Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23/02/2025, 09:20

General

  • Target

    JaffaCakes118_1fecd5cefb1c9e32c95630de6bcf6062.exe

  • Size

    2.0MB

  • MD5

    1fecd5cefb1c9e32c95630de6bcf6062

  • SHA1

    3f97539d619e37ea9d89d9b244b3ac0d49fbcb3d

  • SHA256

    c1fa077bab9a6b4a58604b7df78ad0fe4bb0da50a3f66030ecf2dea653afb378

  • SHA512

    54d5fa86d5c7982d1a487102ed95117ca0e11231acaa50c1e745cc145fc60d924b4183b8bbd3ddcc7f39ac0d70f5714ce1b2f892de78c7593effeb73defc1578

  • SSDEEP

    24576:J/a9lggRR2gelzICN12oqzTEExIC/ffwVIARlggRR2g:YiF6s0k

Malware Config

Signatures

  • Blackshades

    Blackshades is a remote access trojan with various capabilities.

  • Blackshades family
  • Blackshades payload 11 IoCs
  • Modifies firewall policy service 3 TTPs 8 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1fecd5cefb1c9e32c95630de6bcf6062.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1fecd5cefb1c9e32c95630de6bcf6062.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Users\Admin\AppData\Local\Temp\zlocesti binder.exe
      "C:\Users\Admin\AppData\Local\Temp\zlocesti binder.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2084
    • C:\Users\Admin\AppData\Local\Temp\9S9NCU6QMG.exe
      "C:\Users\Admin\AppData\Local\Temp\9S9NCU6QMG.exe"
      2⤵
      • Adds policy Run key to start application
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3044
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:3012
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\9S9NCU6QMG.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\9S9NCU6QMG.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2796
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\9S9NCU6QMG.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\9S9NCU6QMG.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2820
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2672
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\csrss.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\csrss.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2868
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\csrss.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\csrss.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9S9NCU6QMG.exe

    Filesize

    113KB

    MD5

    a42dd828338848884cd844494ff524b9

    SHA1

    d26fd4f38f405b4406ba9a611a62186fd49cd869

    SHA256

    d7acbbee6d9ccfa5087d7c117bc0374e84a14fa8749a624ac263b82329a6cfbc

    SHA512

    73ef533951ae23ce27e351bbe144071b3cd9b6783f212f9ed452cf4e5cc125a4f084496b67715ce3c58c0e95575c2987794a25365e780345429bc3a34182723a

  • C:\Users\Admin\AppData\Local\Temp\zlocesti binder.exe

    Filesize

    1.4MB

    MD5

    83b20212bbfeea77d09f33c95cf5faf2

    SHA1

    b9161fe0983811d3c26489d60439478de2f0da16

    SHA256

    324133db1f5a2bac79950703f4d69159b09e04d9b8dc9c88a21c6709ce3f38d1

    SHA512

    3be073e715d71e389fac817797ad806e06536f7cbc76bd8f16d85c83c7deeb40e5568ea875dfdca9b34226202318cbfa8f2d4a22675db0bf89f042692a7d2f2d

  • memory/2004-0-0x000007FEF629E000-0x000007FEF629F000-memory.dmp

    Filesize

    4KB

  • memory/2004-3-0x000007FEF5FE0000-0x000007FEF697D000-memory.dmp

    Filesize

    9.6MB

  • memory/2004-14-0x000007FEF5FE0000-0x000007FEF697D000-memory.dmp

    Filesize

    9.6MB

  • memory/2004-17-0x000007FEF5FE0000-0x000007FEF697D000-memory.dmp

    Filesize

    9.6MB

  • memory/2084-26-0x0000000074EB0000-0x000000007545B000-memory.dmp

    Filesize

    5.7MB

  • memory/2084-20-0x0000000074EB1000-0x0000000074EB2000-memory.dmp

    Filesize

    4KB

  • memory/2084-23-0x0000000074EB0000-0x000000007545B000-memory.dmp

    Filesize

    5.7MB

  • memory/2084-24-0x0000000074EB0000-0x000000007545B000-memory.dmp

    Filesize

    5.7MB

  • memory/2268-25-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2268-16-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2268-27-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2268-28-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2268-29-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2268-31-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2268-32-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2268-34-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2268-36-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2268-40-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2268-43-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2268-44-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB