Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
e97515000bd9d83b314e8ec3555c4deb_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e97515000bd9d83b314e8ec3555c4deb_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
e97515000bd9d83b314e8ec3555c4deb_JaffaCakes118.exe
-
Size
153KB
-
MD5
e97515000bd9d83b314e8ec3555c4deb
-
SHA1
aeb16416e9469fee118e6c2d944d41111e9b32d5
-
SHA256
2d482813a8e3c4016b3087e941c750923e82a17bbe0e6b19ccd88bac9782bafb
-
SHA512
fbc8204d3ad240ccaeb7d3d32f3a76e34cf4298ff87e861fc18806d4ac38d845900de199abda76e8c72ff80c6bfbab7ed58295d042fd9aafe1c7fe8c837db8ee
-
SSDEEP
3072:e2KQvnIIeWj6cUJtXqbI2aFpb0j6gdHIllu0u+Jwmyn2C6hx+gZ/eVdYp:3nIITjnUJN2aFpwZHIllxJwmlC6hx/Zh
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000000220891ccdbcc0408c18f15b9f16b53fd1214906984fa2dbc8ed75743b02302b000000000e80000000020000200000007f8df534a5a190698dcbc21f706d2c739d13fdeaa6015f0a88a14db80a0200f820000000b82545ae9290416094b4775d59b9cc5e64be62dfde8eb75819f84ddf54c9faac400000009328ce58a37c76341599f195ad58200a6eb9d9e5e9e2e8facd21013b05a1c6bed1021b5284a46e6c0c8c16a84d83e21216b09a26c4dda9c7804fc5cac6bfaabb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55E73411-F642-11EE-9CE2-EAAAC4CFEF2E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418809394" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0de8b2a4f8ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2892 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2892 iexplore.exe 2892 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2892 1932 e97515000bd9d83b314e8ec3555c4deb_JaffaCakes118.exe 28 PID 1932 wrote to memory of 2892 1932 e97515000bd9d83b314e8ec3555c4deb_JaffaCakes118.exe 28 PID 1932 wrote to memory of 2892 1932 e97515000bd9d83b314e8ec3555c4deb_JaffaCakes118.exe 28 PID 1932 wrote to memory of 2892 1932 e97515000bd9d83b314e8ec3555c4deb_JaffaCakes118.exe 28 PID 2892 wrote to memory of 2632 2892 iexplore.exe 29 PID 2892 wrote to memory of 2632 2892 iexplore.exe 29 PID 2892 wrote to memory of 2632 2892 iexplore.exe 29 PID 2892 wrote to memory of 2632 2892 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e97515000bd9d83b314e8ec3555c4deb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e97515000bd9d83b314e8ec3555c4deb_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www2.pgr.mpf.gov.br/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3459748af25df06a34a375ad5e3e501
SHA14b9722ab7b38b79fae1aea8274345869d57f097b
SHA256eb31f51c1c289e8e65358f87a484e1436aba0173529c2a5cb5ea5f11eabf5a1b
SHA5124bb5c1abef8a0bbd862ec43dcd50a6e8d470190b86132931d3af76cda3f69b5fb1fb694ebf86bed4118a031d516b07a397fdeee2780eccf64b667b99f4ef2655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a3128b14fc4ed5dad5d1b016fe826d8
SHA111814a27f51c67d913c2f5a5a28f164531e210cf
SHA25627f03e30748245d9b99cadd2cf553556a90cce22f2161e33f3c23a45a49c2fe1
SHA5121beeacd7bb66c1481dedf28f7b6196b010d4cfb0929165bfbd3537a917a7bb59d2c0d600cefbdb9ed2ef4eda5a5bd2e1a919a3268252a3d2bde7b0f539e6a847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eecf4019bfe2897a32669b7909fbe8f7
SHA11f4655f55b58fb76b6b743e5bcdd5ccbb5a7d16e
SHA2566dd1c1df2395139f489cb62e8844a9ee8d4b962292080955d46fc8c585a14483
SHA51215e7c6f610938ef00d320f32a7079e4d25ade5b73caf0049ff25918e5ce05cddf27cf04f80f29f0d1ac20ffe5fdf05a82ac571320f747c2056a884071757385f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4fa728cf86da58e877814469995b498
SHA15c4122b01f6845325517c4c85c603736cfb5f672
SHA25651945f8ffbe71284e286e536cf7daa18372711bd1e361af1954d4db2c674623c
SHA51299c4ecef65f6256d0b21ad49ae7b7e309977be376882bbbe6c70efe934cd6f8a52de34b74461d3931d2940c24ff0073ed4004062de0a2738b4e3811b8c6a8d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539fa34f5b04929a01228b02183f0a826
SHA1080981e81af44b1c74fee93db2719299e454f9f8
SHA2567319a1bca6c85fc5420e319d52b57f46cdfc7d168dd9764306637706d8d9793d
SHA51274435cd228d5f87bda80db3bd188afadbbe831757fd65d6eb02b7a4ec0deb21bbb6547d8cc8f877eaa1ba0e613c6ee99f18c891a334c97894b034db5f90daa89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56540c2b2b053260ab1901bd5692485d8
SHA170eedce2e06805b547ea9d7c943919f0fdcd04ad
SHA2566bf87df016f5d8a46bda8f7b4112d12621082904fdea81f74279040279b8ab36
SHA512b62dcd34c70a107cff657ccdf380fb3de5fcd1ba628a73585e08554f9e1889a57a86fa5e7a93000f97f3ff004bbf55af5a6146988b1b8e48d696699a76dd1238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a69885ed29d206cde6a3ef60d45c9c1
SHA1b416f45005ee07647142fd8cc61c28ab2dde4b7b
SHA2569c9b575b94d6b64c90f3585098ba0603a2a06e9a9386d288cc3e776d017cc56d
SHA512bd2208601006606b3523c235514da55cdafdfac8315fbcc81a09155814289758790b21867ee4634fdc434d5eb679b2a3d9d0ad87a27fad94540da6bd43b97e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5438707bc03a5f718b7ed4c05b2cab84f
SHA169d8d16ec1aa3cfc1d364d3f1ca91b86d741b43b
SHA256945dbe8b69b706e45db1c6e06f707612b871a9a6cfc19259194af3c58c5d39fb
SHA5120a0a3729960837a6b17ade40c7c79077509c779c21c8618f1be76188f3267159e3a5203c92bcf2c0a9edf20d143737d050208f90c7aa309c1038dd59bcf9be48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5120d542030411ae5a60dc34f5a9b19fc
SHA1f199d59314946b6af1446fe5e1386999def1dd27
SHA2563e66ae7929290a2c2d4cd9008db2afc0a8df12ee2221492a95f88d8840c6a976
SHA51258799113ca1312d9a418e32e1ef245887514eba2cda9e3a424e6eef5ed4dd57d691629e1e5101974c11da529b1eab811ca5f8e8cf7fd50c3cbd8158c455cecd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5901a63cb7b94bf2acdb854b20d6dbd76
SHA1302bda2630e74c0aad3d89b3351a8f0d34e494e6
SHA2567bcd95365bb1a0895d1c242ddca459530b03b8fc2787f567e10d838bc7c587d9
SHA512189bdb88b76f739edff79dcadb7186a6680c69740ee2f5d4d0f72a02c4f70dfc57996a1e33aa4ebebd1dd80998cfce8beb650cdccf96fc98049ae2682e390073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5622b74363bf0366ac269fed7b669a8c8
SHA1a6a78c381d9f38f76ef4d585d89e3c7e83cbfb80
SHA25637ed71a2297378822c4eea511a81d54f11ed893026c106a4d10e827487a99e6f
SHA5125827269e9c5d4f7faec2ba0e59fb8ff435f84d4ab5c55abb1e5bde8933dec94688065227ffd612e96fdd5efdb8e0e3b4e60c1e8774370e054b79ef52d9d28de3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cb183c9778025de8ffc53b1b5c04306
SHA18c44bf9b9ddfd658e1fce61d8a748e06e28ba24b
SHA2565ab03794ea0d91c34411fa379d7dea5a6de3e82382fc53357b523c3f6ce7f08f
SHA5120848ad455b9151fd9835bfb5528b44a442770ddd168cb490aedc56ccc493c6871d8eff00a6a51277fa3bd3ecbeafcab44ee134a73d62f78fa80cd70559da2cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4b876101f9820d492e2b89cdf4342bb
SHA15e52a446fabf0ceefe99d20d893ac3487ab9dc13
SHA256866ab134475833be0365c5216bd97e50edf1f4df471cf356c1d320f0ee3568b1
SHA512e30daff692aacdf8c963d21d8e92be57f22d9a11dc7a0626072ff2015abfbd3e07b249fb13c45fee4fdc93472038ca6478a0975cb07c93aae5bfa87235d14f59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5effedb372b93cf9c260eb926818c450d
SHA1e4f93942f9a66a5e934c7fee6f11a9de664b4f3d
SHA256e7d5493f0ec040cbe33d0d700f8e0d43e703df9b1aaadacf81b218f84693bb6d
SHA512de4fee9c03975081345238743d2e82254f310f369f051aab97f442f8f7c8ff9e2470020f5c978b9403bf304a89dc8c55e3af455e387792e0f7379fb901db8d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e5c2ea46a16b60e2ef2906d27517af4
SHA17e77446b2857c2a3440412df514d6c7f5b9e658c
SHA25675b8198f600132b7d9cc850f4d7fe5eeb0aad552e74a410990e0bd226a8f11b6
SHA51231ee5513cfd5f37be26ce2362291cb9c439cff848b58fb14de5e125194989baccf4355d9d54efa9dbddaf88ba23cd5bea1f0cc392c7a9ed3f53d72fc2b6e8159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5137dfab8a7dad50140d1ab06ffd1ca28
SHA1ff399c995a4ec1d23ee4e7a20d0c670ae022c10e
SHA256ef4e02f9956d07d7aab0daa9968f228a1e1972ba2a0ab75bd465e8d38d2bcbfd
SHA512b9136ad6967da659b024f16202e59bfca0be87a46c1cda664953fe22f35af7d74f9591ad70d73c91687b1cf34f69047662f7949cce9f1ef3e33996f56d1b6873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b07b8b84e2da56c10fba5d1055e2a0c8
SHA1f47421e9a7289b41a0f801eb1f13cfe9b1727bda
SHA25666cc8bc6d9dd2a5bf0378cacac3a931f1853d17c0556609f0397154ee4be26de
SHA51204b524b09525f82b111f4212ede7fdac10040f7a694c84d5d224e6f6c7b59c89a472f1c2304d4d79e29eb435463f54471fd315b142f0b88261d422c73e180d0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7be87925a575b24af1438380780a47d
SHA1d8841f85fa69aa9df50767702857da564825c9c4
SHA2568e58cd81f629742c01763490fc6a6667275859cfc8e869c5608a1ad6894089b3
SHA51275408e4cc1fab0d526809808a017faa91bac0939c53fb4ac21ca2096409f44c599d5ce8e6f270cdfaaeb02b48bf521e7ead8c0d9555002d5129f8389cb09d901
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a