Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 20:24 UTC
Static task
static1
Behavioral task
behavioral1
Sample
0f681a6ee844afe2e3b8cd8628dcea2a_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0f681a6ee844afe2e3b8cd8628dcea2a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0f681a6ee844afe2e3b8cd8628dcea2a_JaffaCakes118.exe
-
Size
560KB
-
MD5
0f681a6ee844afe2e3b8cd8628dcea2a
-
SHA1
58dfcea8c4fd1f471d7e2c99c81f33cdc65471bb
-
SHA256
b977c8ab2ea817c3edff62ecb0d1f59c78515e0367d546ceb5330cb786472a48
-
SHA512
5afec0a8348252e00f2022b8b206907171237b20e4003e55710a424430ae5482e3039c5bea22d77437a88045d0bf880fe3a0d36ec4792cfb7782bb84ffeabeb0
-
SSDEEP
12288:VP6ys+NgzZhkDjhmrWvX9JdsIQyY4dR/2ao9jlhSCyPBo:JBNUfkEy/9J1XdR/2asjL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425508940" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b035f8c23dc7da01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000a9188f625a7bf794221bb84050cd0af537aabc56536badc393d18f16c0894218000000000e80000000020000200000008c13ce48bcc60ddac0689b62f215cbf4b799c271a3261a0e7e96c7c68a1c91592000000010cb70a6018cbb875f7971bef6c99ca2d67f7810c87993a0e00f0ecfe4c2bcfa40000000b5a317eef82120a748951348266fca9b999cf802c6dc94d2ed0f100c22b2ded1b686626d6013e18fab40b463ba286096dfeb263ac0ea732f2aa83863bc4a716b IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE7013C1-3330-11EF-A381-7EE57A38E3C7} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2564 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1900 0f681a6ee844afe2e3b8cd8628dcea2a_JaffaCakes118.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2564 1900 0f681a6ee844afe2e3b8cd8628dcea2a_JaffaCakes118.exe 28 PID 1900 wrote to memory of 2564 1900 0f681a6ee844afe2e3b8cd8628dcea2a_JaffaCakes118.exe 28 PID 1900 wrote to memory of 2564 1900 0f681a6ee844afe2e3b8cd8628dcea2a_JaffaCakes118.exe 28 PID 1900 wrote to memory of 2564 1900 0f681a6ee844afe2e3b8cd8628dcea2a_JaffaCakes118.exe 28 PID 2564 wrote to memory of 2688 2564 IEXPLORE.EXE 29 PID 2564 wrote to memory of 2688 2564 IEXPLORE.EXE 29 PID 2564 wrote to memory of 2688 2564 IEXPLORE.EXE 29 PID 2564 wrote to memory of 2688 2564 IEXPLORE.EXE 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f681a6ee844afe2e3b8cd8628dcea2a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0f681a6ee844afe2e3b8cd8628dcea2a_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://down9.tian-kong.com2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2564 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
Network
-
Remote address:8.8.8.8:53Requestdown9.tian-kong.comIN AResponse
-
747 B 7.7kB 9 12
-
799 B 7.8kB 10 13
-
779 B 7.7kB 9 12
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51264107159153a5f97881531d13e8752
SHA1e1d054ce4681be0680f1f85734174dc130ec082a
SHA256aea6b3f61283776e95168e2e893e4849758ea375ca91ec7afaa6576e284c8c24
SHA5128a89e2d500675d7317cabc6581083f43667859dd4a89b3f1343fc9933dc1e774c90199a5f1c457324ea51d6e68be40c93836717ca35f1c4d312b111aed0764ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50afea15e36990b5ce2d094c71cea7217
SHA1ab6f11bc11c77df2b704a50513e36d1dc7967b4d
SHA256a7a4e9d1980dde59d77776af1c1a3071aafaeb30e605547d192adedc335177e7
SHA512e412ae3e5f53d3b369d1432cb1439a2232bb38793e351646a37c823c13513ff919a4a3e35f50a96121a39fe12e702abd34cbc9820cac5d2629edaa72d8d8bae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f174d3603509b75cc25cc8c91217cac3
SHA1d6c09617172f70319f0cd0d93b4f88669f8be34a
SHA256888fe2df915c62a2724de4a0150471ad9cc35e4ea3c603181f6fcd547ce02012
SHA512062806211f5cb7fd774877c668b046fbef6ff0bb1128149367c247ef2f9a02bccb15613fab76ad6c19620d0d24e7a0010887f38bbe216dd4805fa739a9d25e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3e7a839b559537b4d3bd6e1a6d6a4ac
SHA19e7b8a592afa52c6a128cb2e70180a677fc32fa9
SHA256f816a7e84bb729852d39eb28d31b68cc5174054f6a8fc33fd023f79e006f3a11
SHA5129d5cc9b28aeb03854b3451ac6f1fa7825d1e782a513bf372b0fcc156df59ac3e7cd5eec253243989122af319caf63166e47919b475b92950c4a93cd2918b5817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b978893c92e721c8e0d888f064e1c8eb
SHA1b69d9de54dbebb1c51016a71268b1d0b0c1c32ec
SHA2565dc11185b5a1c76e41ee1b664e37c32eea3c2cab1a773d42acb8e86a53046b52
SHA512969c168304e555531533b0e297c2461b5e50d2ec2d8632341fef6f9f5db78825a7e523adf5087a6bab5a3fd353cb9e70868c3b41e152dcf38115dd0875523cc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5242fc6d5a1f994a08b18e5b8d2ce6281
SHA10c2c7a6c899bf21674753063efdfd2d743f183ec
SHA256124ee63a6946d4f5944f8631b085f32cb611755f655451f7cd95050ab511c61c
SHA512c6793461e47de3a4429975b44bdd1baa7969bfbed186c230aec24d31fa6461cb5ce18aee893ed08673cb1b053e678ee186685ab34c95be0006be138daba2da96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5251ec8186473a81901b9f9d857684d30
SHA1c5a2c86e5869d3b14511ba8a7bc1e55c50fe90a1
SHA2565aec37cbf238d8c1fceeb094712136ea014389e50e12e7099a8a85064c358649
SHA512030ae9e6479953c362359f4d1e392da8fbf0ab6866f472b4e586adcc2d1124da4ffb055aa08aa0e783ca81c3d8892778facf0fd1ea51c07cfeb3334a361b56a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5423ae43159a94dfa3f42ff1b43238a5e
SHA14e62907871f282cc072e7640cbfe07c62b0d4314
SHA256f00ea21c74ce105a5e5faa0b1f08922781a9803bf6a844fe58993713d245f249
SHA512ffe5a1d6591f82a13c603d9ae6585d86eefb34b4a669a98c8a00b03504c8d84bf039b42381121a5997466b5601fe45ac9d8ceb5a7edaaa95fadd8f2cfadcadf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8ccdbae139d66d72f1cdbf2054c08f2
SHA1a9c0b9c97294b6551326aa8ab6f92c81dafef71f
SHA256e7657e2eff8a4c1023e7250d70f06209921d7b7ff9859f404ce4193ab5b47c1b
SHA512587be747be60b3738b18a8f6db8d9bcda56555c88d20d80066b00c35fd6f1524295ad5afdae1f6fc22ff43f1d45747ab0c7493be8c2e3a39c7f369358572e1a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e8f0d08aaff4e98f117407321e9042a
SHA1ba43809ba6f94ec34723511242eac0174c982e2d
SHA256eac916755222c0cff24f8afdc2b645285df8d64e3b940c1413b1fbe7191c5581
SHA512ebdf7c314c4c9a5955185d8228240f6dda7a464d70d28e3787121da40797f056c2a3fbd161858453f4288dc9c5f3cbfb83ef2488f036bc6930b14283d88f8b1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fce768794558900e8427b757ce73070
SHA19c68e1b267a8426aa394f8803baac35452e5af0c
SHA256abb17e2c83a49b0e7b69d39edfb6868d6f55554fee87549a43cbb2f4612b8d71
SHA512e49636b1f61ec10f2324ac7bc07c9bb196814215bf1773e7c44997e7e67dd89db7c71a396d60e93c45257b7a7ac154e91a0601818a8009502acb6c2946153c9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5730980538efcc6a8746d2b2651dc5f
SHA1d00006abd485fd81a74e1df337b948a3484f33ed
SHA256af6496aec068751a0f0b175a42fa49e5ad0b1f9046b7d3b882f651c3d83817b3
SHA51293dfb5ccb332a26b827d509cc486a204905a270f31d9e38f27258efbad99265d0eb8253872386157a48b7b79c16110e8a900b3f3e9532ad7cc32b3dce12891f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598ac1acd8a1cdf195c7d7d5edc95a390
SHA1320f430f56bb7282a7862641d5ddf73eb60b8dd6
SHA256931b397796a42c3f38ba40437a44212ab25827bd500c29e6c4d75cfdf0136aec
SHA5122bad17b1a55cdd5a75d8a1a5e36f53a8dfd786a782f1817a3f77f14bddc03757b7db3069fa123ba5687d6bdcd3405ecced0b8909f16e91c38f4ddb19b7bbce17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519a94244f3093c1349f2d5c5caeb8241
SHA10231a3c5d303d29be1496a20d7b3669a9560fe7c
SHA256f6b70873f799f31c2c24fe92bc6b36a7c43d7a80ec66162bb9082c0f77e38738
SHA51288ae58003c73771362dc2370a676ff006d6c66f0c3326a30a2c9c337abb079fcc89b136f1ae55abe34d93368518173757702b21ff03301fc8711fd4e969e32a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a4298e97d4836b31e02f3703eda3cb2
SHA106e0657f57415ecd26670cc8ab3a525791768367
SHA256ff3ec53f964aed056d12c29dd229e4cd044a2eaead4f36fdd3bdf6d83bb1e36f
SHA5128cedb806dafadf5fcf5c361fe770a5958315345c9bcec184ce2a3d854756dc91e223184a52426d784601294a49bcf909ad73a1c324d661252abfa69acacdd6cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519e3a9234d4ee6df974fd8e86e9c5e1d
SHA1e7941f502682c5771a4bdda7ec0247bfbbee0b22
SHA2566a5a88e3a82e3dc331cb1af78021cc53543a9b1ea8394e9560fd0f5dfa4ea1a6
SHA51259e5a95b9849442d4ba662dd882490f63237cde77f1a5f943a2e3d105e33067219bca58a0b80f160e10411e93caf183fe9fc491f18a43ec9886f72758679d11f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56963cb3fe5131497d4fcc6ecbaf6714d
SHA1bdc7fc349f4e650208393e9a04d81cf6cd0da9b6
SHA25681244fd7e9e94fb0094705f6d898438c189b4e6cb8a40df1c50dccd45c8d7edc
SHA5125793069fc69d6801c06776f1d017b831c454aa62785721e748957c66f343f2016f964b26c1b83518e63a9b36be06a15299cc6e0aa5e06c2365d29e450cff2bf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d99857f3539f36bcc0fd4f2807d00587
SHA1fd18bfbc5922817906d8b70546e5f1407e5797aa
SHA2568b91d9bc4ccebd6fc7524bb46975682be5480ce69770bbddf33091dab0322d57
SHA512df93cb2ab543e653af8a8edad529c4d011b0d2828c20c8615a955614582b9fa6427bbc3e3563bb216bbc62a98676e76baee80a32f01669dc2c9e62a55538107e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b