Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 10:23
Static task
static1
Behavioral task
behavioral1
Sample
34550dab589ea25651f365efb3ca1f37_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
34550dab589ea25651f365efb3ca1f37_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
34550dab589ea25651f365efb3ca1f37_JaffaCakes118.exe
-
Size
173KB
-
MD5
34550dab589ea25651f365efb3ca1f37
-
SHA1
c01a9d1ccac365483381c2342708549c73217f06
-
SHA256
a4948c6c4acaa1cae2eb859f6d3b97326660145f55e7e6b44d245bf46e2cd8b9
-
SHA512
9fcbba4a5f05bb682629b4bb7b179b917ea52c6d99e5f34e121161dd83e63a8728f79a07327acf908813f3b3f5aab912ca6207c3eb8dcee29af05bb6a015f37c
-
SSDEEP
3072:O4jqDOAnJZE+6vGMWq4E1wTakIfWeW2Fsn85bCymn/S/36dZkWB3u:OUDb+6Oq4E+TsDj3bYK/qoyu
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000007afa9849ac9f95a4bb687db59bcacd31aca669d06b17571081801b23930f0fa3000000000e800000000200002000000068b023fa859b1565085bd969ccc4cb09c3285757a564063f5c0fd431708f980320000000e5717ed5cf13e789ffd479563ac06eebb82dd67316a58d2d0df2f7fec9e4332540000000a47b1e3ada52fedb05e24c3735e5d89e43bac18d098aad9e2b15522ec0d2c2e484c65994923f73c69351063a80ef356568cddedede29a85f96180481bc8851a0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F6122421-3EA6-11EF-B1CF-FA51B03C324C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a02fb4d7b3d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426769096" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2452 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2452 iexplore.exe 2452 iexplore.exe 1180 IEXPLORE.EXE 1180 IEXPLORE.EXE 1180 IEXPLORE.EXE 1180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2452 1740 34550dab589ea25651f365efb3ca1f37_JaffaCakes118.exe 30 PID 1740 wrote to memory of 2452 1740 34550dab589ea25651f365efb3ca1f37_JaffaCakes118.exe 30 PID 1740 wrote to memory of 2452 1740 34550dab589ea25651f365efb3ca1f37_JaffaCakes118.exe 30 PID 1740 wrote to memory of 2452 1740 34550dab589ea25651f365efb3ca1f37_JaffaCakes118.exe 30 PID 2452 wrote to memory of 1180 2452 iexplore.exe 31 PID 2452 wrote to memory of 1180 2452 iexplore.exe 31 PID 2452 wrote to memory of 1180 2452 iexplore.exe 31 PID 2452 wrote to memory of 1180 2452 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\34550dab589ea25651f365efb3ca1f37_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\34550dab589ea25651f365efb3ca1f37_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.error404.com.br/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1180
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2b7c4a393801c91fa339e198aaf4428
SHA1ff618e1f2add90e5b3b7e26c3a2f01660ac51636
SHA25666d156e5753741b79226ce4acc7d4cb07abcd50a61a8bac883c0e0b80b83ad8f
SHA5122d358668a234c9b1e89797539a28a26fd54c839ecd64bbf168bcf6bd482909e056d288c719497eaf94729f1b6dc32b6c6d755cd6d7aec535638004c6ac3735e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfa6e72089c0eb4e9fdee192ea4f4b9e
SHA19238d585cae5943f0d0144ee0e751b68f0cdb0b7
SHA256855a5053fe2b68399f93c20aa709b1ae0cd3cf7cbb08094a964cb4b51cc3b323
SHA5126394cb27b3c7f35d36d5512497589f5666eab2c94c4b0b4468a5221e486595607608a0a53fce44e69301bac2fa1bd255ba21157b02d9d566f9f399147715facd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a560fbea4eb50d8006fce22a7b195d9b
SHA1d9f5c1442bf7062399f15f6d76fb4964e1129c59
SHA25694bf507116124416dfe639765545db1aad354438ba469da5ec82f9047abc7a2c
SHA5129e762fd71ee3c7eec1450433037784b9966f29134c27786bc38a9b66c19aa4e176c6a25ee467a0a580762db1a3cf6ab7da1021727f84ba7e6299b883c464fc0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5860eec15b147ef08f08b864a96a8632c
SHA16d37c3947a03e196bd29e1cb8fb5ddf12673ba31
SHA256c76babb83b9dfd4aa74105c19f7522e2058671458461e338b9731e45e73b5f1d
SHA512e6ac6bd7eae80ec8f3dd9e33f0ae44bf4404c2adc120f350e032c445e6e17720435ef7337a87ce70294447c4924ea2b84e2e4a492d7dfe0a5023a3fe8b7eaee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9936ba88d13f829c0f41b3f4ba28545
SHA17e91b6e7bb82ba63b73c54459776cd04303e6931
SHA256fab19ac651068ba759dadc8fd2cc73295e7631c6889ba5700a72fb9962cca70d
SHA512c104f593a3651e4d141ec9d00c7bc4450d2336a57032cadb5c6a8408713a06ddcb7aceeb1a86b8ccd6e6e96ac6d929dcab52c13303623a56569fd8c71d2055fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b41366b5adc7932b68083ce89633720e
SHA1cc967bcd8a9da296d4a61edd44dcd193470a4ad2
SHA256c3d082eeaeef2d0d908a7634709b979fec55d9a8004ea3d0a2f136a05182f852
SHA5123b36b7654064594974a978d24ceb32bb42d2145ffaf12286beb08a8879f039e2febc9821e2dd085f83fb212da04c8ba9e3c9c89557d8004ac592310df698b18b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e381c197ecdf7c43e55d03cb6ca99ccc
SHA15d37bf624d1f0aec03f48d1f152417a4dbddc094
SHA256f5b9168678a66e6a5983007b9c029da8b41c24e210b8f9b8744d85ff93434196
SHA512b0a6d93cdb3a250668fbb7e60ab5a3b61b1a25b77f024bc460efbf40f666e788434663e0bef0dc2fb86b40296651f78f1b342ffb3efbfd3d793efa03f66b2af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5790772594b130e8cbcb945ebff2e20
SHA1b18d62ab67a3bc9336da9d4e61ba51974c12a5c2
SHA256df8bda3e80e991dbd1afd21b6944e5746de626d325174a05bc083ef07308a6bd
SHA512e1fea429ca4689ad4a34f1a4cfecf9ca71091182c25aa95c01cd03cbf032405299c7c8fe4d4c15813ba600ba436bb6a68099a18f185d9c4c78e84ba708d5cf45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5685dbe996822b109f0f621342eef9460
SHA1410d8a7fd9007d2f1832fdd1d110099d84d6ada6
SHA256e51d41da290f3b58dd68770d01477ea56ddcb516fa3769dc6fbc071b1e739607
SHA5128b6e15c2e15e00095a4f8752dea08479d06c0596cc89422402f2ae65381c607dd5cc713fa3fbcdd9b8fc4af1520b9966aaa08bf3a1027424b9492da47ee84b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5eb244f62c6e6d1a6cb4f480f3d4590
SHA1602c9334d3dbb44522d5393aac6bc1169a2e06f2
SHA25695efc067184cb0723d4464fa7ab10a1838af291bb8ea3ea707dea8c44f1e95fe
SHA512baeaa416a19af20968dff4c101b04bba78cf93d0de5a45b90eaf32f73a988f61fc77551221b3c1e5b1ff70a60d36c2bf32df57fbdab8cb99610c6ec8b8b35f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530485c047ec7ace29da7f64f89fa912b
SHA16d2c5da1195428e36604368c38117917a35ccdcf
SHA2566a97a3b2802451f554a40cde20d680f0dc37b8a1e3a7405e60571d0f2eb70081
SHA512a526a6fc9b54d19f0433000d4d028d0afb151c385a9a1e20a272340a30d0591fecdfeb7bf5c7b842da54b63b77fb9feefff276785d56888abcd6af171eeb207b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592d5c863bbbe5f5a3bc640c6d0f66345
SHA1fad215aea5e37293b811ad5bfcc48a2d2d785c58
SHA256fda9fd83201e06fbe19f39f1a3e9e82451f95e6387fc60e582983a581c270e61
SHA512281bd4cc7c4e45e4a03cba9d28c7c45d4bd92e6d0df89e287e0d9db7af34ee6ea92e343d5a3c5276925db0943f1b409be351886bbaacb08acc85a63cc4bd5d8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a06ea883a6717afd94e5965dbc7c426a
SHA155fdf0ee71b426f844fdc5cfe2e33db2a0a634b8
SHA2562e3a08b659d2d1f0f751fab67eafd182a9ba3b84e47f71293afbb733f38d6a0d
SHA512e3e8cc4dea401e0073a2df4d6335aafb0e0b03cd09b20f1bbfea3317442949f6d655cf1774c8b76371ffed8cddcd0ef5694f0691439dbf65e738e11df8a1aa80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58adb67f861af1b6b8b65cc30be073151
SHA12798217ac63380a4c5e2b8b94ef38b954ed81c7c
SHA256ff0a4e6fa53988cccb31b69fa4869ecf0956377546a90cd1204ef62e73667cb1
SHA5128f95e80219b8a04b22e6bd9360fd07ff9a684aa0230abf4482d775e508a9a0453acb1af5a7e59a7c9f177f5d01ebeda0fcc7d017b892e3b2e01ff8c13dc5f128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53acb6076c4bbb23e6db67ef226c2dbcd
SHA16745d552fca522a446f8a87c488d9e0b0474dee5
SHA25647296924b9840162342348a8dd6987d05746689144528d2a0881dd8ad37fdf5f
SHA51215af4a17fdd1295284e8eb749f265a19922a35230c6b4e6de8aded46cdb38b10f2eb82241db87ed6271e3c678bbd23ff2a78f2520aab5b76d1c11c4c80296791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6fb516d8a4e2e7886c24ecbba1979bb
SHA12682d2a1c4232ab8fdc98a5acc5ccf82efbbd6bf
SHA256eb9515b6602dabeda9c0112efceb4410247d357f033a280f5519adf70481139f
SHA5124661a5f26085bc46b1edbcd0ba963e0b8de2ccc9fd0dec866b01b69cf3ff73266151471ac3124b64d8cbfc312b2b03efbca6987ecf651fc5a28ebe2eaaa80ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518cf2f2fd23f504245adf02a875596b3
SHA12bf302b337eaad967a9a9417e613b99f9ca8df12
SHA2562a1e0f80f418e3f8a1f0b4930a3cd1e3585fa9144a0ebbcdf5ba6b2b98bb0610
SHA512c69ebc6aca189ffc3ef6e67fdd1cd88f6192a362e6992ed4772f0e0ce6b028aeec50419812cb266553385adb1125d0131644c826e65ff3b6f66d8cf3ff21a503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b34f50f3f3142d0f5792ae7402f67b
SHA1f00627376c58d8c7e0aef86d902a34216f6ac5d4
SHA2568a077697a19c3ce6a219c5a4898dda84b3670845602aa5366059d15bec01a8e5
SHA5123de912a7c55bff00f3a6cd997bb99f959903f988225dd309df48649db8180c45926f7b99d74845b6439e0dd040a9094feffb02fd01e4e13f4568a1ea71447738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572f7c0561d4dd21686e79df575cc0d23
SHA1a02ef23952f90a515631c8666fd73b5940214ff7
SHA2567a30335075612e0a6fa750bdfa25e11432515f2352988c4987ba13844adee44a
SHA51290cb4a3b5c372be3010d0a4dbe9e25461bf3c4b7512daf18e43b2e1abef22de0acbff93ee5579619be4e3d72e3e90761df579f0ee53c22fa0c1d86bac52fbb8d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b