Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01/08/2024, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
823837ba38e1644905b79c3083755019_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
823837ba38e1644905b79c3083755019_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
823837ba38e1644905b79c3083755019_JaffaCakes118.exe
-
Size
20KB
-
MD5
823837ba38e1644905b79c3083755019
-
SHA1
f0cba5e4bfbd8445168f6163c3dfb732042caf1c
-
SHA256
7b9070af622d007fdd23cc092163853b39a135c5021cb2f96e9ae4715e55dc92
-
SHA512
f4c5f7be0bd16eb3fa89b539a0732c62a83d15fe3867ee8a2c98e61abf7b0504e79805aabc0873e642f0a350a859892787e68ce8ac1ac65ca176a4718e081e1b
-
SSDEEP
96:/lx0WL3X+QDzYAH/4H/6YtQaEbwi2DmXTvWJj2:/T5TbDTXaEbwi2STWJj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 823837ba38e1644905b79c3083755019_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A8F7EEB1-5060-11EF-AC25-4298DBAE743E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000a35ae459368b6c7125df7ea8f17e50722219c036b5fc3a65446c11321352417d000000000e8000000002000020000000722f449812b5c1421922e138c855ad01702bb85da0a8b0d1face6eed91818f032000000063dfc851736a69fa57de4286f339b4cc666092fc552d975902d8a5837ecb1bc640000000d2fd0be42abf065dfef12f94e32423bacc8e606bad92e985e8ef341853adc909bdd232e0f862e5fb808db9afc0414151db922624570f89e6e04cc2ba9663bc27 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428718022" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d347806de4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2596 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2604 823837ba38e1644905b79c3083755019_JaffaCakes118.exe 2596 iexplore.exe 2596 iexplore.exe 544 IEXPLORE.EXE 544 IEXPLORE.EXE 544 IEXPLORE.EXE 544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2596 2604 823837ba38e1644905b79c3083755019_JaffaCakes118.exe 29 PID 2604 wrote to memory of 2596 2604 823837ba38e1644905b79c3083755019_JaffaCakes118.exe 29 PID 2604 wrote to memory of 2596 2604 823837ba38e1644905b79c3083755019_JaffaCakes118.exe 29 PID 2604 wrote to memory of 2596 2604 823837ba38e1644905b79c3083755019_JaffaCakes118.exe 29 PID 2596 wrote to memory of 544 2596 iexplore.exe 30 PID 2596 wrote to memory of 544 2596 iexplore.exe 30 PID 2596 wrote to memory of 544 2596 iexplore.exe 30 PID 2596 wrote to memory of 544 2596 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\823837ba38e1644905b79c3083755019_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\823837ba38e1644905b79c3083755019_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.haci23.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2596 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:544
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fe4a07facb8a98167f6888226fc291b
SHA1226c3a630ec53a60701f97d3fa8c030e351a4ae8
SHA2564d9bc441ecb719cbfbec30d61cf0a3644ebb4e25fec688f5df0dab95ef5aaad4
SHA5128030c94702a36ee9f9ddb0c7886144ed47fe7e167f3b6fd2c069aed97b4abc0fcf26bc8e6f247f53d9139c599bf6dbf1b5cc06019ae16f26ff064b1f6dedef7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfb92131478444f23dda6571dd2fe86a
SHA1f5360c29ec0af84b3ddced4f320d67dcc5e78c1e
SHA2564eb3618f65ffbf6bff90409bda65b933d129b44e21c975f26ba6b856e2eb1432
SHA512dc1b6857228da8776a31b3c637bb958e18f60924fde28e14d20ac0030051722f8d40793a7f6b9b4ab3080cf415be8d9e1963e097c9c517001af75b9338ff831c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dab693adac9b7c0d5a5a1250767b0f7
SHA17a880950ebe9178b903f0f9d5bc875785427627f
SHA2563144e030bab17c5e2bb1dc1df4814176aebe9399fc9f3da9db95f79e0e18ff30
SHA5125d822a1c1a9a0bd9848acc54b373995f700094d03fe907cf91027376bd62d0f68f2d39118116268e3c59d96668871edb1fca135d71b663a684aed1c8d723fc9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9f638ef9f6e9b263afa1ca9046927f0
SHA107600ce057e9aae680bf4a39b6ebff948ec82b52
SHA256e3ab1366904391aff234f7da376271e6548213d8d0faa30a61c50cee4334f2cc
SHA51238e9ce55a2c74127690dd1a490aded23e376a70c2fa491eb6a9f1cec573c7ce0aea55cb58b6f190954d6681b6a6b3b2fa29ce7ed4f25f275823a26213de34220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571ff6d57914215661b36938bcfce0be3
SHA1e385ebdd619bc483643e65b6c7cb49b26ba52f5f
SHA2565dd99ce2718146c20884a2279d3503419fd408ca99c9b518b9c4cdfd9823c441
SHA5122422e322667c89d9d47d355e7c8a1f20b36b566b4cf2228897fa2252ba73f0af004dc860eecdba6b9410ac3979111983edd039012b50956260935384beac5020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507b0530fbf05e33e56cdd2cb8554fa77
SHA101d09af77e149e9c081ebadfc5bcff1843f95c63
SHA256d20ff4688dafdc61e5966fa707bec81171d133027c24804fd64fb385fd70ee9c
SHA512b77283dbc9e14508812daabe1f709da22e6f48f9eceac93ecfef4da9d80b1346fcf382efccaa9220adc149cf17e24ae5a9ff64e03577e09e5d49812a09539ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7fd0f335132de3f8ef709b605a3f17e
SHA19423716816d817044d147af225d5cb3f54125fe7
SHA2564ea6763ecceab72765c3e31eb33918865f6122aee8a064d3ed9cb43b33b90d74
SHA5128be6d33a4f124de1fb95d2f8d5ee6dfef2de3a681025c0124c19420cf0684ffb28a67d0a7dc7988b90b0fee5f53136145cef1551feeb6198b0d35e43c50d5f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534033cda315023692c00fcfd837cb26d
SHA1b7f0f39f5675f83b1ebc792cfaafb3b073e6e476
SHA2560c60efab8436c9a135fb7b589d64a14b29d9a3e60285e727cb1a93532fb39818
SHA51298c7bc0722036cff8a0cfdd60796f1ec67966b217130278415a951c1d6b6d72a7da11cc9a3aaf503b5099a1a7aaeeffdbce9c5fdc8fde95b8829a534125f1343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c85bdc05791a24b3a724419380627622
SHA17277f47e35d66759b5e03fc3dc94396962b530cd
SHA256842d6a5c088802fb532a0c18b342cee2ba442055f75320eb76d0a9ff1b2bea02
SHA51280722aee455bd530ea09c84a12891b8b9814f4cbb97656e021eacca994c444f8c79634b89f72fc8571876c6d25bbccb945c3c2b8fb75cd409487035d714111ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5e79d9aaaa613e450a405466109c048
SHA1b1d6b59fc74ccbb23f62fc82f579553ec4844034
SHA256d42dcbbbf9ba34b517fe3a462e2ef091fcbb2e7adbd1248a199bef2a30c36bb2
SHA512a85f77093bd32a7efcd27fbe08541b0e893fcd1ed2f15b6975f8edee13830b9fc2972656c05adf25c93f3e80060b4ea1290725ba8b219ad81fdf57bbb9fe4292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5b38bb25c9c31ccbf56fc1628397d84
SHA1874c90f53ab9cd3adfdf892028f9479c2f0daea0
SHA2562fd644003743109571d2f0e26d999a175980e2c15f30011ac6509386f7b6183a
SHA51257b89e1820c28b7dffeb464c20e3d2e0e995c3a07140cf9c10166afaff2d310c0aa8d458d0c754a6dca8cf0fcfbe73e895506fd9c4bee95ec836c81202b3068c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bca239c0159578c5a1c5ae3a73463b3
SHA17aa03377f3e03285958880afa804b9e637efed37
SHA256c63a59c82cb63b70ececd94a0f7752be0450f2578a1d883da063d177910dc1f6
SHA5125f912a99c4071ef064cb1c1d9c76a62698f2b20ce3501fec8c7f661b8a63342028488a8bff796991c85d5da58b83009d57868f4fac76a45a441e95d333f3178f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a7fc9434dc2f2c085b6f30d0ee7d703
SHA16f332cb2962fbbfa3c86dc1fe521b955fa0b80a0
SHA256990badac1d9b888b3bfe0c9750a47307cf8b766b38f8f75f974370ac72dacb98
SHA51223ad4aff62b532196eb485446bff679bf684a8b88b25a39f837270d31599803c41ab80e921ddfa68c6620c652b8d5df4ebba3f55dac0bca064bb3730fbba0af0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500799378bd01cb9ceb6727c1e5cf9c48
SHA1164e77018a6cd992a1d0e52a7dea1edb74682e5c
SHA256424a5448332ecbc72c5bc5273c9ac1116b8264fcd53145bc12c0b1210dd50e67
SHA512bafe20d7ba53882f22179a743cb54139e4a7170b8c00479f739f2ff589da980ac960a7d253bf87b30481b12d6390c516adbc338930cf6b7601e0d96449e089bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511272ae52b915aa25bd6fe76c65bb783
SHA1780bbcf939dd21752343401da8a9b8bb61995684
SHA25651743e0483b94f006c8fbae31f0687b5bd70a61d904e5f386c6e8abfe57d7422
SHA512c0397e1e69a84fdeec1ae55eb73b987ec1bcfcb8239b4d00ff86b165cb0beb4074ace402f047f952c9aea4bd758e3055dee784d4441c6e8079fc0b0f41c8ced3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591cf66be82f436735b0c95229e59264f
SHA1a7c164e6f4304135490fc892ce7f44d1cdbff2a2
SHA256e6fcc11111f39fd941681001e2ded8b133c60ce302c83a4eb2256900fd10c710
SHA51225357e1fbe807deb19dd7b6426a22446428ee803c9f585fc98b1b3a0f4d39fcea82dc87485837a25d9405c8c0bf1715b5e1f8127e2f58fcf056aee96c54d2fb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52730ed7b8e08bfb611013cb2d07eb791
SHA14e29ee76c9530ca160d1a2a86204dfecc2f6bcf7
SHA256d5d1c0ed476de05d24e6bbd6d3ea2c9cda479196265f4753f5581f5722181a46
SHA5121607d4536e75281f3ac17c7cd88b90c175565f140a1618bf5038344824104333dc65bd064e1ac55653650cb4c65428f71068491883ae8e84ed879b50f99c8a2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ae24b2758fb374330f7857e973cf65d
SHA1d090200f8abe36f97704c5e820f67536ace2e95e
SHA256e53c012b49b45603b5b70e8cfe3007a3e369af4f1d5e82503369f4f6d95fe114
SHA512746ec77cc9013c02b04d0acd280823998e6c4d22182cc1aecdb764dc03faacb82f59022dc704f8479eab6abab0329aec89db929059cd7a5f792fc8a7ad381a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5819450f6fd2292c2c4f8b306e50fffe2
SHA1e328a299e5f5ba2aae99a2eb3aee5f49f014ff76
SHA256a92cc535d8293c3860a8e9644762c3477987c6c47919470cfe11d4e562155169
SHA51234363c1138e558e17c0d2c3761cce7f894c262e21e23ef8133e3fc0a68afc669b12e12d44a77c84ccf428d512e8565d0f2f05af970cca5f0ce7fad11f68288ac
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b