Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/02/2025, 20:48

General

  • Target

    JaffaCakes118_22d63921487325e68fbc7bc66dee0b3e.exe

  • Size

    1.0MB

  • MD5

    22d63921487325e68fbc7bc66dee0b3e

  • SHA1

    9993b7407a9f580162517260aae18ed38d23ba32

  • SHA256

    e36e36593c9d0335592f93298208298f5bcce86bad692bcc7b11ceed9c4a0ff4

  • SHA512

    05d9ebb3f29442bf290c6c08abf0f28944b7c7539acf82cbaeecc17ae7071525541d82f7b9a754fd9584ac95fdbc355973891f007efb75fcc1d9de1ccf0f68b7

  • SSDEEP

    6144:E3l2pzovt4ZtIWn9pqtLRNl/ppIVUqdLeyluODMo4cc0:WQtpOLRZ6Vf53Mktc

Malware Config

Signatures

  • Blackshades

    Blackshades is a remote access trojan with various capabilities.

  • Blackshades family
  • Blackshades payload 6 IoCs
  • Modifies firewall policy service 3 TTPs 8 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_22d63921487325e68fbc7bc66dee0b3e.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_22d63921487325e68fbc7bc66dee0b3e.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\259451409.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Java Oy" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\java\javaconsole.exe" /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:2628
    • C:\Users\Admin\AppData\Roaming\java\javaconsole.exe
      "C:\Users\Admin\AppData\Roaming\java\javaconsole.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Users\Admin\AppData\Roaming\java\javaconsole.exe
        "C:\Users\Admin\AppData\Roaming\java\javaconsole.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2644
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2748
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:1716
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\java\javaconsole.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\java\javaconsole.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2516
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\java\javaconsole.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\java\javaconsole.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:1216
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2512
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:300
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Nvidia.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Nvidia.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2532
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Nvidia.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Nvidia.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:1936
      • C:\Users\Admin\AppData\Roaming\java\javaconsole.exe
        "C:\Users\Admin\AppData\Roaming\java\javaconsole.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\259451409.bat

    Filesize

    143B

    MD5

    1deef04b0d0abe2d75154cc508a85e9c

    SHA1

    067668cc9de86f0a73290c1783662c5530349f7e

    SHA256

    2dccd725bc2d38c740fd28b627d0fb1fe3efa798ce445e80fa44c3ce0607620e

    SHA512

    c3466c7c6a10255a20c7e2d4e95dd6c607bed1279a3609495cde25fae210d16ef9f8f404ace7b475a0e4ae14adef3a440c551f79cbf1ccd3c56445415ec8a3c3

  • \Users\Admin\AppData\Roaming\java\javaconsole.exe

    Filesize

    1.0MB

    MD5

    1d958c0ffc01bf257990ddc2f7f2a9fc

    SHA1

    f4b1984adaae3cdbf32c0117502079b8250831f8

    SHA256

    a7538a08f53b8322cff4aa26a04021ab4160baff3b960ce3e274cb4ccb481375

    SHA512

    5e44e9468becd88e9e37d0a97f81e46ba2fe999dcca331129e09b24bc80b10b633cbb4ca0207556020d90589bd8d1666bf2374035791fe778489bcbca1059798

  • memory/2644-59-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2644-36-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2644-40-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2644-42-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2644-68-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2644-66-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2644-63-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2644-61-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2784-43-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2784-60-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2784-49-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2784-50-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2784-54-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2784-52-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB