Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 13:11
Behavioral task
behavioral1
Sample
fa76f971c9691516db11d8c19e7956fd_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
fa76f971c9691516db11d8c19e7956fd_JaffaCakes118.exe
-
Size
13KB
-
MD5
fa76f971c9691516db11d8c19e7956fd
-
SHA1
ecd1008c5085368868dbddda7e6b45a396312b24
-
SHA256
c15ac70a4733b660b631997be6fa2fa9b19359bb9c11452305914c81f1427a8b
-
SHA512
41ba0d397c729dad7d83a3ac93a657fe2bccd03cfd1dc94c30a03dd9d2ea389d1d12c36a38f1e52970954e5e89dc56fa8107e9b031793d0daa0866532955e8be
-
SSDEEP
192:Q4yXWUK0o6TEGkwv7E6oQtDzr9ZCspE+TMwrRmK+vhOrw:Am7AY87NoReM4m1
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2296-0-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2296-2-0x0000000000400000-0x0000000000408000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa76f971c9691516db11d8c19e7956fd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000469df3612c7daba8d0b6526a2b07f3994f5684fc3abf3ecdc321589fa31d5c22000000000e800000000200002000000079ee40ade9b03413de486c9f31145e525995d1d0712026c4cb68edc7bf8fa062200000004de1c41c356df4bf324679fa4e679af4f36834db1dadcd7e50bf4810ce037a0c40000000b6678a0cde79ae6b07019d922e007eaa44108dd49078cdd4b937332ccb2c175c27e93236bc8687fa6cfdbaeabce3bec4734ce6a8b577314f1f451d3989a130bd iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40dbdbebde10db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433604602" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{12EB5DF1-7CD2-11EF-BDFE-E649859EC46C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2296 fa76f971c9691516db11d8c19e7956fd_JaffaCakes118.exe 2008 iexplore.exe 2008 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2008 2296 fa76f971c9691516db11d8c19e7956fd_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2008 2296 fa76f971c9691516db11d8c19e7956fd_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2008 2296 fa76f971c9691516db11d8c19e7956fd_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2008 2296 fa76f971c9691516db11d8c19e7956fd_JaffaCakes118.exe 30 PID 2008 wrote to memory of 2388 2008 iexplore.exe 31 PID 2008 wrote to memory of 2388 2008 iexplore.exe 31 PID 2008 wrote to memory of 2388 2008 iexplore.exe 31 PID 2008 wrote to memory of 2388 2008 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa76f971c9691516db11d8c19e7956fd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa76f971c9691516db11d8c19e7956fd_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://ads.eorezo.com/cgi-bin/advert/getads?did=4332⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51949b60359970b1dcb0b8f0ebfd33f3f
SHA17dd5eefd79d226e8b03dbc42308bad61836e862f
SHA256d93c8892217aa700a20fe4b130f264f9b0b4a0a9d3193d8be310ccd07800adf5
SHA5129696ec0ad59615383d65b78ee105ffdede202f6b7ec6e14d924b9d8e7994575aefa53ed5ba0776a4a1332e082a19426aad439e4caac9b6aceec27ada2b6ba717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5384d94dc71273beb2bbc6bdd7a97890d
SHA1551cd815f8b63c9087cba612dda41773aa4a18de
SHA2563b7ec3156af7a009d31116e0bfe74df5a47ca62110c17b23192333afcdc411db
SHA51286c6e9ed70ea9f295bb4c9e679f7de63eab59b908e4fbb5d938550fc1c990d5492aaea552e4050d104660886b4fe4fdd5c611af3507c778c604399e6f6b79c9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5852fbe73e1a44746d2f8cecc24048b11
SHA14e2c4016aa03f968584522fd385dab9ba4211d41
SHA2567b9020372021da8c0dac4b6038057f8c140456d67cc022d36d480f00d05d3d64
SHA5126aa13698e0909fbd499b25cbc98dde5ddf65ce1869479f3975506869ee46fbc2fdbdffc4e51c4439ef372a45b2b9f65482f7b6fc31139ae4f4b378c8d627f14e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523d88d5997a86662d729a8a8795411da
SHA13bda7992a2e4a754e324e9b16ce571fb19d98c1c
SHA256b8286fa4c46ce84ec3ee73bdc822dd4e384c65eca9d5dfdbbad837a04884aa7e
SHA512254753e739c359f1fa3ae341fee37c82a7d0c01ccc70235b8db879ce02de07401916e0d779af67bd2286b43873ac76b137094247c205825c3297d1e402f2327a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5155f886bf6288f859963c46b386428e4
SHA12aa3e14594b491494d0ac6d0ff09c9fdafd59b0a
SHA256dbf844d9eacaf70899f99ec4a4acc9dab1262e92431e25c457ba63e3e29c19b5
SHA51258f9efba876692fac83c4408d9540f04b70e2fe70d821426903cd6c257e8a4a3cef1cb0bae429805d0b39e9b9b61f875eaab512a852c03f79dc637fe693b6b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca9d40ceaf8f6185afe285ffcaacca3d
SHA19f8193a184e022eaa9417293787f48c4a3258759
SHA2567e361b2d81bac0ef14cbcae3b95fece380f6ac11c3db2cc4d538bca59471bb17
SHA512cd090813ce06bd294f1547553f293c6298633fdaad205d4dee8d56e0b006bfbd53cf9117668ed86ed7483fe84ce524b893e2a45aee8aa1fdf20f9a5e3cf448bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b497e781b82ee4e4914f140235bd44cc
SHA105215302103563d86737fbeb25582356fa76be18
SHA256898aeea96fef561cd3bac6f726dd1e38ce17cc5d3ef9965a448717c19f669f0f
SHA512af727dd17cb041842ef61b464220fc0cd0addabd8451129c82aba0a5528db4db75b716a633339b139e21be7e3201fd0cb2f4dfda79c9227bbd9af089de3ee6d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d530bfd5a91c18dbb9f4a41bbf667e1
SHA1de4d1a2c5eeb9578c80073bba9e27faf7c1de19b
SHA25623d3341301d712b06a8a84bbd775232d92669fe944442b227bad30d8ba3d6bae
SHA5129c9a77a4efd59c4e37b1c3b6b60c9da24ae5088c02febc6fd12dcbbfa85ece8c816437046fba5e6a72000e1524adae63b61b902790da2b0f872073fcdb6dd460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50805ff0ecb705995b54e7fcfc787e59b
SHA1bedbad74d833e3a3d2047f82022f56da6fee42ee
SHA256ce88761fa855989e0c456d08ee4856d843206d9b3f5259add852ae96d7201fb5
SHA512c36255027c0c95b27a17aaae5184b5520f9302390b3bcb6b7d196add43e8ff7b41ae6aaf960dd528f336b098865039dc009f75364fa0c97a1d0f40a4e3459ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b224388f43f080b837bafcc5dc708db8
SHA1045ee98d09d5270310beb646d712ed08a036aeab
SHA2569551740967dd3b1956e6b747162afa7bc268dc08cacdf2a2e1714b42f7592ee2
SHA512eb1461024bbce3cb01f0f31b5115741f5219ad4bf207338bfe56ec591bed88ea6a9b55cbb92e38064784e61b9c13bd0048ab11503f6bbaef045fafb25edd4036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2185ccd32ab309e4901fe48c542e55a
SHA15ce51ec309d35a4c8a2c31b833b6eb9c09e04568
SHA2561e0227b99703e19feac7a076fd8c7476bf45cd06a3eb2608a8fd8a49a0f058f1
SHA5125076ccabd00a0399c71c16270280b47129124d8569fadf17f295f073797a6361f426c8ec92514c6b97dc3ac358409b3d8ebf2c0743ea49d7dee6db59992bcb45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a6c04c13796fb626279938e34581da5
SHA1f5e7db56fb4c72c4d159a84f4757cb755022859a
SHA256fd96ef5bce6d74243ea0e2c1b21a5bc5cda90dd2437484679368567cd82392ec
SHA512dafe43be6f16251bfa7a31efea649395499824d177a0b689a68773f53388e194ecdb87bd2e486abd5193444f609173156bf623bf8ebb25587295a4b02b44043e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e95e2ef55b7d6c171cb0b15b26ac8f44
SHA1f7488c4cffc789fc3bc77a59edad8536c5d73034
SHA256e8f5740dfa216a160ca906c556689ff4fddc4278f55e96b1282ca9c4788d3bc4
SHA512e663e7d5c775e9ccfd19e4150dfc44c6db5c9f1efea4a67ad6173bd182acffc1e57916b2965cbdf0ec33a9a0ee1596f8c3218781cab56247fb68e8f2c3100f3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574a33ea3afb8139f5fc064502f56ddc1
SHA1821acac836d7707fbf30a898d39ada94c8972ab6
SHA256484c0639c1dd940710e623ed8bafe31fbb429c471fbc1e2020977038e47133bd
SHA5120fb68c18ea37029a42b3a27cfb72402792bf8cf12dd2b940f0bf4c56990acbc4883bfe0f2128d4dce1cc1eb8b53b5532883356029958d0f9cfbee475e75f5c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506f504c2d81af698d4a785204f8f1c61
SHA1ce3528f2108485f2d82205aa01a1d803324d7151
SHA2569bc6d2146852cb04918912d99fd0b5819c3f0d1da8d835688e21fde85399ce53
SHA5127a70a6bd59a157f4d7c4356a2826887ed898e796440a4b73e940743a0dbf3b76166ec060baae01db0fd3ad2d7d1c7bb2cd75fc9b00a535c88c4f85bc9c5b899b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581220027b7673713500e8577adce8b04
SHA1331cb82af79bc520868cd30027c54f38424a18f3
SHA2567eb8409f9b9208d41f1236499868c3a70dd1852440a302deb733059322f1a322
SHA512fd84b85715c460733b8e5b011a460454303dbae79e3e71e78eefd25a6bfbf4971fdc02cf586f46c6c02eb6d8df15a761f5d60ad2b7a13442bcec108482751f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4f6093a388d6de2b289318d15a476f5
SHA1033fe36c06a38032efdde441ffa69e771f9b9903
SHA25636891d1086a2f38af0e6c09aa469d24a1c4e331f2534939717a7e69b4adb1b28
SHA512c627c8033a37deef36fbd9c007bc6cc17ff828780a17bf383e33f808b075545eb4f0cd4bdac424a31c4c78cd35a5d2591fb06b777725bc961d60d82f4a1ec456
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b