Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 12:45
Behavioral task
behavioral1
Sample
983299702cf8040a62599a3941b8770f_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
983299702cf8040a62599a3941b8770f_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
983299702cf8040a62599a3941b8770f_JaffaCakes118.exe
-
Size
3.0MB
-
MD5
983299702cf8040a62599a3941b8770f
-
SHA1
85a3d17b7599e7647d16db33972f356c84fc7ac1
-
SHA256
1021a9bce2425cafad43435b174f0fab6f915e170cc08eb6abdb05af7c2d3c07
-
SHA512
81f5f33c4f2e5d466473c0060f2efc6bcc102bd638de1d6300a2524c645d6fd80309acdea44866e5c6757fdd9795c7bfa3ae8bf65a7a8e66c5829c888561de02
-
SSDEEP
98304:PaQ8XW1S2kZ1a+0dGCs7k3/cRLvOGZN209frmPdc8/Y:CQ8XiycdC7k3/8LOGZldmPdf/
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1148-0-0x0000000000400000-0x0000000000DF4000-memory.dmp upx behavioral1/memory/1148-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1148-49-0x0000000000400000-0x0000000000DF4000-memory.dmp upx behavioral1/memory/1148-56-0x0000000000400000-0x0000000000DF4000-memory.dmp upx behavioral1/memory/1148-58-0x0000000000400000-0x0000000000DF4000-memory.dmp upx behavioral1/memory/1148-63-0x0000000000400000-0x0000000000DF4000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\dxxt_set.ini 983299702cf8040a62599a3941b8770f_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0120E01-2339-11EF-B411-768C8F534424} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main 983299702cf8040a62599a3941b8770f_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1084 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1148 983299702cf8040a62599a3941b8770f_JaffaCakes118.exe 1148 983299702cf8040a62599a3941b8770f_JaffaCakes118.exe 1148 983299702cf8040a62599a3941b8770f_JaffaCakes118.exe 1148 983299702cf8040a62599a3941b8770f_JaffaCakes118.exe 1148 983299702cf8040a62599a3941b8770f_JaffaCakes118.exe 1148 983299702cf8040a62599a3941b8770f_JaffaCakes118.exe 1084 IEXPLORE.EXE 1084 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1148 wrote to memory of 1084 1148 983299702cf8040a62599a3941b8770f_JaffaCakes118.exe 32 PID 1148 wrote to memory of 1084 1148 983299702cf8040a62599a3941b8770f_JaffaCakes118.exe 32 PID 1148 wrote to memory of 1084 1148 983299702cf8040a62599a3941b8770f_JaffaCakes118.exe 32 PID 1148 wrote to memory of 1084 1148 983299702cf8040a62599a3941b8770f_JaffaCakes118.exe 32 PID 1084 wrote to memory of 2860 1084 IEXPLORE.EXE 33 PID 1084 wrote to memory of 2860 1084 IEXPLORE.EXE 33 PID 1084 wrote to memory of 2860 1084 IEXPLORE.EXE 33 PID 1084 wrote to memory of 2860 1084 IEXPLORE.EXE 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\983299702cf8040a62599a3941b8770f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\983299702cf8040a62599a3941b8770f_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.dxzt.net2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1084 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e951c611c9e79cc371402d836a52cab5
SHA1c6625ab39d999a1a9d0cf9ef33cc464f98729521
SHA2561b94da0e35e473f2444666716f44ff9f353ccaeeccc42fd2396f9d640f68b103
SHA5128ffafa41baeb755d1dc9fa8fe2c67e476e2e685f8d27abe2dc008621590dca7bff3e2eff5026478f9337c77c238e59c96ae6c5c6211145c2432db4047e8d32da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5295e3f295e6a677389a570461e73b29d
SHA1c4b138cf041bb03b9ca991e9d12add72b9fec791
SHA2568b85e3657e44fcc7aed7361fe353726cea96c3e5f99ec2e82628bbaf21c0d252
SHA51202eb4d23730e2dce51222b4b7331888664774d4468651af4d0689f7c1113b07935858bed3f1a1081e4f964f5770c29fb132ecaa20bfbbd4cecad722ae9faa3d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59160905dff1968d07cdc63fd110a70b6
SHA13bebda1e5e5f5c01c26bbe17d926eb88210365e6
SHA25691268a3be378221ac384de54c57f19d046be46523730f44806d43bc9ffcb3550
SHA51204731e4af09ee58fb03da38f9f28486c6e57c965be4f9298413a8fd4d422360fbd593c3ad430742df0226448e32e245c7739d49ab994d8d82cb14964cc1b903a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5332eed8fcf16e93cd6fb0f1ea66273af
SHA14223e8b6a583b36455c5e89c3d1d69ac0707dd94
SHA256af1abfcf450e0471f2a1742eed12268e869beabbc1d07da1315af1e4cd419cfb
SHA512d1cfab7bc629c11cda3265419f148e29f7e2097ecbbeaa924f2e87eeb80971a36d8ea9e417d28d29962ea51fb28a65599d7ac667cd8f0ea322f0b5e677bede88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c13aae8cc0fe314a6bdd8d84207a3158
SHA11f579feacb592975402c0ec618e1d93b14f99cf7
SHA2568b8a33e05a12b3d806211253858a495d53591b216771c5080f0c5bf3ca11582e
SHA51264195a24485e811471d0b384ff06274eafa100cb5b9aae300be8d4bb82382b3e65b6930a5152d92551f7e45c6b0643df67ab4c97dbbaaac84eabc3fa3e8141a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594eac250a9a30060b6774b283c04fae7
SHA104b54a10727616cee2bd853c6f53ac1504df96fb
SHA25665007f53c359ec97febb3478ec9ae0a20b4e28323dc68fdc3a376c191b81b92c
SHA51239f928e1f4ddaf6d9ef6c2819b5904729f051d5795d770fe6bd213bde1a4aadbf87a65a4fdc514f6ac515f319e7b018cb09d2ddd30042cbbe92578e67079a539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7acd8461928236a54288d8424fa3363
SHA1135542c7046e7b9b310c43b53565059e318f83fb
SHA2565e9220f97e31b1701eec1a2a1bf652f4d54dde39c8193c349f94da69af2067c6
SHA512d05a4a05975d4a6954e5673fd4d27dc1a7b760000785c27ad2de996bea14035cfa3f2f50552d3f37b9c7c75f525ac61df6f188ccce6ddb90deb6e2ed8bfb0a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d99ff8cc09bd43e943a79fb1b3164f4
SHA1521c4c74519aa6b93228ec6fc6f06d4435149b3b
SHA256854850fc60a37b0dcaf2e9254e7d310472adcad559eb638bdc23cde24ef17cf7
SHA5124a9e8660f73a54050a2abe404838407d5f827e961d2aba36f7916f80be7845e8604757770b2c63134651af4a1cf491806afc4de8d310b9150b9704fbf4744d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548becce86339615ccc62a746349063ef
SHA14caef287a4e642631f4c22419384d20986cd5419
SHA2561a2c46ca9d13a93239c60b26e512c67db124113beb708b32d42aa616fe19b1f1
SHA51256813e56f45c0dd4b8004a234aaa7603fcaa794412067703b3e8d8a026b4ec527d6e0d7faa4aa86cc78989f0af188bb0e61123671fc1ab7918903e48068f5fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad6a5de825cab9e68ca55a3fcbf47af6
SHA1fcd5a09f851b2510ad6762bd722eeb29c70cfd96
SHA256597f60e3d008f245d143d2d4d56a6f5347423b0cf3ddc2f900ff7abf831bfe20
SHA512693f65b43cd86bf7b0724b1e2c0d013bd315d05694712e9d54c991fbd8a8fcef522121f55386d8da0abcac2d08c21ea0d6e0f39375ad6b2d5dd4488fe5c01a23
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b