Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
20/03/2025, 09:58
Behavioral task
behavioral1
Sample
JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe
-
Size
283KB
-
MD5
825b181b68fb2049bc80548574e2e83c
-
SHA1
a54df320ca805e17c0669baa43d9d6b9993f6d20
-
SHA256
9f834da1d7cfc652d75721348fc4755e0529514a7ba1c8770e6817579d72586c
-
SHA512
4646f3382308a6da5d1ce90ce40e98b672a86bf82efffd554db01fc8be435f721249f6f009ee0e34b19057dbfdb7f0d8ca0e155e6d8618787a8cc4a052a36fc2
-
SSDEEP
6144:5cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37C:5cW7KEZlPzCy37C
Malware Config
Extracted
darkcomet
ser
10.0.2.15:1789
DC_MUTEX-DD61YBU
-
gencode
GSS0tzrp3y6E
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe -
Windows security bypass 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe -
Disables Task Manager via registry modification
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2520 attrib.exe 2288 attrib.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe -
resource yara_rule behavioral1/memory/2844-0-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2844-23-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2844-26-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2844-28-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2844-31-0x0000000000400000-0x00000000004C7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeSecurityPrivilege 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeTakeOwnershipPrivilege 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeLoadDriverPrivilege 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeSystemProfilePrivilege 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeSystemtimePrivilege 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeProfSingleProcessPrivilege 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeIncBasePriorityPrivilege 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeCreatePagefilePrivilege 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeBackupPrivilege 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeRestorePrivilege 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeShutdownPrivilege 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeDebugPrivilege 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeSystemEnvironmentPrivilege 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeChangeNotifyPrivilege 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeRemoteShutdownPrivilege 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeUndockPrivilege 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeManageVolumePrivilege 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeImpersonatePrivilege 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeCreateGlobalPrivilege 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: 33 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: 34 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: 35 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2844 wrote to memory of 3056 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 30 PID 2844 wrote to memory of 3056 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 30 PID 2844 wrote to memory of 3056 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 30 PID 2844 wrote to memory of 3056 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 30 PID 2844 wrote to memory of 2884 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 31 PID 2844 wrote to memory of 2884 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 31 PID 2844 wrote to memory of 2884 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 31 PID 2844 wrote to memory of 2884 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 31 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2844 wrote to memory of 1700 2844 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 33 PID 2884 wrote to memory of 2288 2884 cmd.exe 35 PID 2884 wrote to memory of 2288 2884 cmd.exe 35 PID 2884 wrote to memory of 2288 2884 cmd.exe 35 PID 2884 wrote to memory of 2288 2884 cmd.exe 35 PID 3056 wrote to memory of 2520 3056 cmd.exe 36 PID 3056 wrote to memory of 2520 3056 cmd.exe 36 PID 3056 wrote to memory of 2520 3056 cmd.exe 36 PID 3056 wrote to memory of 2520 3056 cmd.exe 36 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2288 attrib.exe 2520 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe"1⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Disables RegEdit via registry modification
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2844 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe" +s +h2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe" +s +h3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2520
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2288
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- System Location Discovery: System Language Discovery
PID:1700
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5