Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
0d87b302bd4eb7364d246ade16a8a7a8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0d87b302bd4eb7364d246ade16a8a7a8_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0d87b302bd4eb7364d246ade16a8a7a8_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
0d87b302bd4eb7364d246ade16a8a7a8
-
SHA1
b695943a88287bd3c2f24370a77290e4e97c6af1
-
SHA256
125ee3eb75356bdcf26f42ee289bd77fe057f6b2996e45168df4b6132f14ae09
-
SHA512
b0c4aa8e9ce602cd5a27305c55a3a22a4898095e15b4f458713bce4a700e2c1ff0b35e7ebaee26b7cc72c37c177921b8ee8a77426e8076981dce94cb5234225a
-
SSDEEP
12288:/9aCmdJabv000000000y6nWbV67f+XJIF99VXQ4XNq6Q0td/EHI4sTi:/9q26q6Qu+o4sTi
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003cc6f97e4b0e0542902fce9237dad5ca00000000020000000000106600000001000020000000f39384bed119d1f9dc0e736b7b2e08145a8aa9a382522bf275b89760a7749ee5000000000e80000000020000200000009a38212c02b441f78ebb2200050bb7fe1f87e25133a7ad604a88fc8e6e20ae1720000000b7dda0ed0ad03722f8033a9d41c40b2e3ea3ee11ff03ab4ceb4e459c1c522db140000000f9020fdbf0c374b63389a60b32108160a8a2866bb82378d53dc33af35235881d0b24ebe2d941d6044a0b62499d31ae3fa64985a752691a689829ca61f8bc46d0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425469255" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{887160D1-32D4-11EF-8442-DE62917EBCA6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10972b5de1c6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2524 0d87b302bd4eb7364d246ade16a8a7a8_JaffaCakes118.exe 2524 0d87b302bd4eb7364d246ade16a8a7a8_JaffaCakes118.exe 2316 iexplore.exe 2316 iexplore.exe 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2316 2524 0d87b302bd4eb7364d246ade16a8a7a8_JaffaCakes118.exe 28 PID 2524 wrote to memory of 2316 2524 0d87b302bd4eb7364d246ade16a8a7a8_JaffaCakes118.exe 28 PID 2524 wrote to memory of 2316 2524 0d87b302bd4eb7364d246ade16a8a7a8_JaffaCakes118.exe 28 PID 2524 wrote to memory of 2316 2524 0d87b302bd4eb7364d246ade16a8a7a8_JaffaCakes118.exe 28 PID 2316 wrote to memory of 2448 2316 iexplore.exe 30 PID 2316 wrote to memory of 2448 2316 iexplore.exe 30 PID 2316 wrote to memory of 2448 2316 iexplore.exe 30 PID 2316 wrote to memory of 2448 2316 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d87b302bd4eb7364d246ade16a8a7a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0d87b302bd4eb7364d246ade16a8a7a8_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.chynsoncomputer.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2448
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524c56cf9b7c594b24d2648299f2f7d21
SHA1d527efd3ce8f6db82869ec0d9b6c69213a487333
SHA2561f3a2b2623a5b4fff76d0c29c5a861265eef006221d7817851dc3705f83600e9
SHA51216987c5642d2ed86246f3f9b79335cb70775e4af206a86392666c9246328e0c56f8a12a3e71e905aa0c8e7e53566e8c6d601bbfd228ee7dfc98508ad574f4ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5891138968a100bd5d8ee4c0895f9fc4e
SHA141ccc40762f7390933ef695cadc0ebaa90e1cc5b
SHA25696c6a4e75c1677fbb2100685a70e3c1d54bb95ebbb1352d5d54ab80ce5bcba05
SHA5126347aa1f9695093a33e9368b1c0c02ab670ced8ca93f9e294e01ea94005e52ea6961fd66cc6acda089dd66a935a72f179412c520a943aecfe3666e240beed4a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9479198bce60cdb4a09bdec4d2d91aa
SHA1a696f26f15da4702e4cc8561dfd2961c115c9bc2
SHA2564e57199dbe6763ccf89a7e446055d5fe755027e40c5e907fa7e10fee31105447
SHA512ecc2ce1c245fdb98d5708dd97baae889f04e4de339e6c27f66621333157b8e63b5e2618fb0cca2ca1668ad34fa2e4d050488c46bfac1ba077f1f136a8309b365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55af229998e37a566daecf9f06e25feff
SHA1abfde76b333ecf2d4af4ab4b5ea654b5ebf9cf36
SHA256479937a0874612c3fb211c200792d864749af2fa7b2823cdb5656cae2399737d
SHA51298916c9a424e40f4e5eb3c52a5319690e400a4efca4c657a45c183ad1f1b179e0178fb514b901a55c54af1775b0213dcb2dfea17939b0ab1cc09683539852806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e300f65f4f2a5c642d0e48664140fb54
SHA1d9e0c81023dc0de30ae8187ca411bc5e6dcde505
SHA256fb53adc19b8bea1e47794300c4eaf3b2431844eb1cdf4830bf7d4fce58b01434
SHA51204a5bbcbc05b9cd07d7604945ceff81a7620a2f43d483daf227cef918da2f7a8cbe5de0f12275ba15cbf7166e8098e099c34b59f699ff091774a8bf9499b8682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570a4b5bb834a653e6ec8f08adaa4043d
SHA158bf2f2728ea9aa6d04bc2ecfd2246c7d778aa55
SHA2563900f46c115b18f29bc88ac60c8458ed12ffec47bb7b9d2c01753ee6328065bd
SHA51261653dc1ed9ac39ce6efc3bb27ba87c85793fe4affcbe23074c0e0f5ca9f1f8fbcafebd6db7abb2d87f82634ae4a14f5244bac3de6beebfb96018e7170aceb1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb32a7bdcb544b27dd8718a63f76bddf
SHA119eea915e7134f633b13a7fdb228247c98041514
SHA256f828416888cb6f464a850ae39a0a75636a9573dba57863a211ccc2d50c378b7c
SHA5126476a36c997231d5fb28598a007ab7ca178d5be14ead8b6b0db72e4a8e1444089604863974121e54be13f0446f3a76327ee8fa14e278eb70b1a641fe3cee9987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cff234a1d0f7a2e11dc79f6bd1535ae
SHA13ea4667a70f57ac80e782fff786b7f9954b7f139
SHA25644248fd8a0fa6765586f738aa8d77a84766caf164b8a66244c4c805059f3092a
SHA5120284807ecb3523ec7c2c6767ff6d072a0d6a0151ace30163f96c6a5ed230ae304df2fea011ed692bcb4fa131c92ba080dde94cac655564492013b0b4694cbf3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecf0fb45890ac27ea2dd5996506bc109
SHA17e66bd589d332e94d45fcfd2740019fdfdd57727
SHA2560329d749c66177b84649b7f243a115e69e260c527dfef3a43f3fe099f9475d56
SHA5122dfd105d7406751019b5f74b1e4da5b535db615f5414148d6e5ca97ff91e8782f9e9c5265235fda0a4c6e40f1e3bb4185846608d650effae8e8306882bc73ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cb399b70f7232b0e878410c1480ddba
SHA12b0c367d46e6e57ef01e739451b8f595bc7cfc1c
SHA2560a7f3758c190781e225122d16ccf5b21194d99b165e76ea36f205c069abfd72f
SHA512eca7cdae56dec95045e574df1b1d1e3b3fa1dc7538537033ffb4ea37ad56e99fae050a54b0b6549fd391ec199ef7db6a5bc55ff714097501da25b99a517283df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536efb62c9813f5209b112abce0474996
SHA19cb09cafb3d5f65d3b8def9d4360361dbb611f92
SHA256fd1c7eade436de05f76c18b1d54f6fda81750777af4254241939498a186e5256
SHA51237ea568fc052704bd0362c1a0ed6ede66d26a9dd51e4ba3a4c6676557979d66a16a2054e35dc209c8c2c931e8cb413fe77e83e6dcafe185c05e18c6238723ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da00f01d1241bef5c3791bca162997ff
SHA142a93b21f1b9aacb0ab2e10934a2ec2ab502c798
SHA25620afe1b941f903722732edd6a7a793e136ba4964d0d1998101969bfd078ad049
SHA512ce99353a567cd558235749120a2694687855a73dd769f6be7806e2b475e69a9ed9fffced6a0889bc3a011aeb66ff0438a32944812472532ceb4c0e194ab32f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8ffecfe96b48fb1d9258d691c20a73b
SHA1c2be5cd10c1f16ea48faea10d872cffa7cc55abf
SHA25631406fad4acbb03a42dbd6c3b861d4ff4b26898fb581e48402238efbeb6f7898
SHA512b1de3785dea8d4d272f369e23081528cef010660435eeb0fbd4b06efb528ca0a756601f18cadd764ad6c4d504e29241e7ec74d257810c439a4f1a87839e8c355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b51bf0483c5a1134dc1d65e82402119
SHA1056ba6e52597f33d543095dff59e1eb4a66af30f
SHA2562212852ba3db12b7e3d89d2f97e62427fbfb4b7eb2017ae47b6aa028fe4ed341
SHA5125edf910b89c90efa6c072b45e8bfdb39a4009afc7f21d17a402e67e713cb5138eb62804163fb5fcf9527ade76a162ce936752cec2e67698c59bae08146772fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e08d11b35a3996f7df54011cdf272f7
SHA12a7e3164283be090f26357613fc26ebc03975441
SHA2569eb8bc6dce6e9bf11d674239bb8a5f2772525beb24a1cd4a51363853c0e134d9
SHA5122e8519a1d12037cc3b45a659fe66f94cf57df0543199a52506528af3708a6bc468e174a2310fa4c80b11ffacbcc70fc06c33b15535ee982e1b9a474ef4606708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548a10fd67242f8df1ed47e0f7a4ec1a9
SHA1d5387534401610f97a3d3420e07f090c0025ca5c
SHA2563cf690a63a0e8324691706d3a403768c97d46fe8cdb4b5f9c4db1bf121cd64d1
SHA512cada2b1aa1b4598065d2b9640a004d827abf97c0e5037677d11e9b055807991441459351582b73c73c511c93cf69b98e99d9e664d21f029bc3750a957ea3fc90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567dba506e5aaaadf8796eafaf72b304c
SHA17b665f9ba0682385210a97832a73aef6fd185b39
SHA256ab4b856322286050917a49a0c36e0ce602e4d483ec89203dc87621d539e9ff1a
SHA5129ef09f78525ca511c193353875c4c9657e73817e848665e5494181ed104e37993fa7d975b61d6afe1165466c30f35e51550808af6b354e646ac5abc14a62c52b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c493f8916bff87481fc7def6004ce65
SHA1b991273c3c89041c9fcecb995e18fd33dcc90036
SHA25670440bc8aed266cb7208eb4a21b47679ea7b9a9356749c8512a4d7bb8bf289be
SHA5120b363f567d407ecbc48076f7fec44696140a92a33fa1b3cc787ddf0fb7d5e9e42c7261450a0aabe5c5d00031a35488ea185a048031941cfea9fd25dbf852990e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b