Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe
-
Size
34KB
-
MD5
f3d1bb1b55971c3647bc279bd561161a
-
SHA1
ed0d7508c88bd25d14fea9fa218b5d765d89891f
-
SHA256
e3a4bd2bec9ab0ac245996a22783c32f921e9688b5f216d6996188d9103c0fd4
-
SHA512
b520dd6b892705fee49b4304c19b0d87e1434d614953f74cc4b92ca8fd27d4dedb7985b8362c8823b7f375f545358f6df15b04188fb58b560c18cf64c9ec61dd
-
SSDEEP
768:WdjrSskr3yKptT12XgeVtvEKJiGbKCp/5IHnELNl1j3DojRHcZW:CfSsc3yKp2XgeHEWiW//GHnMl5DojRx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2436 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2936 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winfcm32.dll f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\winfcm32.dll f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419444874" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED95E911-FC09-11EE-8EEA-EE2F313809B4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2536 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2536 iexplore.exe 2536 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2928 2936 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 28 PID 2936 wrote to memory of 2928 2936 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 28 PID 2936 wrote to memory of 2928 2936 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 28 PID 2936 wrote to memory of 2928 2936 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 28 PID 2928 wrote to memory of 2536 2928 cmd.exe 30 PID 2928 wrote to memory of 2536 2928 cmd.exe 30 PID 2928 wrote to memory of 2536 2928 cmd.exe 30 PID 2928 wrote to memory of 2536 2928 cmd.exe 30 PID 2536 wrote to memory of 2584 2536 iexplore.exe 31 PID 2536 wrote to memory of 2584 2536 iexplore.exe 31 PID 2536 wrote to memory of 2584 2536 iexplore.exe 31 PID 2536 wrote to memory of 2584 2536 iexplore.exe 31 PID 2936 wrote to memory of 2536 2936 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 30 PID 2936 wrote to memory of 2536 2936 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 30 PID 2936 wrote to memory of 2536 2936 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 30 PID 2936 wrote to memory of 2536 2936 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 30 PID 2936 wrote to memory of 2536 2936 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 30 PID 2936 wrote to memory of 2536 2936 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 30 PID 2936 wrote to memory of 2596 2936 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 32 PID 2936 wrote to memory of 2596 2936 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 32 PID 2936 wrote to memory of 2596 2936 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 32 PID 2936 wrote to memory of 2596 2936 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 32 PID 2936 wrote to memory of 2436 2936 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 34 PID 2936 wrote to memory of 2436 2936 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 34 PID 2936 wrote to memory of 2436 2936 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 34 PID 2936 wrote to memory of 2436 2936 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding2⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2584
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\gos17A6.bat"2⤵PID:2596
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.bat"2⤵
- Deletes itself
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ac1d26ff52635ac2a08f6ab864b33f07
SHA13da3715f84c5ccf263a66f1e0a4467d40f229632
SHA2562ef0f2c1126327ab644875cf42810d02e69c9bdea6503166b1ee3ba1595c96dc
SHA5122474536cee4b91b4bee35e821823578735cb3def3db0ef655a51a7d084932159422f1920d8060c1f38914506bec99c09baec85ba8949d4b7ce1718aee6d58118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53228a7a0d12b02a894fcadab5233c670
SHA167abad3102282730755a3bce118410a0db978d8a
SHA2567053573077c8b7f8717f4c501824746cc8b16e455628e514a1e59ec6d9cd45ae
SHA512b34779c2d372ecc90b30b3dae7d0fcc017d33c41e8a07e2d4d2d8ece4cc8e6381d437c8f3f707f425b2ba0e7f6f7ae9592cba5fcfda0e3ede2d88d556c12645a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2a4b7e3f4720155fa697dde80ddc9ed
SHA15e660c5b6623dc793f99a994b445d3cdd7572e43
SHA256fe5de10413d50394845585bf88c8aa473c9c1d0402a32a196ebe3bbcbc70fd51
SHA512598e4a5be5d7d8620388aa1605423f6c7e16c148ccd28134cd61e0c688686d0e9f35196ad384b22ccd66ca803d206b04aab4a5ef475a346c5888163e98ab9308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5229228dd43e11ef10893ca9a33b525af
SHA16293f663201df1182e3fa3225a26b1452f635b69
SHA25633376990bf1179cbe38df1a1364ab36f8e4eac30402402270d9b77db3eef68a7
SHA512fac2062f73b6ff0f2ef1a4747360a03e82ec63f2ca6b9686cbb2b5e2457fb9ea4450a71a2744115b1f41ea31009409ba2ca8257a0ac8deada86d6fbebad3e6b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd5f7bd0e00af4e5937de7480d59beb7
SHA1ddcb6786aae12a477490cd94049cb13e2db46ce0
SHA25699570e0e57d24a4fab7508272b9603a481dafef14dbbb61037fb1a4f461f64b3
SHA51299e178010eda53568391cf243edd6cd0701a4574e44d96e393a478c2059ec4bc1f795063dbceb5f33988269692546c652348fda43c77698ecb4b7d7b053056e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bc4b957bab4ec9300f5e5ab5aaeeaab
SHA1c2775046ce5042be5e4010a8c6e257002e57c2cf
SHA256f6b60c7a65efc6a19f77484df1a9af0b8cc84ea2a84ae363759394baf59e69bb
SHA512e4250487d9629f89bd4852a993b123a0de3c82289cdf96f944e6d0cc32687aaa0b998129bbdfcd30c995299797e7cd6df59fdec881d33d9db1288d950082820c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ce24cd5064fd983cc0fe119f0521374
SHA1c34767e85bd58ca07d7840699368128a1655abea
SHA256c0f7e7703142d1f01dcd62bd2fce678026c0873d6f410cec58140bd5156afb71
SHA51207211d60b73a45ecb47fd8e19f11c269259ebc79c495686248c4f0513069c859b851659d729d66a0c408e38c04d41e4e9b3bcaebcf8711f6a945ce1fae38838b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdc0d0c50a9d89d64e8dc22cd0f323c5
SHA121805f7d82f3533d981187cba1f482c0ab768ac7
SHA256795814ea706e525d7e42da01f8381f5c8925c1e41f3221361a74d81e1332a4bb
SHA51293726059f31f7231db18918abaadcfc6a35e0193392f53244263f495b66e060d6901ad53662b41c6b3c7108494115910d2a337069e84561d4c573cee66146df5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517583f87529b3425431a446d6fe53ecd
SHA18813283d070cee1ee0b235b5faafccc697d7d615
SHA25672b32f25abca61198507405f3d4cdc5dab75e974dbeb8241306341002e2be4e2
SHA51297a0513d1f943a50669a2285e302e167467f55274d3bcd5029d61094db2aa01600d4f8ffdd0ac0775c018c53d0965574c0a345c9044bc7b43858d7b658d4e703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573b505a90f41e7acb4f47f975199a660
SHA19ace34ca7b1b4bf45f219fd4738d6cec1ab311b9
SHA2562ea40a5f4404b3cc1ae30faf82f031d75ab0cc76db82d46c445f4f153ec59206
SHA5123fbd070f4e194be76d5b74b014327b2378c4f7da86ca0992514c00030af482e1fa6a753dceb98f54f831ca28becd0e046b6c7f67a9d4fe8cbc19dfc3b638d8bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4c5365a2c6791976409bf6271f4bb53
SHA13aaf68e8281e12f65710eafec00c6e7d52b6aa15
SHA25654ae4dbc0f113ee4e71497b58c3427349408ed470b2b962dc17d65953a511205
SHA5129a3c695cfde80a80b93034d58f7cbe2800364dedf75d077072148a59a15204f0c7d75ad9920a9f115aab190eb6763b1722018138683fb56324309fc6272dc728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5521152da584b93d0e1bc78c52aec2053
SHA1225338b250e70b63852f324500fa3ac898add4a3
SHA256adedce1485b370f46e31ae4f8fecfc52b0df74075a3bac52144c405d9e16cf86
SHA5127413bec6df2f3848065c06808d1a6a082943075a4688095e311002af20b04196f32e9f40324e15d54b1d210eee072d7c9d55956ee79628b34e6bbcc9cd8f7867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ff16a24371eac00fbf9cc9f731c115e3
SHA1760f498285145b2aadd3e88cf7d83ec63e269ce2
SHA2562b450fdfbb15299294b049f768932ac2921a384e3c6e24c95a8f5753c005f851
SHA51287a5537c72e1d62baa162dd7452e108499e7338ac24a83bd212740bd9ba909b65530f7da6b05ad3d3f403a5cb3227fddab3b44b4d215707d9fd659f5e0ff48bb
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
307B
MD50fd4d534966c67300e09973b1bb6d52d
SHA13ef46ed3d77d748931e7ba89dfa99d4f21a957ea
SHA25647627d7af0a1ee8cc137dbe1212fe1cc15258ac761c16530adc9e92b953631b7
SHA512493ead11627bf5a7e81ebc62436427e5fcfb2b1ab0efc7a5e7b34a26902093a99ad5d4ba017130614ff6f40b3755a7b739aa376b97242c7bed455840124b3f03
-
Filesize
190B
MD5f83931e630ef36d8987c346ff8f578bb
SHA11f02c22176fb2147809adc6a358ae8d7d5cfbba1
SHA256e35cd80e285fb18e97c85272ccac4458f7d1b8ca82dc164f99901516c669476d
SHA512132225d3125973c397ddead1bf75a60dfe75b8cd2fbed0201fa8800a4c62e923e835a61a553f64b4107bb9005b2765d72c80a03e231f9b74224968e0399ad505
-
Filesize
24KB
MD55ecce9af16e14becfeb560dd03644b75
SHA171226ccdc066672c643a255ab45b52f5661a1dd7
SHA2565b5ae28ae7623e3a1800f3488354b706d16981b8f772ccec4b92fa4edfe4e748
SHA512c6e8d93b6060b5d9e0ba1842e937c8ac61d5f5390cf87db464ca3602106d590789c1fa1170cafc67d4a1451dcee4808271a2006bc412af6d3fd6609c5d4b1fbe