeBackupPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeRestorePrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeShutdownPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeDebugPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeAuditPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeSystemEnvironmentPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeChangeNotifyPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeRemoteShutdownPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeUndockPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeSyncAgentPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeEnableDelegationPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeManageVolumePrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeImpersonatePrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeCreateGlobalPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: 31 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: 32 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: 33 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: 34 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: 35 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe Token: SeDebugPrivilege 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2456 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe 30 PID 2344 wrote to memory of 2456 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe 30 PID 2344 wrote to memory of 2456 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe 30 PID 2344 wrote to memory of 2456 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe 30 PID 2344 wrote to memory of 368 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe 31 PID 2344 wrote to memory of 368 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe 31 PID 2344 wrote to memory of 368 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe 31 PID 2344 wrote to memory of 368 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe 31 PID 2344 wrote to memory of 2840 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe 33 PID 2344 wrote to memory of 2840 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe 33 PID 2344 wrote to memory of 2840 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe 33 PID 2344 wrote to memory of 2840 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe 33 PID 2344 wrote to memory of 2860 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe 34 PID 2344 wrote to memory of 2860 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe 34 PID 2344 wrote to memory of 2860 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe 34 PID 2344 wrote to memory of 2860 2344 JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe 34 PID 368 wrote to memory of 2980 368 cmd.exe 40 PID 368 wrote to memory of 2980 368 cmd.exe 40 PID 368 wrote to memory of 2980 368 cmd.exe 40 PID 368 wrote to memory of 2980 368 cmd.exe 40 PID 2860 wrote to memory of 2992 2860 cmd.exe 39 PID 2860 wrote to memory of 2992 2860 cmd.exe 39 PID 2860 wrote to memory of 2992 2860 cmd.exe 39 PID 2860 wrote to memory of 2992 2860 cmd.exe 39 PID 2456 wrote to memory of 3008 2456 cmd.exe 41 PID 2456 wrote to memory of 3008 2456 cmd.exe 41 PID 2456 wrote to memory of 3008 2456 cmd.exe 41 PID 2456 wrote to memory of 3008 2456 cmd.exe 41 PID 2840 wrote to memory of 2856 2840 cmd.exe 38 PID 2840 wrote to memory of 2856 2840 cmd.exe 38 PID 2840 wrote to memory of 2856 2840 cmd.exe 38 PID 2840 wrote to memory of 2856 2840 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3008
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe:*:Enabled:Windows Messanger" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cc6566540cf786721e35e57aa8280eb.exe:*:Enabled:Windows Messanger" /f3⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2980
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2856
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\:*:Enabled:Windows Messanger" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2992
-
-