Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/03/2025, 04:51
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_691932d106765cdba903f2e969cceded.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_691932d106765cdba903f2e969cceded.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_691932d106765cdba903f2e969cceded.exe
-
Size
3.0MB
-
MD5
691932d106765cdba903f2e969cceded
-
SHA1
e1dc4c2f1e1a607848edd91bdffec6310b1cc04e
-
SHA256
fe3200a9ca508700fea527abb691ac9cc10aae87f810c5198eee5c457e2aa173
-
SHA512
b126e9597823a72416bd441f4e43b4d2a90a5ff8ef2ee531816b301c95274f42dd8c301b06ac7477904e5252cdf4efb1fd5da4c9500918235d8cd8e4fc1468f2
-
SSDEEP
12288:upi9zQt4ouZz1Ht55yJJGoZJIqrVh7/8IA:N9Et5uZ1HC4q5hzhA
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 14 IoCs
resource yara_rule behavioral1/memory/2600-26-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2600-22-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2600-38-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2600-39-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2600-40-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2600-42-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2600-44-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2600-45-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2600-47-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2600-49-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2600-50-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2600-53-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2600-54-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2600-56-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Favo.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Favo.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_691932d106765cdba903f2e969cceded.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_691932d106765cdba903f2e969cceded.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run JaffaCakes118_691932d106765cdba903f2e969cceded.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\WinDevice = "C:\\Users\\Admin\\AppData\\Roaming\\Favo.exe" JaffaCakes118_691932d106765cdba903f2e969cceded.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinDevice = "C:\\Users\\Admin\\AppData\\Roaming\\Favo.exe" JaffaCakes118_691932d106765cdba903f2e969cceded.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinDevice = "C:\\Users\\Admin\\AppData\\Roaming\\Favo.exe" JaffaCakes118_691932d106765cdba903f2e969cceded.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 JaffaCakes118_691932d106765cdba903f2e969cceded.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2448 set thread context of 2740 2448 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 30 PID 2740 set thread context of 2600 2740 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_691932d106765cdba903f2e969cceded.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_691932d106765cdba903f2e969cceded.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_691932d106765cdba903f2e969cceded.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 3016 reg.exe 2392 reg.exe 2864 reg.exe 2764 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeCreateTokenPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeAssignPrimaryTokenPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeLockMemoryPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeIncreaseQuotaPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeMachineAccountPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeTcbPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeSecurityPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeTakeOwnershipPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeLoadDriverPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeSystemProfilePrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeSystemtimePrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeProfSingleProcessPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeIncBasePriorityPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeCreatePagefilePrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeCreatePermanentPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeBackupPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeRestorePrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeShutdownPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeDebugPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeAuditPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeSystemEnvironmentPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeChangeNotifyPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeRemoteShutdownPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeUndockPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeSyncAgentPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeEnableDelegationPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeManageVolumePrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeImpersonatePrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeCreateGlobalPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: 31 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: 32 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: 33 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: 34 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: 35 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe Token: SeDebugPrivilege 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2448 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 2740 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2740 2448 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 30 PID 2448 wrote to memory of 2740 2448 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 30 PID 2448 wrote to memory of 2740 2448 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 30 PID 2448 wrote to memory of 2740 2448 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 30 PID 2448 wrote to memory of 2740 2448 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 30 PID 2448 wrote to memory of 2740 2448 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 30 PID 2448 wrote to memory of 2740 2448 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 30 PID 2448 wrote to memory of 2740 2448 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 30 PID 2448 wrote to memory of 2740 2448 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 30 PID 2740 wrote to memory of 2600 2740 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 31 PID 2740 wrote to memory of 2600 2740 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 31 PID 2740 wrote to memory of 2600 2740 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 31 PID 2740 wrote to memory of 2600 2740 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 31 PID 2740 wrote to memory of 2600 2740 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 31 PID 2740 wrote to memory of 2600 2740 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 31 PID 2740 wrote to memory of 2600 2740 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 31 PID 2740 wrote to memory of 2600 2740 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 31 PID 2600 wrote to memory of 2756 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 32 PID 2600 wrote to memory of 2756 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 32 PID 2600 wrote to memory of 2756 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 32 PID 2600 wrote to memory of 2756 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 32 PID 2600 wrote to memory of 2704 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 33 PID 2600 wrote to memory of 2704 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 33 PID 2600 wrote to memory of 2704 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 33 PID 2600 wrote to memory of 2704 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 33 PID 2600 wrote to memory of 2648 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 34 PID 2600 wrote to memory of 2648 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 34 PID 2600 wrote to memory of 2648 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 34 PID 2600 wrote to memory of 2648 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 34 PID 2600 wrote to memory of 2880 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 35 PID 2600 wrote to memory of 2880 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 35 PID 2600 wrote to memory of 2880 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 35 PID 2600 wrote to memory of 2880 2600 JaffaCakes118_691932d106765cdba903f2e969cceded.exe 35 PID 2648 wrote to memory of 2392 2648 cmd.exe 41 PID 2648 wrote to memory of 2392 2648 cmd.exe 41 PID 2648 wrote to memory of 2392 2648 cmd.exe 41 PID 2648 wrote to memory of 2392 2648 cmd.exe 41 PID 2704 wrote to memory of 2864 2704 cmd.exe 40 PID 2704 wrote to memory of 2864 2704 cmd.exe 40 PID 2704 wrote to memory of 2864 2704 cmd.exe 40 PID 2704 wrote to memory of 2864 2704 cmd.exe 40 PID 2880 wrote to memory of 2764 2880 cmd.exe 42 PID 2880 wrote to memory of 2764 2880 cmd.exe 42 PID 2880 wrote to memory of 2764 2880 cmd.exe 42 PID 2880 wrote to memory of 2764 2880 cmd.exe 42 PID 2756 wrote to memory of 3016 2756 cmd.exe 43 PID 2756 wrote to memory of 3016 2756 cmd.exe 43 PID 2756 wrote to memory of 3016 2756 cmd.exe 43 PID 2756 wrote to memory of 3016 2756 cmd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_691932d106765cdba903f2e969cceded.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_691932d106765cdba903f2e969cceded.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_691932d106765cdba903f2e969cceded.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_691932d106765cdba903f2e969cceded.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_691932d106765cdba903f2e969cceded.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_691932d106765cdba903f2e969cceded.exe"3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_691932d106765cdba903f2e969cceded.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_691932d106765cdba903f2e969cceded.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_691932d106765cdba903f2e969cceded.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_691932d106765cdba903f2e969cceded.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2864
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2392
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Favo.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Favo.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Favo.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Favo.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2764
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1