Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 11:24
Static task
static1
Behavioral task
behavioral1
Sample
dc3bf6666966013e986ff6eb7dc254a8_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
dc3bf6666966013e986ff6eb7dc254a8_JaffaCakes118.exe
-
Size
269KB
-
MD5
dc3bf6666966013e986ff6eb7dc254a8
-
SHA1
21b2955028a9f2bc83312d53e5288a5e014c1b30
-
SHA256
f1a3fe00c51a8c1a15dd013764221bc2005d527aa6f0e977f6b177255c5cc33f
-
SHA512
47400c08fcbdb4daf60a3105f7952c0fa10289d18a9cc7099734af6bb1a9a82aa7b349d4fb336a20743a0f4798edd5a86602e84029e6b24a69a4202ee2f29212
-
SSDEEP
6144:cVfmmDgASD5W/adCxsT4/YFqBcIsBGOhN/35:cVfjDmtW/adCC4/UIsBhN/5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3151
zardinglog.com
sycingshbo.com
imminesenc.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc3bf6666966013e986ff6eb7dc254a8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432302132" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 605d48670605db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000012b600106aba779959c8907847d72b74c70dcf3cf1c9bcb842fa3268c9b6a720000000000e8000000002000020000000a9e9e1dc3908a10a5122f3d72a32e1a54a83c8503efbe9c2b12075516c653eb620000000b77b03842fbfaf60c9f64c16afe99a93fb3dc03d25b62862812afde9e55c2c504000000089311fe3f7941bcb189881f98d03fc6ae2697f7d61e6798ad6a960a4a67e9c5da01fe63e594e3a26fa22dede3e71997eae106e49b2137eee29b6aa694a889499 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{90E691A1-70F9-11EF-9FB8-523A95B0E536} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2740 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2740 iexplore.exe 2740 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2684 2740 iexplore.exe 33 PID 2740 wrote to memory of 2684 2740 iexplore.exe 33 PID 2740 wrote to memory of 2684 2740 iexplore.exe 33 PID 2740 wrote to memory of 2684 2740 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc3bf6666966013e986ff6eb7dc254a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc3bf6666966013e986ff6eb7dc254a8_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2320
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520d01ae893649a357fa9bd523598fe55
SHA1672f58c81e3645aa44e614fe17cdab5835e735af
SHA2564d2f70749a549e1f33ef1a025914c54ae4aaef49ef0ef019e0c55641dc4bc039
SHA512a1d0f403cafdc3a576080f72eea01073afa078dcd90331eb91adf1df6a794f0e14d91cb77a1c67e93fed92a7c0aa2a00622fbb82a0fa1cbb27e9110fe016fcef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf2fa1a6ffd6b29b3e838dffa128439f
SHA1d7b1908f498ed57e20eea188dac0b975de044589
SHA25668c0af387b926371b984fb94da71d507af227fca9ac3cd81ba78810a5dbf9585
SHA512dab404d7c18bb75ad0dc9008b3fa7a83baf7f0c493ad77bda5d375b0b2c4fe11b1ca8e8306200ce8db8e6157c4e8c726404bc66669e311f3a28f3285f9bbf9b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b7976f69cc1efcec3db58513f8cb2e7
SHA12efd5f482551e5e04b75c98df322cf103bd367ff
SHA2569c801d998bd31955d8e5bc9d9565d0626bdd96ee13d2417c5f934ceab97e2332
SHA51241b250c6608abbf39fff6ac965d14c2be21e9119ef8bea8785701ef6323b8dba7f1dc0aafd985ccf162d9b00a756b9649ea1054ccab3c7f8fea98a44dd87bc2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ad205f875b2fe773eaa662ac17797c0
SHA1f6403b0e48c7e194b876bcae0815c6a1b76fc7d7
SHA256bb61b658c869baf7b9452ce107f975ccd5c5f4237ecfa1f17e2e14bc469b4a70
SHA5121148fb379e9c3416da744a37bb9fd48bb8a36a79b6db17a8bcaedb4a2d3b0297c48c483374b3774ac7cd57cb6d69c06f064ab70c208499d2bf48e318b89990b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5186f8281152888c928f201635c1e87dc
SHA1c8e308c62257759e3548f4fa5614610af40aaa3d
SHA256cc894d22ff64249245b60e3eec8b34f550c808d471d95ab5e3148b7860fb50fa
SHA512be62153b03b9048a0a919adb6fd26cc772312a9d145fc8d957c820c5c16c415751f2c40334d0c7417d5da8ab70c0610af016a9038c3bcb994376cf569771e9f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d3be1b1cb6783f8e44ad411a30cba0f
SHA17179a334b2e7f7026739fa917c5174b433b605b7
SHA256f0aa96ae4565b202d839fc3a0e6684163a41b975459498a76fd9791c359be46d
SHA512d639d3be39e63a44a15994944924f32d4d574f8ba6cf717f472def16576a61b8a2aa89b71b651f8bc96c9990a6fbaecb39d6147d85ab7022d0c47d58cdb58220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509b079caf03af757d6e135039a1000b6
SHA113ae4fee1c64ee9bbcaeb16bbd7520fdf29dc494
SHA256ae150e07a3d8487d63710a11c4ae091735963dc0cb5229ba1a17ea6a3612f059
SHA512c4574777f87dafd6d3001773fcb98cd795c4f4c1d329a715ea614394b20c875525c860171b69dbf750cc6db0cfbfc5319a8ac7ad2205894f8460c6daa03a1ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d1b577205f65e251081804f56afec28
SHA1a79c3b4204f1417f9b1f1a53a13c3a52447c353b
SHA256eb7ffd41ced7947664d6d14c7b312051a940ab26c4264dca1018ee4430b474c5
SHA512d377bb74c93865576f6df18e25323933aac111c4922abc91c33d9cb61b05749729331b2751902eaac296545d163c18f817cabcf82649218de3151c17648c62e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587f76d7a809d7ac69dbd1c89ddbd57de
SHA1dcb1d9194f79ab7ef03d262002b1d00f25f5f4c6
SHA256d2b86797a1e06da576f4e7617475095bd7b4ecece59a65c239af5321abbc3402
SHA5121ce4ddac4a7165d23038d2eb8dcb9f0061514e922b7e955ca1cbc11b8e0b99cff1bb96f75b632d15c86a1726e0310b34fdc43e659685c4094a780746ee247659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eccb319614bb8d6291299a4e45d5479d
SHA1a32923c6623f46368f663ca6bc82f9652f5de6ce
SHA256dbd8b0c7ab95c1b341b3c7593687169b2735264ce2987eec83dd9babd41afd66
SHA5123d8b0c343b5d07ab9e405560ceebec8238a70c34004bd9415c53df577364a51ef25179a934180023cd1e797f1eb7976a0b7fd76147c659c2ebe759dc9095fc25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a36584619d874c056933ad454d6843d9
SHA1135bb94214a927391e6e583ac85870890620f6be
SHA256df53574ff13ad50289eed4dc2eef3c41f7273f4e9af060b7729d4a0f9be72d58
SHA512e3a69aeb26f0bc4b3e6a6ec66605a0ac3b74b9f521b932dc99ec2136754e78b3483b3c6383b5ac72a884dec1ee92ae4003b771e05fb11934cf6e91f9178a2ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505a12afe3dcca6d7cc03e184dd6c7d56
SHA163c12772a6413b4ebd90ae3717da902b92303497
SHA2560fc5308a306982f39f3afaff45299ee10f468cf1f467de7bd0641c38d2c24e5e
SHA512ae5c75c568899564a8c17f8e77a02b24fd6553164f4335295b7b3d30402fce51e4a939e58f1e094b953eaf36bfe161327593f79a09d4eb52c6ca6a18d19e307d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f6756ec7b5a4c5a52c242742f6c4215
SHA18985f25b80707e44f11bcc0e5ffd497e368880ca
SHA256275ea2c7643c220cc0d1b48d2bbf73bea37ac57a6fe65b3472dd5b4f29bd7edb
SHA512235cee02013cd7ea0ca3187256226ecb6e56e6d8f27ec110945723654f39768ec339c9d3a70bf1067076792a695068f9d583395b745c905804fc82aac9a18665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a003bf1e761e8b39a0561d727978f68b
SHA1adce95d1c273c2b3f74d6b99efe5a97c77dd1381
SHA256841c5b113189973a25574f4740a105f31d5beeddf66b05652a14c6ec0a310238
SHA51228b49bb05bf71e2ced19a07ad2c589f478ac9839371558c198da780f7c67f6653286d3fb1028aec3d312d53a2aa806998effe8666ef84802f08fa74b1008d5a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a420ddb6950a4bf77ce4949b0a2d4915
SHA1fcb0b911dd12da04d22b4b39a5e33ad5d5720f7b
SHA2563acb98725d233f1ab567fe1bde48f39633cb7dc24bb5979687f9944bb039c50f
SHA512fa0ffd9039d612a1c7a92116e23ab8af88c94e063c14b7f440144747ddcbcc152da657cb79fdd63dded854dec6c41e6d051f74cbb4d45df5a271e2e6296fb69e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51661fb5714ec98a4aed9a4e6aaa33357
SHA1b8ae0ca461a877bbeea6101c377b9ecb5c4a629e
SHA2561568a04c58935401d018fd4ec7aaaec49cb6a2ae4acdd735cafdaabf2db428a2
SHA51240b08dd83a0b593d310a4efa64d91bb069eea6ac6a4e6173c6df47577bbf2bf31886983940dbfee4dba1d9930657a5b1f3e9dae8d72a3669ab4c0aa47bd343c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553edd7bc3367b82158c15704c57a598d
SHA111a5d840af6576392e4e62b5f0b7d97f9bb484c9
SHA2565d6a730161df6f528b26091d7e42559eba715606f87b5e80f9b883c6516d23f0
SHA512c8a19337933d20dc03dceb39c2b401efa482bb57ad04ebf6097203a6764f4f3d9051bb0044095b88be67f3ae23a8a214cfb50505d03e2be398895da7a074da49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562d7678977979ad1fc59082e845e6c04
SHA118a1def01e87dcb80995b864b50166905a1645e9
SHA256b60dcae92ab7df2911469997a136dabe90c63c11312923e33f866f7a2dbfb34b
SHA512620bb333f838b13ff1aecdcc3f3783fc1b5125538ecf5542515b53a832a95aaa610474c32d3d42cef62993efc582a79f615eebfd6d0eae0336cdaa90c7c4c49a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e686b02e01a962b67788e4c890e5459b
SHA18b78792d3560fd3acd375b55633c1ba4fb66372a
SHA2567d2167cf217e9bb141f771f729a57202cfc8d9ce63f43fecf37600304d91586b
SHA512535e978e44a2b28acd69e8a87e4c6e9c3f365331d7503b4f30f899522da65fcafde082edbbc030da81a65c8286998e658ba68e889f4e3c6d47d944d80cd59d25
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b