Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/02/2025, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1fecd5cefb1c9e32c95630de6bcf6062.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1fecd5cefb1c9e32c95630de6bcf6062.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_1fecd5cefb1c9e32c95630de6bcf6062.exe
-
Size
2.0MB
-
MD5
1fecd5cefb1c9e32c95630de6bcf6062
-
SHA1
3f97539d619e37ea9d89d9b244b3ac0d49fbcb3d
-
SHA256
c1fa077bab9a6b4a58604b7df78ad0fe4bb0da50a3f66030ecf2dea653afb378
-
SHA512
54d5fa86d5c7982d1a487102ed95117ca0e11231acaa50c1e745cc145fc60d924b4183b8bbd3ddcc7f39ac0d70f5714ce1b2f892de78c7593effeb73defc1578
-
SSDEEP
24576:J/a9lggRR2gelzICN12oqzTEExIC/ffwVIARlggRR2g:YiF6s0k
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 11 IoCs
resource yara_rule behavioral1/memory/2268-25-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2268-27-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2268-28-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2268-29-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2268-31-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2268-32-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2268-34-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2268-36-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2268-40-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2268-43-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2268-44-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\9S9NCU6QMG.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9S9NCU6QMG.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\csrss.exe = "C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 9S9NCU6QMG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\csrsss = "C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe" 9S9NCU6QMG.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CC7BEFBA-EECC-694C-D1DB-A7EED9EBDC15} 9S9NCU6QMG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CC7BEFBA-EECC-694C-D1DB-A7EED9EBDC15}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe" 9S9NCU6QMG.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{CC7BEFBA-EECC-694C-D1DB-A7EED9EBDC15} 9S9NCU6QMG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Active Setup\Installed Components\{CC7BEFBA-EECC-694C-D1DB-A7EED9EBDC15}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe" 9S9NCU6QMG.exe -
Executes dropped EXE 2 IoCs
pid Process 2084 zlocesti binder.exe 2268 9S9NCU6QMG.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\csrsss = "C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe" 9S9NCU6QMG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrsss = "C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe" 9S9NCU6QMG.exe -
resource yara_rule behavioral1/files/0x0007000000019273-15.dat upx behavioral1/memory/2268-16-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2268-25-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2268-27-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2268-28-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2268-29-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2268-31-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2268-32-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2268-34-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2268-36-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2268-40-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2268-43-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2268-44-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zlocesti binder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9S9NCU6QMG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 3012 reg.exe 2928 reg.exe 2820 reg.exe 2672 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 2268 9S9NCU6QMG.exe Token: SeCreateTokenPrivilege 2268 9S9NCU6QMG.exe Token: SeAssignPrimaryTokenPrivilege 2268 9S9NCU6QMG.exe Token: SeLockMemoryPrivilege 2268 9S9NCU6QMG.exe Token: SeIncreaseQuotaPrivilege 2268 9S9NCU6QMG.exe Token: SeMachineAccountPrivilege 2268 9S9NCU6QMG.exe Token: SeTcbPrivilege 2268 9S9NCU6QMG.exe Token: SeSecurityPrivilege 2268 9S9NCU6QMG.exe Token: SeTakeOwnershipPrivilege 2268 9S9NCU6QMG.exe Token: SeLoadDriverPrivilege 2268 9S9NCU6QMG.exe Token: SeSystemProfilePrivilege 2268 9S9NCU6QMG.exe Token: SeSystemtimePrivilege 2268 9S9NCU6QMG.exe Token: SeProfSingleProcessPrivilege 2268 9S9NCU6QMG.exe Token: SeIncBasePriorityPrivilege 2268 9S9NCU6QMG.exe Token: SeCreatePagefilePrivilege 2268 9S9NCU6QMG.exe Token: SeCreatePermanentPrivilege 2268 9S9NCU6QMG.exe Token: SeBackupPrivilege 2268 9S9NCU6QMG.exe Token: SeRestorePrivilege 2268 9S9NCU6QMG.exe Token: SeShutdownPrivilege 2268 9S9NCU6QMG.exe Token: SeDebugPrivilege 2268 9S9NCU6QMG.exe Token: SeAuditPrivilege 2268 9S9NCU6QMG.exe Token: SeSystemEnvironmentPrivilege 2268 9S9NCU6QMG.exe Token: SeChangeNotifyPrivilege 2268 9S9NCU6QMG.exe Token: SeRemoteShutdownPrivilege 2268 9S9NCU6QMG.exe Token: SeUndockPrivilege 2268 9S9NCU6QMG.exe Token: SeSyncAgentPrivilege 2268 9S9NCU6QMG.exe Token: SeEnableDelegationPrivilege 2268 9S9NCU6QMG.exe Token: SeManageVolumePrivilege 2268 9S9NCU6QMG.exe Token: SeImpersonatePrivilege 2268 9S9NCU6QMG.exe Token: SeCreateGlobalPrivilege 2268 9S9NCU6QMG.exe Token: 31 2268 9S9NCU6QMG.exe Token: 32 2268 9S9NCU6QMG.exe Token: 33 2268 9S9NCU6QMG.exe Token: 34 2268 9S9NCU6QMG.exe Token: 35 2268 9S9NCU6QMG.exe Token: SeDebugPrivilege 2268 9S9NCU6QMG.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2268 9S9NCU6QMG.exe 2268 9S9NCU6QMG.exe 2268 9S9NCU6QMG.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2084 2004 JaffaCakes118_1fecd5cefb1c9e32c95630de6bcf6062.exe 30 PID 2004 wrote to memory of 2084 2004 JaffaCakes118_1fecd5cefb1c9e32c95630de6bcf6062.exe 30 PID 2004 wrote to memory of 2084 2004 JaffaCakes118_1fecd5cefb1c9e32c95630de6bcf6062.exe 30 PID 2004 wrote to memory of 2084 2004 JaffaCakes118_1fecd5cefb1c9e32c95630de6bcf6062.exe 30 PID 2004 wrote to memory of 2268 2004 JaffaCakes118_1fecd5cefb1c9e32c95630de6bcf6062.exe 31 PID 2004 wrote to memory of 2268 2004 JaffaCakes118_1fecd5cefb1c9e32c95630de6bcf6062.exe 31 PID 2004 wrote to memory of 2268 2004 JaffaCakes118_1fecd5cefb1c9e32c95630de6bcf6062.exe 31 PID 2004 wrote to memory of 2268 2004 JaffaCakes118_1fecd5cefb1c9e32c95630de6bcf6062.exe 31 PID 2268 wrote to memory of 3044 2268 9S9NCU6QMG.exe 32 PID 2268 wrote to memory of 3044 2268 9S9NCU6QMG.exe 32 PID 2268 wrote to memory of 3044 2268 9S9NCU6QMG.exe 32 PID 2268 wrote to memory of 3044 2268 9S9NCU6QMG.exe 32 PID 2268 wrote to memory of 2796 2268 9S9NCU6QMG.exe 33 PID 2268 wrote to memory of 2796 2268 9S9NCU6QMG.exe 33 PID 2268 wrote to memory of 2796 2268 9S9NCU6QMG.exe 33 PID 2268 wrote to memory of 2796 2268 9S9NCU6QMG.exe 33 PID 2268 wrote to memory of 2752 2268 9S9NCU6QMG.exe 35 PID 2268 wrote to memory of 2752 2268 9S9NCU6QMG.exe 35 PID 2268 wrote to memory of 2752 2268 9S9NCU6QMG.exe 35 PID 2268 wrote to memory of 2752 2268 9S9NCU6QMG.exe 35 PID 2268 wrote to memory of 2868 2268 9S9NCU6QMG.exe 36 PID 2268 wrote to memory of 2868 2268 9S9NCU6QMG.exe 36 PID 2268 wrote to memory of 2868 2268 9S9NCU6QMG.exe 36 PID 2268 wrote to memory of 2868 2268 9S9NCU6QMG.exe 36 PID 2752 wrote to memory of 2672 2752 cmd.exe 40 PID 2752 wrote to memory of 2672 2752 cmd.exe 40 PID 2752 wrote to memory of 2672 2752 cmd.exe 40 PID 2752 wrote to memory of 2672 2752 cmd.exe 40 PID 2796 wrote to memory of 2820 2796 cmd.exe 41 PID 2796 wrote to memory of 2820 2796 cmd.exe 41 PID 2796 wrote to memory of 2820 2796 cmd.exe 41 PID 2796 wrote to memory of 2820 2796 cmd.exe 41 PID 2868 wrote to memory of 2928 2868 cmd.exe 42 PID 2868 wrote to memory of 2928 2868 cmd.exe 42 PID 2868 wrote to memory of 2928 2868 cmd.exe 42 PID 2868 wrote to memory of 2928 2868 cmd.exe 42 PID 3044 wrote to memory of 3012 3044 cmd.exe 43 PID 3044 wrote to memory of 3012 3044 cmd.exe 43 PID 3044 wrote to memory of 3012 3044 cmd.exe 43 PID 3044 wrote to memory of 3012 3044 cmd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1fecd5cefb1c9e32c95630de6bcf6062.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1fecd5cefb1c9e32c95630de6bcf6062.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\zlocesti binder.exe"C:\Users\Admin\AppData\Local\Temp\zlocesti binder.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2084
-
-
C:\Users\Admin\AppData\Local\Temp\9S9NCU6QMG.exe"C:\Users\Admin\AppData\Local\Temp\9S9NCU6QMG.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3012
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\9S9NCU6QMG.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\9S9NCU6QMG.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\9S9NCU6QMG.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\9S9NCU6QMG.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2820
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2672
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\csrss.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\csrss.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\csrss.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\csrss.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2928
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
113KB
MD5a42dd828338848884cd844494ff524b9
SHA1d26fd4f38f405b4406ba9a611a62186fd49cd869
SHA256d7acbbee6d9ccfa5087d7c117bc0374e84a14fa8749a624ac263b82329a6cfbc
SHA51273ef533951ae23ce27e351bbe144071b3cd9b6783f212f9ed452cf4e5cc125a4f084496b67715ce3c58c0e95575c2987794a25365e780345429bc3a34182723a
-
Filesize
1.4MB
MD583b20212bbfeea77d09f33c95cf5faf2
SHA1b9161fe0983811d3c26489d60439478de2f0da16
SHA256324133db1f5a2bac79950703f4d69159b09e04d9b8dc9c88a21c6709ce3f38d1
SHA5123be073e715d71e389fac817797ad806e06536f7cbc76bd8f16d85c83c7deeb40e5568ea875dfdca9b34226202318cbfa8f2d4a22675db0bf89f042692a7d2f2d