Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 09:49
Static task
static1
Behavioral task
behavioral1
Sample
a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe
-
Size
45KB
-
MD5
a2124e3bd8be252fd6eb28b6c63a8ca8
-
SHA1
685eb27a708bdd96f496c36757354a7253cb33f5
-
SHA256
de146bcdd9c4654ed46720326582ec46ec34f37bfcb422af9b726a6ffe533f19
-
SHA512
4fe6ef741d424f56c521a3eb43abd0333af400d7e7ba99e6504e6afcac2ef5f355bad5e4bd8e13b6a382a1b49b29af655f4653f3ee3af8405bc720624e590d58
-
SSDEEP
768:3urE8TCXx4KvmWaZG/sRtn1Fqd+gbor/3pNzpgZ76iaeMNmOne4Nw6eEVzTnr:+w4z8nk1Y+fr/51CQihBOewLeYzTnr
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\123pa = "C:\\Users\\Admin\\AppData\\Roaming\\123pa.exe" a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2372 set thread context of 2684 2372 a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{01157991-5C7E-11EF-8EE4-42572FC766F9} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000638d505ea7fb721a155345c62901df2e914d631521ab626e3c37ef981129c345000000000e8000000002000020000000f1e8147b1fb11df663afa2b24ccadc1546130eb63eb6d22953d3866c246cd3eb2000000097eff5a0b86392dbb90aa77d7a8b7c7fe8ec439545f73d34f5bc8f0a7feb82c5400000006c69f0d7ed4970c71096c47408bcf8770c1d290889eb9e1eba5c81f0734ec0a47eec0c4bea57e23722de1dd8b85e67d6cf1c0ac59ad5d012c317ac600a0d30e4 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 702fc4c68af0da01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2684 2372 a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2684 2372 a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2684 2372 a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2684 2372 a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2684 2372 a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2684 2372 a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2684 2372 a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2684 2372 a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe 31 PID 2684 wrote to memory of 1440 2684 a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe 32 PID 2684 wrote to memory of 1440 2684 a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe 32 PID 2684 wrote to memory of 1440 2684 a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe 32 PID 2684 wrote to memory of 1440 2684 a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe 32 PID 1440 wrote to memory of 2520 1440 iexplore.exe 33 PID 1440 wrote to memory of 2520 1440 iexplore.exe 33 PID 1440 wrote to memory of 2520 1440 iexplore.exe 33 PID 1440 wrote to memory of 2520 1440 iexplore.exe 33 PID 2520 wrote to memory of 2264 2520 IEXPLORE.EXE 34 PID 2520 wrote to memory of 2264 2520 IEXPLORE.EXE 34 PID 2520 wrote to memory of 2264 2520 IEXPLORE.EXE 34 PID 2520 wrote to memory of 2264 2520 IEXPLORE.EXE 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" find404.com3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" find404.com4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c470dc8bedb1c2187f79bc4a461f623
SHA13c06b3c93ba16c9aaa043455e3758202d23ed092
SHA256ed79b9084ba8bc0ed6c082ea44ba6db55c8546fdb505f0256dcb0638faf7b4f9
SHA5126ce9f0c163d646ba92daba79bd4740ceaff18f78733358b93df3e715482a9ff2b5a1077a8257f7a45cab2b65e9e80b54daf3ddff6d3d3d9c62c782c8a06b4360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5857b2cabe0749151b5cdacb1319f258f
SHA175ffff9ca25d2733ecb535acabe2f4ec99ceb222
SHA256347d2d6cb62bca92f38746c8e43d5bea4ebb93e39b741d42acfaaf93ee56dba4
SHA51278f12fc558806b400416ab7143c0173d4e319b3b23efbda53fa6b1b84eb41d84093d5331b377223f4a63b69f96fbaa028cbaae50bd73b873604efdd1b725220d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ebcb2db974e2af4ea0d111eea7a3018
SHA1ae4d3c65375df35a469c392a122f62343912ef66
SHA2566d4b4f492f13f98d2db5dfdf9249310ed949f7aad557ba216886a00e6380e563
SHA512d238551bbc98822fa24f88da71f3d9c8630cff2d4d9e19ad5d6145e4721287e96e7df104f72ecc54f630af46e87e273f18e9aac32372e14f538602de013e0606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecbc0a42e5e074357009c144cbe340c0
SHA15554ec53e536563d00708e07470b4514e3f680d9
SHA2564d8a7bb4f256d5dc4489db617afc922bae8cdc94530b7e8e62115f2cf16897fd
SHA512c123a2c6c5a7d79b7a6421d7c6526f4403db8d2138451cb93dd34f32933e29cf93862731c12aea853bc1acba02d8818420a5e5b86a1a5a6c848136ffb3fd5fed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5217f93622df39ce42cd0d227330ee734
SHA172d780af199149ffbecda8111a6428e2595e4cd1
SHA256f871ea8bf0f594eb0b5b94ff7fb1e061fd9bec5892e4a66f227aeac017d311c4
SHA51253d74befeaab88b29945868b97d1ae0522cf1d6be74b458a52c815179d302969d673c03e3135c67c22cced2cbec3a7a85feb002d30a34d01b647e89f4c9ad597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50559ffcbe45011a73399481c2019f652
SHA1e9b4c1b1e4742108c936957ff690dc8eb7cfc63c
SHA256278de8f137f04008beed3dd6874e71500b40c738199176ddd8f91b3670e2e4c5
SHA512f4a5cf8e4af4da731ea183bef045a47d56f8308ccea079d3a27dd818170947f38140be061f301d249cc305e3fdc4d11dd8c8c3090a9a161c8a6f2cbe652bbce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6aaba425eefbc8f3f2096f798214001
SHA15e19ef5338bd96ed45dd719a3954a0827ffd026b
SHA256dc4d560e59b2a12eabc59beb2ba4ae83ac3ef43bb7777054ecee9f5a12180d8e
SHA512499d68254b6b533a92016aa8c2f42b63586dbb5c04f17b01e2e3de6a4488b55bcfa9b7c93fda60c23825acade74a59754bbb220db72d259162390b4ef805687a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f5858c60ca6b88a3e8bbb006a899578
SHA17fb795df2455a8b252c58cc305aec8a50437bc48
SHA2564c67fab4aaa2e1e215b360a1fe5d9411d603bd306e96d7c85771a17f46598cdc
SHA512e59ca82b13eea9012cfd4a6865eb7acfa035cacaae679e8ed42f7b5b5331c26522a3a1ce4260164554a86970be5d852cc74106466b5c2acd8ef38e67ab9992e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565bc6a653af0492438d9c1c724c88b7e
SHA1172aa05a97a8345580ce1d28ea060c2b69881237
SHA256b0ba30376ba091fdf54a895e5339075b5ea5d4550c7794216069e5593f718cd4
SHA512551ffe9a4269a38f07c905fd2218d44e3b24e5f3e65180adc44af26b3a46dc8006d136c8f683db4ed167a144ad7153a65f5cd89984d36209d59f2a2db6c25df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e28c27f93a59dd98f4611eb063d93dcf
SHA1c288d0c16fe47ec3eb6760db18482d3174a34e76
SHA2565c04834b273e9bd7403c0d6b4da3e03c7b796f15848e689b4d3690642bda6c93
SHA512fc37dde9a3ea01fd7c10b49bb7aa0c16a81d0422f39e238189b310cdb0fd7b0145b6bf82ce0656f0e3e31ccb957af038902d36d499524a9dde75bc5490b11ab7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b