Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
14b86c3789f4d0693e2eb16c7f2ccf24_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14b86c3789f4d0693e2eb16c7f2ccf24_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
14b86c3789f4d0693e2eb16c7f2ccf24_JaffaCakes118.exe
-
Size
4KB
-
MD5
14b86c3789f4d0693e2eb16c7f2ccf24
-
SHA1
1937719eaf54770dedefe403f00e490683252203
-
SHA256
e9f024687d8e0a76e2cdf6feeeb34650ecab74781b0b1805014fc936fa9693fb
-
SHA512
b66229007bdfbb84e0632441ae233bc9bbd0469792b1350364455a7aa7019380ae56c17153d1b8332bc91d00dbe2103aabdb994761c084ed1b2b77db5414ceb5
-
SSDEEP
96:meTOQska/XzqPKJULwl0YOqBKT558T7jQ6IVY6WnKjsBNO:meK/XXzq/LwG6a/u76VY9Kj0NO
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14b86c3789f4d0693e2eb16c7f2ccf24_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000002c19340f176e95b76e414f096a857b50fb447b8fa0862dd27e7be83835b37e8c000000000e80000000020000200000007dd5391365de633a48d61880b1b75c60d92c008750b8de7b71eeee40efd7837720000000169195a2fcd093d90844748a54b086c90d78ec0e29f65faaa8c13e04075cf3d540000000679b377fb6d0b2311591610d31b2edda430cb9130d36da63eae086605c1cf05bc04525f891da3348a9c99119b403ff0c44f9e4d2a0fe66fa901741021fa218d2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c06cc20d9716db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000a46a83375e54cf01337937938a6b8cb4fa25760f87205f7633d5bea270173368000000000e80000000020000200000005ea5e3b2fe5e28295e6347cda2e3e9e675ac5bd76f744a93547f3475f114d6ea9000000065c4236b2d42b4ba146877fdf4203ba4b0b63ff5787204efb4ee1b941aee768573d7b191b57d795b50efa3c4c01663c178eb1762e1ef0933a69b2084c00bfaeb12725bf9185f50ab147745a5fc6173a4ecef79c852057e5285c1cb1ccb99547b650d25a4bafae9db447233e4e0ba12548f9ba1412bc2f30af20d4de74c3f859355b453300d6522cf995cfa9ea54c9b57400000009098841f4ddd91372c1b59287a06950e03512957f5a875299904bfe50cb4e01ac4c785ff3167340c15090b59884957b17bb540682cb7863fcd57c9cceec320a5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{349674E1-828A-11EF-A7E8-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://yahoo.com/" 14b86c3789f4d0693e2eb16c7f2ccf24_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://go.microsoft.com/fwlink/?LinkId=69157" 14b86c3789f4d0693e2eb16c7f2ccf24_JaffaCakes118.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\C:\Windows\259443921.bat 14b86c3789f4d0693e2eb16c7f2ccf24_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2068 14b86c3789f4d0693e2eb16c7f2ccf24_JaffaCakes118.exe 2068 14b86c3789f4d0693e2eb16c7f2ccf24_JaffaCakes118.exe 2068 14b86c3789f4d0693e2eb16c7f2ccf24_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2068 14b86c3789f4d0693e2eb16c7f2ccf24_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2376 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2376 iexplore.exe 2376 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2680 2376 iexplore.exe 32 PID 2376 wrote to memory of 2680 2376 iexplore.exe 32 PID 2376 wrote to memory of 2680 2376 iexplore.exe 32 PID 2376 wrote to memory of 2680 2376 iexplore.exe 32 PID 2376 wrote to memory of 2156 2376 iexplore.exe 34 PID 2376 wrote to memory of 2156 2376 iexplore.exe 34 PID 2376 wrote to memory of 2156 2376 iexplore.exe 34 PID 2376 wrote to memory of 2156 2376 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\14b86c3789f4d0693e2eb16c7f2ccf24_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14b86c3789f4d0693e2eb16c7f2ccf24_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer start page
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:406541 /prefetch:22⤵PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aedff1642c1e396a0afddb3dac7a723c
SHA184684002459e21acb84faaef489525bd88243fc0
SHA256121b18a1b8431fc1b0daa8ed63fbead777238194480529100217afa2646a2460
SHA512caf771b116eb9954058618ec1f9eb0271a2cc294f6d05b53ec8bade831128d4abd2ce7e75fc31b7f2527e17c57eeb2cfc8779678f0cd37ca0301f49f5d0af800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c84f2c9cbdc07f139ed72f49ce6b6d8d
SHA1358c22470bb3ce86996ce0c13a3363b6b184ea1f
SHA256fcacdbbf1fa100bc749b64a034dae57ab1b9f2d00e6c077c1c705f24d234249e
SHA51286e3edf4f143c5253a2dba0a714459179c71da5338b6827e0e112b66ae3c3bfa81df2886c3ded92c4631c78c1ad470648ea2144a6b08c843faa6ee18892aefa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f10194e4f88391cedc1e36523d2f6fc
SHA1765b48c4631a148c5aaf02771a7446a5aba772e2
SHA25670514f34c41d0f8aa6b719576e22389d13dc92813f89537c7ded3e3764d8992b
SHA5122ec7521158f7e5c467b0864e11aa18a37d2dfa50dd8a422ac73979da2826cd59d654e10401a8b3a7cbd54e14fff0069dddcf6155843b2d531dab8900af2b2a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aa66f678dbed8a6f5c5c90b51c0eb01
SHA1effdded31ae9c32c1da813987ae147862fd900c3
SHA2560590fab69c5c6219cb882b4e997c358d1531b87100edc5aaca35f5678ce3e2e8
SHA51240d06c1b02b37041bde4085b07ef337f63500dfc87d81fcc9dbd0fa7aa68d915f42bdf44dfdfc599d81656c60fbe42bbe8115d7acef95405ee228bf9ded5c695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ff415d22e95b935db63355c8341ab3e
SHA10b45b4d93806c9e3b2ce3608249098de7c8ebf27
SHA25664d0794a9694ffc1e44eeb07004a2ec80f03f9a3e5861d0c75d052dfa195fcc8
SHA5125f8d97a4d2adca21c56d3db73ee38b12080d8a6d2f5babce50379ed4fe83800c7619d9abd6ca60359c951159d90cab3540bd53c1fa31ffe8323d515fcc1032e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b731caf2ca517335299995e4dd00ebee
SHA110a0fd30789e4239d4eec150a7a203fb32a3eb72
SHA2562953bb39cd5aacf66745a14f432c8ce7fc1c99e797a0997f8729af2b92956434
SHA512ada4fd03b42f3e58011bc7ecf2ed0962f7779de2f9090df89fabb518c3071dc3bb57495b56250e96c4f41e077cea5087608e4ba9224b4f82ae7a24207c7bd88d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc82a85759c537cdb35b0d90a11a9211
SHA1a8bcc4615939868d7dfed8055dd7c6cbfcd181db
SHA256992135cf75fdf387030cd02e616381812938051c0a39f9c673d6e83e3de25474
SHA512ff8f4bd1decbdaa1205d146347f6919ed35d9c37defbeccb3cff04ededc3337a79a816664a68f7d614d8dc4876a94de2ef254eb6e0327a25517f581323d18379
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b