Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
6fdebcd4f78c01dda9fa9e2789c4f30e_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6fdebcd4f78c01dda9fa9e2789c4f30e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6fdebcd4f78c01dda9fa9e2789c4f30e_JaffaCakes118.html
-
Size
1KB
-
MD5
6fdebcd4f78c01dda9fa9e2789c4f30e
-
SHA1
d99fbfe7ae1d6faef250b29fde542d98009bcf8c
-
SHA256
4d00aaa608113e6d3e4a9b5862d767b225767017cd34c93f803997e071287865
-
SHA512
b1f41ac81ea567a63dc0521e6ef837fc2c4cdb40c927a421ac92f01dd46438d5b0a7fe2b423ea7c73c692c5fefc6e05d2416554f512b66b1755f6be0f9c5b450
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e04fe8139bdeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A2A1A81-4A8E-11EF-A037-6A4552514C55} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428077887" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b000000000200000000001066000000010000200000005eb74d33d9c2e3e446ac8bb1b8e809ef7ac121f086c4ea2d6ab8294d74300601000000000e80000000020000200000006a6ede1218f049df60bb63445fe7a9dab13ac5e4470b9483eee0dcea20d1fea120000000a002f772ae44b7be24aa66014ecae5cb25d0d62d1ad4ba0c9b97438bb87e6b0440000000aee587cc8d32c06364cc38d8235b08c073c86f4c9eda376c15308c2668ab63376aee30e71069c8e9480cf086318e0bd2daf38406064aa968d7be1e23dafcc234 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2328 1656 iexplore.exe 30 PID 1656 wrote to memory of 2328 1656 iexplore.exe 30 PID 1656 wrote to memory of 2328 1656 iexplore.exe 30 PID 1656 wrote to memory of 2328 1656 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6fdebcd4f78c01dda9fa9e2789c4f30e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5accb9a2268e664a8716e15b6adf5c84a
SHA1bb865c9989f0178c768626652564dbfe51c30d8d
SHA2561652d3351c3aee82335d512e264f7367c54e718f780abeefc66ad502b31d1b70
SHA5122924f377281eab8e0671d595ecfa894b6d5d5f7edf37e11bb5781f622e16ef061db6391530777546e232048f97f06b8f20121cd59ed9a957b3368f8677b5411c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5365e02503cd113f696ac86311390f22b
SHA1e8cde055062fbe55434f4a3a3e9785e706a85c06
SHA256a281f8ec3010f1b50c75d6531612076d7b4f9f8f37c65fd0e0d54a2ec093d3eb
SHA5122e6ba9e1609dd82d7d63bb70acb131ce6109e4c951ccb60dcf03dce7214ea634f718926e4fda0d0c22e2a50e69d9d3a3c029fc38471115a83a0329da39cb6698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5220aed7f2bf9391b2307a000992fd06d
SHA1a702d0e27403cd01fa4c44b096a1be9016983770
SHA256ea7d7acdc546393bbfd30e3cd386908b9312ab991ba6d5916f86153201656c7e
SHA5123471f09e9e008037feb3df48786ca5d6864f2827c7f9a67f87c056eb6de88d4472aa9dd1cdb557d027feb8826b1910e0d5dcc1bc9488975d5071f25335bb6aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d3da7f6f2cb78e6f8cdad9dc2cb08be
SHA11de5f9c4f2f571991bb4f09022963fe445ccd15f
SHA256a10f47449bcddf87e80873a95433b2e347970c061a768567dbe1e9c8019b91c0
SHA512d8b95eec0f4ba9c7c4c4fce89d71b9a4da2e9a473da9a37d48c4b7e10277ea61fc66205d4181f66fe0bfe7c4af64b9d5dd85c29445df4e437dae3c93e4596d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b84af5ab93899b9e621da94e3ec17311
SHA1f7e9f365a0facbd4b557cdf17a112e424785acf5
SHA25694a8ace339eb5cadc409576a00e94479fa2e8033ff957ff7870925362c7aedec
SHA5125e1b6810addf41fec0052d734d8de07c8c61766d39b49f2f0ae2f81cb2f1aebb6ed5bafcf27c957e931cafeae9544ad799ec89db2ea6bba48e2b015c0c2d0861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56800ae577695c934338e156c503f1b0a
SHA1bd5ae7760d9b2262fd8607ff116e903d21c2c314
SHA25673a7bacbe9c9d4d12c1bfb19c85e5d76e5f3a708be1c933a450c10dc37debf9a
SHA5127180b211ac296d9cca5ee7132f29f202f52a770d258e174e77be434184dd5c70753a7a09ecff2edb9c0ebf9f5c9f27b98fb05e34ed3ca6e89ded965bd82b00d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eef2e80471b1d51b158f2b961a109c0
SHA13f46052e9d41678e9defec50e0dcc3cf00a2734c
SHA2560b9914cab7f49f173afed55ab2e3cba7ad21695939d53e9b9016ad10cf8c798e
SHA512d71262d3c72e593877b79d5c225c64ae881af33c955b7226514f1abaa007d31dd6036c6477360248b9a958f51fd2a10bff03ee4b88df5288357711b45be6b39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eddfa8c0074a25a1394e97e4daf6bbfd
SHA154c730dd50b46c930b150303c58b853a77519f50
SHA256b54c22d3e362965ed25a04a3eccc0dfa9c50f553fb560933a97a5bca8c2cd1f2
SHA5122d0ac1e8f3d62c32776ea4126c36ee8ade4d866cf53feb9950af7d943da248f5fc72569fe4f350a383e282a59b591e9aa3a685331fecbcfe2faa6ee70717bf9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad00965d8cee04a938498ec0cb76f6a2
SHA121f18f4e8d83ef82986e81221eeaca1915c8454d
SHA256c58aa3192c8c1f0bd3128e25771803b932b0e8b31ac51cd705c53637e9d315be
SHA512326a668588716a3ec40168fe413bea7485fdf9b6548780341a4246ba0d7d57a56aa888a030c7c9869fa458071101a9c0972e6924fcb6f43b9b9c918845b2bac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564af2e178892bb51e8414afab273f35e
SHA146a8345b8c89cc4cbe4bfafe8736780ad37d7a97
SHA2569d89ffeaeb684dbe16b320200ec1a9cd800d4e0a5222a7b9bfeeaa54e86a553e
SHA512dc11fdcbc9a8c85d6d38822ccc3051de92ae8983dde655a70ccf3e425a3251e958ae0854a19b677e836aff68e16f5140c94c352e0cfd112e67ea8c889edf6bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51287f11b9dd58b36e84d289e02e906e4
SHA142cf02d7e909e206a045428841ace6fbd66a84fe
SHA2566f391ca4773db2031c19c89f3279f22f2164abfa4d4ec6b5d43f350c9a407f24
SHA512da51daabb66c9d4bd6b042b860eaa2a0dec1a78857f9e7b2baf4275bfe04356812fa6b5716998f609ac1dbdcf1890247df942eb22ec48b9c59744d27d2207bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5a02b36d91bcada6a90d42d973a78d2
SHA196a33cdef45b7caaf1e96a498cba58c799771869
SHA256d0690def05a17bb78c5d0080503be599e510046f9569721a2dab5111154caf4d
SHA512b6960f409ee094c435171151376ed272f6fbd1babec9877cdb92e1dc9b232059ed8badc1f20689152dff82f430afb4318b5cf706d4c98f9c63d7e1f021caa2e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcad6a11accde4be7af21b55773fa98e
SHA106b01bed478e5b32762f6b5401ba9a2788f7a499
SHA2563d2bc5fab198d1b4171789d22a89fdddc713d88170cef949230c106f929086ec
SHA5122fbc03189cfdb987f4f96a3a270d2a995af8beb5d70aa199efa583a7d2b3d219ae25bb4ca4ad4ce6dff8bd2b0857c9c4c8f3be811d0a4c649a6925572286edea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0a72a1df9a83492a63e37fe183cebc7
SHA1ac8cff9c1c1624a3a40db8d66b07d4ede30ab4df
SHA256f604d05ddf419fd0fde3044977336ca10d7e6ca99b1406163b6f2de2197073d9
SHA51274d0e7bdb3ca45f76bc8305a5194b2909271d89d0d0beda41f5cafe0950aa3daf4b50cf1fc0ce2f5a15e66b254df9f95dd73bf1112ea322f1ea1c6019364b60e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540b1a26877018e6fa79ef55d9f08010f
SHA1ed1bf579b266a4c63e2330fca584a30831c99c2b
SHA256d206869fab7a11587396b5081a23d423c19fbca7a372ca20c724a44b4a30e22f
SHA5124b6278337b24aa58319cd28cf8062fb003528a55fc66172445cc142fe19678c161189489b0c385016ea800ac4b7bb54baa9eec7a33642140e393394e7242063d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c946c4ca7c205efea3e1df3b39199f17
SHA19316527b031ad2df8399dbcb6649ff9a03171053
SHA256900478fa85c7f2c6c0707265dddef0934d72301214de17cb0c01fc00fd3b998c
SHA51252a207c1a2107907336c663b40ee0a3480b63849c29032229e4340637a1a5f88425414f9cc9af601301fe7f847c8904e1e1433fde63a90a7042be3a63dc39064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6016fb492ed2ac4059a6eecd632f71a
SHA1f2b83022f3918ba174fc8efa4d82006d82888903
SHA2564cf69add3e59ae7d2eaff131883fbc46a19a24c0ec06a466487edf61ca76a80f
SHA512f91a02c20949bd5e9d564d14365c55e763b1725bb764ce313e03ade17e385288316b022098d6a21b21f0f4764b2b17c7df42cd215babf1c87cec81d5db06bb35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccc07ef42dd59d56c63bc8a2fded623e
SHA147c95fcd427773baa424cbb3831a060b722599a7
SHA2563c3bd8db8e05b20efccf716753be93dfd298a4827af50b162079f5df760578c0
SHA5120e1b8330f32dc6d4133f5ba3c054d0432871d48b88a35dd85fe98a40fd3842d6739644fd85935b3e781b2bd3333ab4c9f4ba0ebfe55b5db40cdf7ca57b0ae4f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e691709f7cc2c28ad85d6dfb3ff42824
SHA19d94faf3ebad52e36bcb8d4c2e611c0ed227d39e
SHA25607fcdb439e3bd27c86e548ae16fb5e20ce87a7e2d4defc2a9d619674cd56e68f
SHA51246a2bf9bfd02fc03afd2c04c266a2a00171bec538e9e125fdb5adbb897c29d6abcd8d897e4f671d429ff661e9c6cd16412b238be92a67fab34602fb18257288b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b