Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
55890b1d134154075271bd0b860cd2d8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55890b1d134154075271bd0b860cd2d8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
55890b1d134154075271bd0b860cd2d8_JaffaCakes118.exe
-
Size
42KB
-
MD5
55890b1d134154075271bd0b860cd2d8
-
SHA1
f50629248347c42c43dab378cc9963950da140d0
-
SHA256
02e235ccc12f14cfbffbe3abd8c79b2f53634cd6ebc39dda4c39e9b9b28bf604
-
SHA512
46a78634272127b9a8556fb6eb584141ab56b65ffd486d4566a6ac5eae84d77eaea77ab480c125d2a7c48a7d1006894c95f978e96dfecf649c996ce40e510fba
-
SSDEEP
768:MUBkQmoq5/DkgLTGLqWJ1W/SYEoTjerNDp4rZOawQfRZw7nwWXtRn:FGNQgLyw/SxoOZtIAabZAwW9Rn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2784 winlogon.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\winlogon.exe" 55890b1d134154075271bd0b860cd2d8_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\winlogon.exe 55890b1d134154075271bd0b860cd2d8_JaffaCakes118.exe File opened for modification C:\Windows\winlogon.exe 55890b1d134154075271bd0b860cd2d8_JaffaCakes118.exe File created C:\Windows\ie-zook.dll winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55890b1d134154075271bd0b860cd2d8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7148D551-8D0B-11EF-931E-C28ADB222BBA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f1b2481821db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000d8b4f1a90f1b75fe13fbc5e40722c2ec49330a525ab9f2b9909bc0c9da6c6388000000000e8000000002000020000000601b9254e83464a8cb865cf6d94ed5f44209ccdd4f587c0ccec8ce70fb62b3a42000000034019907206bd2d965fa9a548de4855b2194e4c50bcde0c12e0dae81ebcec8de400000007b794841221866e643ad59effa6343fcc2ee3333ba7eb7af6bc9de51bbbccb6cafc904f08b10cb5a72f9823dcf2ad19752531e609dc2e387716c7ce09eda60a2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1152 55890b1d134154075271bd0b860cd2d8_JaffaCakes118.exe Token: SeDebugPrivilege 2784 winlogon.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2784 1152 55890b1d134154075271bd0b860cd2d8_JaffaCakes118.exe 31 PID 1152 wrote to memory of 2784 1152 55890b1d134154075271bd0b860cd2d8_JaffaCakes118.exe 31 PID 1152 wrote to memory of 2784 1152 55890b1d134154075271bd0b860cd2d8_JaffaCakes118.exe 31 PID 1152 wrote to memory of 2784 1152 55890b1d134154075271bd0b860cd2d8_JaffaCakes118.exe 31 PID 2072 wrote to memory of 2712 2072 iexplore.exe 33 PID 2072 wrote to memory of 2712 2072 iexplore.exe 33 PID 2072 wrote to memory of 2712 2072 iexplore.exe 33 PID 2072 wrote to memory of 2712 2072 iexplore.exe 33 PID 2072 wrote to memory of 444 2072 iexplore.exe 35 PID 2072 wrote to memory of 444 2072 iexplore.exe 35 PID 2072 wrote to memory of 444 2072 iexplore.exe 35 PID 2072 wrote to memory of 444 2072 iexplore.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\55890b1d134154075271bd0b860cd2d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\55890b1d134154075271bd0b860cd2d8_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\winlogon.exe"C:\Windows\winlogon.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:209933 /prefetch:22⤵PID:444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5119968bf94da51befc8a5275fe19c669
SHA1dce4dad062f023865434e2ed892a79fbb66fd05e
SHA256fd9a140d83f9e52f097b99ba6667822818efae37539c6dc2601f582c200a45d3
SHA512f9978fd4134afa5a8fb87230092829fdb8c1c2c8fc33f5ded68c3f498bddf347c65ff69e841b19e9162eb53a61b038c54524fc8b68217dbe1e529559d68f1383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3ec1438ef75f58da7a47598335e7b6f
SHA1ababb9a8aeb524638873c4fc513895f52e4c0d39
SHA256362b5314b916c643b561706fc0d37bd00d755e5aa687bbd49528c6d044eb9fa1
SHA512cbc07e0db153f78ace1fac2f5ba5526237e3b8565118d853f856f764ed7fafdb014422e77d25dc9047128dfe8f31661ad01164f021bb0a589e92603d7da47759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d436c572605bcc5a03c7fc7bc4531c44
SHA1de1f36c1b40b1540423eb19facdbb6aca1f6f095
SHA256f04cee52ffba18a38b4296fd82081967305f88a572b79d955d8df4bdad4ea062
SHA51238d2a51af2c30963401db60eb398422e9856980817b19b5648e296f8ac0cd01177c6c1da92001bd0c0b0fc4fbad0cce31d1ae759db43cbb1fdef3a25eae62d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8c67ffcb234ec025885bc3ac6684d30
SHA1e5b5ced202c21d7025445400b1baf6b24aa5cc6a
SHA256e82ee9f196f2896d923243b0854be9c6cb82a906be6ecab29ec0f83225106b7a
SHA51223f5c973ae4cf9e3ec775b8fa277b3b4ac0a0859b728631880327ab61bb58df912a097cc3dbb42c029eb2be89dc5dcb7b67c8cb502fd86c0bc126efedb378944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592830692874d1d8f503d5fcda5113ad6
SHA1ce2f799cb9e12097382d8ad7c0c462f3a5b15e6e
SHA256c2c71bbe1bb895ed56f9be6df22e8222e8e8f53d5eb64ba8323222c65f3dc801
SHA512ac862528403a7d15b8161a1cce95f1217169c899057571891ec63d4cb76bc3bd64c0954b1e5f4396f49499ecdcc5c932dd84017dafdb10b90618ccca2656fac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cde73d4c6498a10499d806ea6a54f3a6
SHA10a4177bc15a729f986c20bee1be68e04fb39e793
SHA256dfdf8c6d6c0a49a4fc181f68ecc880ac62bf55ff50867bc1dfe933b53703c570
SHA5121f68379a1b0bc672e7c589eab045ddf73f464e866d56262ebd9bfbe9d114f5acb85165ccf4ef2d473c2e7dda8a5dd112bdb2814cdd0258c927eec027b1e7aefa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542594fd80436db7dfc715e8af89c4174
SHA19274de1b64a198b708db04b1ae3c08729f4c9b91
SHA2569d522e621ef61ee59d142224e643e038ab0bdf1796a6c90c80a9bdf371f23dc6
SHA512a244bd06e8fa5277a35857a17c2cea6abdde284a1fdca24f03f5abd9900510caf1cad441ef9743243407291ca60c0da8715e1101fb55c827c50fec8f7d0e9d7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f831714ed70c25c5f32074f9102a1fc
SHA1276fc9ed48d629740fa47494279104ffdfda8c05
SHA256795365d70583e774742a58f6235eaf2ebf62fb18dd42c47cfc8da826e207997c
SHA512cef6b51129ad0b369ae8a48d5c7f385b32f807a670263125c8d12b63ff7196c63d51c7e8343f4c3c35dd44b3cf7d70a0665b0f1ac58063dcdb07014cae2b2baa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5854d1a5c9b6d97d3894853965b7875f9
SHA1d82dc08c575b25eeacef471ceae8a34209277ca9
SHA2561f493992f2a2a4a04bef6bc6331e61e35260d0c36001d89a86722f7c18a4dbb1
SHA51218fa23d75cc5811cac2e8838a39dfa805ef8f8cbb2395ba80e3a817426ea05910bcad07fa50c5ba5416c70869bf16a646f9724b5ad58e65d47631560e383ae51
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
42KB
MD555890b1d134154075271bd0b860cd2d8
SHA1f50629248347c42c43dab378cc9963950da140d0
SHA25602e235ccc12f14cfbffbe3abd8c79b2f53634cd6ebc39dda4c39e9b9b28bf604
SHA51246a78634272127b9a8556fb6eb584141ab56b65ffd486d4566a6ac5eae84d77eaea77ab480c125d2a7c48a7d1006894c95f978e96dfecf649c996ce40e510fba