Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 06:16
Static task
static1
Behavioral task
behavioral1
Sample
a5b2affa3b7593a89e59fb28efaad330_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a5b2affa3b7593a89e59fb28efaad330_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a5b2affa3b7593a89e59fb28efaad330_JaffaCakes118.exe
-
Size
89KB
-
MD5
a5b2affa3b7593a89e59fb28efaad330
-
SHA1
00b6448f680e3422bf5061992137f0d138427faf
-
SHA256
c710b6ed6ef05a6dd3008f521153eded98510c59949e3305e0f96a7e3712fd99
-
SHA512
c5c131f1d0b3e61faebdba8c0006c281a29a367ce814bee31d397fbd6f99a95aa3608b93287f6c14e545015f106878e5482272d269c923fb82b74bd5b57c353c
-
SSDEEP
768:sWs2lukSlng9TV3orQgw2qP+W0+Nj/r+TbVgtaA9oMNr4fhRACymMGUFuiEZuKUR:flmC2rcPAS9Nr4fhRwF50uKUMXRSz5
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F27D83B8-97D4-86E1-1AC4-1302FC94EABC}\ a5b2affa3b7593a89e59fb28efaad330_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F27D83B8-97D4-86E1-1AC4-1302FC94EABC}\StubPath = "c:\\windows\\system32\\winslc32" a5b2affa3b7593a89e59fb28efaad330_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\winslc32 a5b2affa3b7593a89e59fb28efaad330_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\winslc32 a5b2affa3b7593a89e59fb28efaad330_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2936 set thread context of 1696 2936 a5b2affa3b7593a89e59fb28efaad330_JaffaCakes118.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5b2affa3b7593a89e59fb28efaad330_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430123656" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65C93471-5D29-11EF-BEBA-E29800E22076} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1696 iexplore.exe 1696 iexplore.exe 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2936 wrote to memory of 1696 2936 a5b2affa3b7593a89e59fb28efaad330_JaffaCakes118.exe 30 PID 2936 wrote to memory of 1696 2936 a5b2affa3b7593a89e59fb28efaad330_JaffaCakes118.exe 30 PID 2936 wrote to memory of 1696 2936 a5b2affa3b7593a89e59fb28efaad330_JaffaCakes118.exe 30 PID 2936 wrote to memory of 1696 2936 a5b2affa3b7593a89e59fb28efaad330_JaffaCakes118.exe 30 PID 2936 wrote to memory of 1696 2936 a5b2affa3b7593a89e59fb28efaad330_JaffaCakes118.exe 30 PID 1696 wrote to memory of 2308 1696 iexplore.exe 31 PID 1696 wrote to memory of 2308 1696 iexplore.exe 31 PID 1696 wrote to memory of 2308 1696 iexplore.exe 31 PID 1696 wrote to memory of 2308 1696 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5b2affa3b7593a89e59fb28efaad330_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5b2affa3b7593a89e59fb28efaad330_JaffaCakes118.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2308
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b9ec36a8f8855b17ad733cccf15a89d
SHA1f7a4327343a4130947169be80fe3796210d80d3c
SHA256d57fde9a051ff407809cefa5b36ba41950458b74e5e7e99a19d1a76b07cdde58
SHA512de03c61d4d41130d21d853cfd1529a0acd5b07c59ee3af2581f53896f5fc8c8329848870975b6b33554fff76e7e36013c895e251a0cf2e8c0be7e16a47dbcbfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509fc214a694e109fe5532c00e991928f
SHA16119995bffba10985dc1bf4ebfec05a30ff4d31d
SHA2568f490e13b543d4dfcd57061df44f926538199a93e6baa3c3655574d822f2c99d
SHA51283db0a45af3b7694b2ee8de311a16acef5952558c746855589f9794a55f247e12ba210300e4e77022ff84b9b71375a42d80e51b01575e7995d78696b49e23e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1fd4547c9a94bdfcbd65ebe9395797c
SHA1352c93acc8cd28ffbee234f51898fd44410647ef
SHA256bd4dd12d0cb514f5b2222a17cce1a5f4dd17edc151519440e27297879cbf8b3c
SHA51285aac5af7fd531b67774363704ebff6c2fb1a6f25d9d9e5f0d04b69a092ae08e35cf6706f7f547b112cfe5fd566f0580cb298b01ce65f6196cec43a3d309d07e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d5fe012fdd861b61879a5373bec83f8
SHA1e71c010f1135c4a7aae50e440dda3a36bff1c6bf
SHA2564fa081ea733a0e15e8c93693a619ec157d0ff14631f65fa3a558c82717cfbb35
SHA5127e8240cf859829339289837ce47b2460d39b3d20dde8ce742fc87f4b736db21e47a2d9036969e99d6d97e194ac271432e74979ec9c5a2fac9e0cea88a58152c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5898899c5648d2103b07232df49b97522
SHA1af3e268067dca4f65cf6bb222acffbd5950be935
SHA2564a8b2a8c3289b6f01e7784ea05497e7ee128a2b9d1dd767267f7100a34b8bf33
SHA512f1f23257e3eba476ea630c6f7c59facbb582348633a76a79c8f1acb96ded15702638126f5be5f567d98b5d81f8168e806eca4a655b56275bd02064c9bbb474ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0e76956d9bd45fb69fb9af06667d6e8
SHA1a9523cdb379b990d940234e60430f25958643a12
SHA256b2cb3bf2fdcd29fc4283234cc39d27416f69590dd96cba93fd04cc46ca9e818b
SHA5129914af8f53aea844e0d0c2d37eeadcbcb9ab6e309f42b0c99c2b685fcb5a2acc31e8a913d31275a34f1e0e3babf1bf62870894e1afcb8e529881abfe3d239223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dad76dc5416e793c62f186e025f5b6ff
SHA1d479ca28438f90a819602b320921b4aa1b140892
SHA2569f576159281ee372b9425f9b151aed0c1f884e7a4a9e0df62fc3c788b1a497a7
SHA512cef517e156f81c140f2c4ed2e36c1ce3af2920768ee483cc59cd73098bce5f08729eeb0869c7dc0f3d82741bccdfda130c3ff52fe632efbdf96ad69124f9879a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5706ffc7ae45a8ea112ef8eeecc756dab
SHA176b3913fb46528b5054955cc2bd4dcde5446ded1
SHA256efa2fc9927927ad7d3f5c91bf096e60fc56d1a57007e54c2a32548ef0f98a4b5
SHA5128e146e396b814ec258bf863e01cf6b10d4f746297ae6c2ecdf74513b4e4fac7019f05843f92967e74bdcc1e77347db872c0df3b9d9c162191111dce49109d4ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e081e5ea12d7e75f79da0dcc4fb56535
SHA1eb22d8df092af69cf6c382b3da472f31936699d4
SHA256230dd283f552f5413c71481ec887aa7de84c90a8363dd69f6e28b1d6d714a786
SHA5126d459fe37358176fd5978843ae01996eb94a8722a268bba227c19da07342767a9d83191758b578721418a72901e8054987ab69b4e52401e215f8c3ea4e487b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d343db30d0e3c3d1eb0f38a1fa196f2
SHA10fcc928c7718dd539cd09086e0e5360b9adb15f4
SHA25659ccecfa75a71ccdb0d72731e5b975252b40fb6814b0edfa188ad0af577bf723
SHA5124a1156da124c4b15d6dae26401d1ea330d1c8ef8a441225eb6f91414022fab0e57c9f23919d1ab7714c71a7a8fb3cacf91ab684d0767acad30c45a096cf56e2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa8d2160dddfc932c9dce73162cb9e03
SHA158d2cc18253eebddafde03d810cfc6e296ae2ff5
SHA2560d6f940d9075938bcf5a19afff957fdd3aea2c221907179b72ae6403d519c1d4
SHA5123cca116ab454e3327f0a2afd90c67742d5a9280ccfa2a1787986e4f8e074541663972e73bb0fc34a75076ab190e85b4df1bb90967c57be58681dcbd035c5decb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1eef9d86e4a9fc291e3ef33c0b666dc
SHA176428f30022f2e6b9314d4c762d785733a7c9254
SHA256249d366b8201eadea764093bd14a617cb250654c95ce2a4788e6a7b356342cf6
SHA5128fa1e34cbc3442070a7ce08fdc04291baa2ceaf38367d9a05555bf6266633a8143fd0cfef11c4e57866bfc24d013f52b4522785f7a498264f07e5b3c4ac174d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f6101b38064c496828384479a67848f
SHA18f37e573a60e4093467613737d97ccea315fe198
SHA2563fb22c30ce224180c6a544ce46cae0e66e2393914d43e8e7dcd594a9f4a6613c
SHA5127c80040d711416e1cc64a27ef003fc5f1fbc275c8df16f556c8908ead6270728604d8af0ea7fc91de1d30850074411ef359107ac15608ea6ff818311e7d175e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598e3d2b751fd5035ea5ad7a1ec4b8330
SHA18c1c4001dcced97ce25894acdb552874c9a2b1c0
SHA25627864a2e6892b745602856b1aae9542a5838c547e747b91e09cd0de537ccd618
SHA5120a346f0b25365a97481d2c3809d58a7407f99262cf222271a8407a3c9af5706ba187ba95f00f5259325697cdaff3f6556f65bbf7c46b66e3412d9f9fa6953b25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c44b55f7a3c2c497921d8ca68b075218
SHA1d31410a512f8cf81b607f3cd66ea3d610c55536b
SHA256544bfb8ba7e3c99081aea88586d641cb80153135e68eebde203559278ddfaa48
SHA5127ecbb5596ba3d657960fd83678b9c2eaa209705e5c9079d26d8c4ed0470a8cca6742cc18bd406142635b86ece794d97e9c92008bafc83508c3a8cea5072860fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592ae5563508373d351ae670d38be6272
SHA1289c266bcaccc5ec59b953452033be26d2b7ae1f
SHA25623476a389e8e6ac49045090a9b61d3a0acf1ac66e2e7e190944d5677cf2e1735
SHA5124203509e15e4b21c372db493535fcacdbd6f9ae3802de73d0dbfa69e5d34d16adb4739629d03fc23ab4e903bf9900d13edf7d33b847d682a134840a01a199554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5460c0d575eb1bb2e923941dd0f5df69c
SHA19f7aac9af0c5365787011d2add4e3e39d2af967c
SHA256f2b71fa3f247fa75726390657fdc654cdc9ad12da65622d382d21b40097d084d
SHA51243c26faa8b38beab332cfcc623f773687cd606b8ab436a31f686533091616b3dca61b8815b235c615012689c479eead1dcc1177638a712a6c22e486b855cb379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553f9850fa40102bf741b4fc2af831b1f
SHA1376af8dcc6bd54b8f9a65cc581f83ee643952728
SHA25620bddb4cd83fd7b85d4635c953717be6e3f7e4fd15986a25d729319b33155142
SHA512e0ed668424ed4571c581bd7da8943f303e9f4e03b6e1f9453c234a1e3297cb75a62feb7cdefcaca54aecd6a33f5efe61cd14a68b9e457cf50ff85936213fc204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5907050dc7afcfd77232a9bbce3c8e912
SHA173e788039fe0aab8ab85d627c2fb129a2a485a4e
SHA2564d5ecdbf37e9baca51bd076d68dad63e278e036b302bb77d2b482063b02a26a2
SHA51214e364e483e7911f0ad595705237c1ebc2664b7bd2566109b4f3aaf32a0452f87aa09e29c6df7862fab3d883bd0b1d09eeea0478e49495a3eb803c78ea35da60
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b