Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 09:46
Static task
static1
Behavioral task
behavioral1
Sample
412a332c8b824f95cff3a792a530fe81_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
412a332c8b824f95cff3a792a530fe81_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
412a332c8b824f95cff3a792a530fe81_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
412a332c8b824f95cff3a792a530fe81
-
SHA1
1d6f2b32fb21e69f97389e571d006aba3004a039
-
SHA256
49552cc67aee3878a71c54bb209e3628781716a99afc98e497cb1763c208560c
-
SHA512
904ddbd87c3a6f5881eb27c530cd5ac959ef81dba5dcba2a569c3a6a09860e790bd3846834f5ba525fcdaf060fab9528068c2bf43e77113064431ae7a1fccda2
-
SSDEEP
24576:cejDKKiDkY2+AhEcy1BirYZqXMrDjUm84QeP3Cqkkkkkkks:ceUDeyLZqcn3Ci
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60bf0fa709d5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D1012481-40FC-11EF-BB5D-724B7A5D7CD6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000c81fb353702063dace454abde06d7450eb9f02cdefb3760ef237030d8c1cad3b000000000e8000000002000020000000e802762b13477dfe98474642bfc79737dc84158ec5b9edf65f2a35ccbfa13f1a20000000b11a41d3c3bcb1e2244ec8408290b07bdb335d3e23ed1b0ea691214115439dd240000000d75eab9f745abe83fed6c2eb52754621c44ee7d08c33c7fe8b325da3e93c1317f05ba17ca0217b8b55aca5236b17baf71e93e8ef79f64cccc9bbec6ca0afd3a1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427025873" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c00000000000000010000000083ffff0083ffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1664 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1664 iexplore.exe 1664 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2496 wrote to memory of 1664 2496 412a332c8b824f95cff3a792a530fe81_JaffaCakes118.exe 30 PID 2496 wrote to memory of 1664 2496 412a332c8b824f95cff3a792a530fe81_JaffaCakes118.exe 30 PID 2496 wrote to memory of 1664 2496 412a332c8b824f95cff3a792a530fe81_JaffaCakes118.exe 30 PID 2496 wrote to memory of 1664 2496 412a332c8b824f95cff3a792a530fe81_JaffaCakes118.exe 30 PID 1664 wrote to memory of 2976 1664 iexplore.exe 31 PID 1664 wrote to memory of 2976 1664 iexplore.exe 31 PID 1664 wrote to memory of 2976 1664 iexplore.exe 31 PID 1664 wrote to memory of 2976 1664 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\412a332c8b824f95cff3a792a530fe81_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\412a332c8b824f95cff3a792a530fe81_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://makeasymoneyx.com/redir4.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1664 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515b5cbb6bc787f42162b8d5cd8f8e6c9
SHA15503a2628f0f04bc61f2d1ba0b2be7092e4e3e45
SHA2568030b081443402d6235dba28970349b7d310291bef220fee2670dea07c7665ee
SHA512996d59b046a9e0577453468f7f159a3c1f9420d4b4732d730e34820f383dddcdffa257e01b685c2275c9e28c803aedb127b86ccdb6ab14f2c03e2df4625aa955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dca1310b5d5c4bc3ce8cfdfd2813bf0
SHA1898d3780d543e77ec88326fe46cd16aaef9268f7
SHA256d5c93f5993879bd9ccfcbae90f127a02b4b4b4908ffcd0949d59122f471162d9
SHA512cdef8c0357fcac9e1f64ccd355801b9d48a1f5f18b3eb149b84826c19cc4dad31af0e35a9d7e02a6c1b0969172389ddd63cca7331fc5b7287a77023efc69a18c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5944dd1f3c0252d4e51c40c34acae606a
SHA1d2162aafabc5bcffd15c7d89a5d46f2ee47fb54e
SHA256a938f2ddbc2e634b6e26576cc02b98ecad73eaaa9f241c622b6002b95d3f83fb
SHA512eb569ab9a6333ffd5526499583b2e9afc1f2884974bb7b40a03cce76ab6def0ebf1d13711ae4cceaae9d3bda48004f4c14448de397ea2f291e830ef3c4ce4584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac67676f9a6d61fa006926948402b988
SHA1dd65bab8d737b87335c4f40c02e7de744bd980a3
SHA2561aa2ae87a1747cc440aefe4d9cd29a314058cb80729ffaf9365a23ab9db09b76
SHA51226f978161109995583c4d93bce0a379038c53e02600f86562318fd4298ac75d184a0ea4aec6a8321e1ba43b2ffb2af23d1b1f0766ac0273b59695e31c450ba8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c8f63c477d5acdb8207555dd45ad24a
SHA124f50a3b9f98d3788a661ffd4668b6c4f52901f2
SHA256bd5b5386f8a0339b68e2e3028ec4cf9d689b3b50f8bcb1587e686bac603b354a
SHA5124d1bde12757d478c552356e5f70530b332d00fea37c7c03b023761d85c6b335efef46a7de9ec819d42a5971f8b6dea98fa2336bdc6e04c73530a94ca6ed6bf48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3580906e2d188efbb7c0b4bfdb98d62
SHA17a08d39135b2808b976d34219002be1757bd38b9
SHA256801dcbe1d8ad995a7a963669ebf2defa7d673fc1ea4f2950637a0e6947cdc692
SHA5129b7d589552c3441468373c74baaaae5526c40dd948ef0692576289fd5e9234f3854fd89baba0a233c30011311c40c965f2b0c48c3902774733d0c7c2b37bd83b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548c3fccb6996a0a1967056f612a44ab8
SHA165aa8b4888446cb85338f63e9e7ce11cc6f4b125
SHA256da17289aa37c1d512c7d1b72e817a5c7023d633c9e58c7cdc90bc2f81279f736
SHA51271c7bdce9589480db4ad9ad51db2864c67dc1c705f50e48a0ba0e73ea82098a21d19484dd865320d7e9326d24715bdd1dfa2791458ba47d587431c28b7f63939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7c10e3db56795783c888c1956a7ce1e
SHA128f30c22c4fee08df9bf0c21a614f95e77f05937
SHA256d64ee2bf012b216f7f7d6bb787ba2f7f74eb076418c4135932f6442e866f23f5
SHA512c0a8b8fb55f001174766acafeec846d3793e03cf2aa04111484a8227191545d7b76e6af3fae3cb9dd4500a1fd6cb3b321cc9e092cf52d1a4c7884589cbec15d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba56747e7779c17f6d6d63314009e3df
SHA1c2ff0b3fca6dfa85d2550a045436c8d99bfd647c
SHA256d74019968351104d2429d2d7af3fc5d09444feb9cd3d5dc613cfbb377efee24a
SHA512387226a4ec58dc91fb21945a51673d4bc6d33c1569bdf3f32722424dfc7721b7387c2c25fff329177000a112dbd3264e30272e1e8271101f47b34f8f6b099a10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e31402bf66865d66bcc281407826bf0d
SHA116c3da4f01bf91e7533984b124589700790e6d36
SHA256eca6fd784c7d68f0fe3185636856956d314aa8ef8027903e2dcae5283060d664
SHA512150366672af1947f7809a473659326ff0c2f01f9b295a00597e8cc4ccb631dd8f0fa9860c3d9b8cf266dd7538ac450eb08ee9c0ea14e92b5918c2de5dbf6a803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5028f4947efee09355b83fcdb6ae3d730
SHA12fdae597200d706d65bf09534f930f8719c1529e
SHA2566bca33c06b23c08250b98dbb1b786e7cd4e3a6bdc836142b4c9af62adaf55025
SHA5129ba252d324b7d381a56fe282d6ce2e7812c826c832d56b4f9e8f93c1d56bc32666bc02e7fe4646d3c589a08f79cfeeccb39bc4b88f946bb4987425eef463cd48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c53b39645f5b3718640967abd395a662
SHA1e9f48a69c01b6d124dee38a3135a458cb9fb798c
SHA256e000b57f29bb2c0eac583d7f0d651597549d0e2f863e35087a953662df4315e7
SHA5129408a2aecc705ccaf6f82fc555ef2b170250d136a2b214e0aea9261ceba4f805a3159c6f587d3cc66b5138597eabdeb780ad06d5147195c373684b6c7badb60d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54be128aac19e13929344503e1a480a1e
SHA1047445ee5070ca855ed46ff7204e6a0cd16ea0de
SHA2567b532117f65e9fe3b06bc035cdccadcc37ed6c9457f90ae71728578bc16759d9
SHA5129725c5b8867f82df58d6482a78b233537822f65bb44ae6d939129d42a1870becda83faed5d56461b5ca9bfb702f32b7306b6842edab89cec8a2e3903eaa68c20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cddf2be5306f0a65825b26e2d338f9f6
SHA1c9dd4262e0dc42ff219c570245ea010c9020070f
SHA256e4c0aed4785ecb86a02afe4f9ac6e05a9fbae288e339755240d197f350bb07aa
SHA512ed8f5549b5df4f7210aa891c48b8fced9e9d6db39da05404e550ba55a4302fd367934a47c8edf411a7265e26949c778cdd3069ce43a1536008dfa95bcc435e80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e66df16d9559fed1ff2cb5ac5a2269e
SHA188c36c8c7d581b0d118a82fd1cb76d8cfd738a52
SHA2567903fd56d4d54ea2140f683072aca726149fb97afa66b7052a6a18eef24aadcd
SHA512a6af9313bf91d80b8bddc2cfc463fcd67eddcb6de7a7acedab7f5e09fc311f65f4d961c35b66e7e9ab9baaa87825a560c4aa14b6af355c443f4be57f95a16184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5243a77500cc1510139c798044171e5b7
SHA1ccb4778a6f7497e5e871f60d36cef74b72ee40d2
SHA25656a18e9cf61c0697b29f501e98909b1cf1f63d1ddd63ecfdacabde291949327a
SHA512dd3c0811f854c19a48c3d632994382c225ef5824387e967c35457932f0cbf62b9970f31d0ef3b4ea036bd36f922760d1858e9a25ca25ccedf227dd22fcd86422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5311c849378c28e18e0e689f4147463e1
SHA11c73ab6f24d4396c79cf0ffb120176b6749c8c4a
SHA2566c115f606ebd59ac5fd1615870071fcc30e28bb99096202c5e97b2ca6f509901
SHA51201191020267b2a301ce5cc1b4576178360e9e7c06e63829a3e8537c12b077291a74cbfb31b6db958a5ab066db055977e1340a40349f14be81d842ce2ddc67b06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de4459c4b1f540aee0ac9f6ec60c33f5
SHA18bc3309f29cfe55ba1b1ffb2bb8364d7cbd81497
SHA25623eb5e009da8a13185a499c3e3823602a5c500c323a48dd0672fa1a95119bf04
SHA51226b62840457a7dff61b2dbca5c40553ffbad2e4cb0bad56ddefe86dfd833c3139ff5a424f2e735da216ce9009785a929ce0d3dd46ea3885b040fd21c58992ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564245e5bbeda6cd7c3b8403aefbffd70
SHA1c45c46b300793622b6d9cb7b401569a37f84dce0
SHA256c2f5779ab107bb6614c79668f8539e4470a593b24cf11992d9b93e11d72eeb6e
SHA5120a388a68b0eb9489c56238fcae96bab5b39d0dbc1c3b9900e300822cd7e69f8a7910192c1df0c8f710bda40a8ef1859798a83ce7d9859fb97c9a12974eac193f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b