Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
21/03/2025, 12:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8351bf08900b42321b4af3ffb1ef98a0.exe
Resource
win7-20250207-en
General
-
Target
JaffaCakes118_8351bf08900b42321b4af3ffb1ef98a0.exe
-
Size
691KB
-
MD5
8351bf08900b42321b4af3ffb1ef98a0
-
SHA1
acb02fd072bd8859d75ffbaef1730dae59d79d30
-
SHA256
026c7c0e6ab52292fc5f4f75c78737943ecc58df497b19d2de8756b468ca1b66
-
SHA512
2daf95f1e9bb05f25a7e99610219c3514069e7ba71133a5f5fac6ad567f1ef68476601b4f9e486ad83fc6ca3669eebd326a6a0b04c9a4efacffb7f4236b263f4
-
SSDEEP
12288:VzyInpIJAYJPwTcwySyiCXeUs8IwJJ3Scvfsi0ZSRq/LT+3:VzyInpqD5TiV9C0i0ZXLO
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
DC_MUTEX-F54S21D
-
gencode
DbeN40ElF3Qt
-
install
false
-
offline_keylogger
false
-
persistence
false
Signatures
-
Darkcomet family
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile sid.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" sid.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" sid.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" explorer.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" sid.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" explorer.exe -
Windows security bypass 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" explorer.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" sid.exe -
Disables Task Manager via registry modification
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate sid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 2232 sid.exe -
Loads dropped DLL 2 IoCs
pid Process 2872 JaffaCakes118_8351bf08900b42321b4af3ffb1ef98a0.exe 2872 JaffaCakes118_8351bf08900b42321b4af3ffb1ef98a0.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sid.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2232 set thread context of 1708 2232 sid.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8351bf08900b42321b4af3ffb1ef98a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 sid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString sid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier sid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier sid.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier explorer.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier sid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier explorer.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2232 sid.exe Token: SeSecurityPrivilege 2232 sid.exe Token: SeTakeOwnershipPrivilege 2232 sid.exe Token: SeLoadDriverPrivilege 2232 sid.exe Token: SeSystemProfilePrivilege 2232 sid.exe Token: SeSystemtimePrivilege 2232 sid.exe Token: SeProfSingleProcessPrivilege 2232 sid.exe Token: SeIncBasePriorityPrivilege 2232 sid.exe Token: SeCreatePagefilePrivilege 2232 sid.exe Token: SeBackupPrivilege 2232 sid.exe Token: SeRestorePrivilege 2232 sid.exe Token: SeShutdownPrivilege 2232 sid.exe Token: SeDebugPrivilege 2232 sid.exe Token: SeSystemEnvironmentPrivilege 2232 sid.exe Token: SeChangeNotifyPrivilege 2232 sid.exe Token: SeRemoteShutdownPrivilege 2232 sid.exe Token: SeUndockPrivilege 2232 sid.exe Token: SeManageVolumePrivilege 2232 sid.exe Token: SeImpersonatePrivilege 2232 sid.exe Token: SeCreateGlobalPrivilege 2232 sid.exe Token: 33 2232 sid.exe Token: 34 2232 sid.exe Token: 35 2232 sid.exe Token: SeIncreaseQuotaPrivilege 1708 explorer.exe Token: SeSecurityPrivilege 1708 explorer.exe Token: SeTakeOwnershipPrivilege 1708 explorer.exe Token: SeLoadDriverPrivilege 1708 explorer.exe Token: SeSystemProfilePrivilege 1708 explorer.exe Token: SeSystemtimePrivilege 1708 explorer.exe Token: SeProfSingleProcessPrivilege 1708 explorer.exe Token: SeIncBasePriorityPrivilege 1708 explorer.exe Token: SeCreatePagefilePrivilege 1708 explorer.exe Token: SeBackupPrivilege 1708 explorer.exe Token: SeRestorePrivilege 1708 explorer.exe Token: SeShutdownPrivilege 1708 explorer.exe Token: SeDebugPrivilege 1708 explorer.exe Token: SeSystemEnvironmentPrivilege 1708 explorer.exe Token: SeChangeNotifyPrivilege 1708 explorer.exe Token: SeRemoteShutdownPrivilege 1708 explorer.exe Token: SeUndockPrivilege 1708 explorer.exe Token: SeManageVolumePrivilege 1708 explorer.exe Token: SeImpersonatePrivilege 1708 explorer.exe Token: SeCreateGlobalPrivilege 1708 explorer.exe Token: 33 1708 explorer.exe Token: 34 1708 explorer.exe Token: 35 1708 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2504 DllHost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2504 DllHost.exe 2504 DllHost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2232 2872 JaffaCakes118_8351bf08900b42321b4af3ffb1ef98a0.exe 29 PID 2872 wrote to memory of 2232 2872 JaffaCakes118_8351bf08900b42321b4af3ffb1ef98a0.exe 29 PID 2872 wrote to memory of 2232 2872 JaffaCakes118_8351bf08900b42321b4af3ffb1ef98a0.exe 29 PID 2872 wrote to memory of 2232 2872 JaffaCakes118_8351bf08900b42321b4af3ffb1ef98a0.exe 29 PID 2232 wrote to memory of 1708 2232 sid.exe 30 PID 2232 wrote to memory of 1708 2232 sid.exe 30 PID 2232 wrote to memory of 1708 2232 sid.exe 30 PID 2232 wrote to memory of 1708 2232 sid.exe 30 PID 2232 wrote to memory of 1708 2232 sid.exe 30 PID 2232 wrote to memory of 1708 2232 sid.exe 30 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion sid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern sid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" sid.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8351bf08900b42321b4af3ffb1ef98a0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8351bf08900b42321b4af3ffb1ef98a0.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\sid.exe"C:\Users\Admin\AppData\Local\Temp\sid.exe"2⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Disables RegEdit via registry modification
- Checks BIOS information in registry
- Executes dropped EXE
- Windows security modification
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2232 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Disables RegEdit via registry modification
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
658KB
MD58dc642f2f3d912331638ccf2d45f8dcd
SHA15c157a1988c8147caaa53ddb326e8897cb982336
SHA256c0700781739cc4089521a9fcefc76789a664824938201e8b9635c39e9335f366
SHA512aade2c455c279f3f9f44784877fb10763f89973cd7389c0800252bb57f39158f1c85c4458d091d4de5d24803a92afc1537ebf5b3da6ae97acbd709b1cb7c8c06