Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    22/02/2025, 20:37

General

  • Target

    JaffaCakes118_1c1fb67eb0f53187c684aac2d715bfdb.exe

  • Size

    748KB

  • MD5

    1c1fb67eb0f53187c684aac2d715bfdb

  • SHA1

    bf9bafa426e2289121b5e49e0ab601a2af3af4e6

  • SHA256

    63c0e5ddf4de6ff77478c8e14bba3b2416dff0051d628b1002b653d692070a2a

  • SHA512

    f750258b7600e3feca34fb521df4f9e4acaf6c4152c33d7af19e080ed128fbd5d36aab9b62f86869f0ecaeb1f2e33a23aff9a900eee4cc408db389bccb4795f2

  • SSDEEP

    12288:4RR9++Rc8sGuS+KvtNBXJWZWX5BZ6vlpCAN4KFTbcdFKoIFXuyOEvRU:4RRIrUuS+KvtNBXYZWTZ6dYKJmKoIJif

Malware Config

Signatures

  • Blackshades

    Blackshades is a remote access trojan with various capabilities.

  • Blackshades family
  • Blackshades payload 15 IoCs
  • Modifies firewall policy service 3 TTPs 8 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c1fb67eb0f53187c684aac2d715bfdb.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c1fb67eb0f53187c684aac2d715bfdb.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c1fb67eb0f53187c684aac2d715bfdb.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c1fb67eb0f53187c684aac2d715bfdb.exe"
      2⤵
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3000
      • C:\Users\Admin\AppData\Local\Temp\506e1qQl7n.exe
        "C:\Users\Admin\AppData\Local\Temp\506e1qQl7n.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2868
        • C:\Users\Admin\AppData\Local\Temp\506e1qQl7n.exe
          "C:\Users\Admin\AppData\Local\Temp\506e1qQl7n.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Writes to the Master Boot Record (MBR)
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2592
          • C:\Users\Admin\AppData\Local\Temp\506e1qQl7n.exe
            "C:\Users\Admin\AppData\Local\Temp\506e1qQl7n.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2384
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2288
              • C:\Windows\SysWOW64\reg.exe
                REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                7⤵
                • Modifies firewall policy service
                • System Location Discovery: System Language Discovery
                • Modifies registry key
                PID:2424
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\506e1qQl7n.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\506e1qQl7n.exe:*:Enabled:Windows Messanger" /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2460
              • C:\Windows\SysWOW64\reg.exe
                REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\506e1qQl7n.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\506e1qQl7n.exe:*:Enabled:Windows Messanger" /f
                7⤵
                • Modifies firewall policy service
                • System Location Discovery: System Language Discovery
                • Modifies registry key
                PID:2464
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2408
              • C:\Windows\SysWOW64\reg.exe
                REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                7⤵
                • Modifies firewall policy service
                • System Location Discovery: System Language Discovery
                • Modifies registry key
                PID:1960
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\local.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\local.exe:*:Enabled:Windows Messanger" /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1920
              • C:\Windows\SysWOW64\reg.exe
                REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\local.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\local.exe:*:Enabled:Windows Messanger" /f
                7⤵
                • Modifies firewall policy service
                • System Location Discovery: System Language Discovery
                • Modifies registry key
                PID:2056
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\kelly.jpg

    Filesize

    47KB

    MD5

    c81128fb0c060d4ef7e7134edc997e06

    SHA1

    8ad0ee8baadf198bd9d71e49448a9920e35a7d83

    SHA256

    77705c29cc0b8b099b7ca4fd099154f95cc5cd2ea1cf29375246d82222cad220

    SHA512

    92c32b1c95064d0270838ccb210659c12d2039bdb64a1dddad89743a5a23c45ff7bb8d04a40bc84b7377e08e24771e14743bc61da3095d9d3ca2e25e5f2ff6e5

  • \Users\Admin\AppData\Local\Temp\506e1qQl7n.exe

    Filesize

    560KB

    MD5

    78d82731e14f213cbc633ce43c475afd

    SHA1

    1c3c8b1b275a6e9907b5dbdce617976df6f9f688

    SHA256

    b3756e992300f487c5625f06e3ce03da0ac9b6c1f50732ad64a3a2ccaca65944

    SHA512

    1c0c21caab2519b73f0d6faa97d62d2c6c78a93a63110c25b644d758dbcbbbba27100bf02ba2c289babe9d0de3f235466a304e3d12d40e511f06308f6522c0c2

  • memory/2384-82-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2384-55-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2384-101-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2384-99-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2384-96-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2384-87-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2384-80-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2384-94-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2384-92-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2384-78-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2384-75-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2384-60-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2384-57-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2384-84-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2384-53-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2384-73-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2384-89-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2592-38-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2592-49-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2592-42-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2592-72-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2592-47-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2592-40-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2800-68-0x0000000000510000-0x0000000000511000-memory.dmp

    Filesize

    4KB

  • memory/2800-21-0x0000000000510000-0x0000000000511000-memory.dmp

    Filesize

    4KB

  • memory/2800-19-0x0000000000260000-0x0000000000262000-memory.dmp

    Filesize

    8KB

  • memory/3000-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/3000-2-0x0000000000400000-0x00000000004A4000-memory.dmp

    Filesize

    656KB

  • memory/3000-6-0x0000000000400000-0x00000000004A4000-memory.dmp

    Filesize

    656KB

  • memory/3000-34-0x0000000000400000-0x00000000004A4000-memory.dmp

    Filesize

    656KB

  • memory/3000-4-0x0000000000400000-0x00000000004A4000-memory.dmp

    Filesize

    656KB

  • memory/3000-18-0x0000000002670000-0x0000000002672000-memory.dmp

    Filesize

    8KB

  • memory/3000-12-0x0000000000400000-0x00000000004A4000-memory.dmp

    Filesize

    656KB

  • memory/3000-14-0x0000000000400000-0x00000000004A4000-memory.dmp

    Filesize

    656KB