Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
7482dae8bdf863a0bb6a555d7334b3f4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7482dae8bdf863a0bb6a555d7334b3f4_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7482dae8bdf863a0bb6a555d7334b3f4_JaffaCakes118.html
-
Size
11KB
-
MD5
7482dae8bdf863a0bb6a555d7334b3f4
-
SHA1
853dbff3bd1783c66b2cceba34533d55a80949a6
-
SHA256
931bbd88b36e36679f15741c7da40a57710109b1506b43778d3d089f041ee119
-
SHA512
90e179e66276016c640d8b96b31bda83fd51cb605ea47db9ad932de8b4d44144d0e721eea192a19e523257d1569380dc33646617217f6d90b1e3534e57afda81
-
SSDEEP
192:Sggi0B4bSlybxWg6CxVnEdicFo/kMx8aviM7gv5:Sz9af6WnAFDMUv5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428174716" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 003528837cdfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000d895a6b5120a034864b652ab42c1f9442bc3ac3a6b27e93e3a3be3c3a2fff6ee000000000e8000000002000020000000e05a7a289348f2afaa847e6187d31812a6583e3aca49c79f2f499a713fb70d0b200000004381f47da277b289bd9a367b36efd960e149b1afcd7bdbf2579217ebda6d0e9b400000003d5d9eead877f095bdc9253982c0161324be3786f8c3e37d692f2c613f27cf8020ce06e8a56e7a472166aff818af33880f908d8f93e89d621d11a4ec34377859 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ACC71521-4B6F-11EF-B586-DECC44E0FF92} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2716 iexplore.exe 2716 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2788 2716 iexplore.exe 30 PID 2716 wrote to memory of 2788 2716 iexplore.exe 30 PID 2716 wrote to memory of 2788 2716 iexplore.exe 30 PID 2716 wrote to memory of 2788 2716 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7482dae8bdf863a0bb6a555d7334b3f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efade9214d800f684beeaf2ee04f85b0
SHA136bb239a36edf7ebf0ee85541dfa545ce9d46d8c
SHA256e7bfd42ad8a7d7acdbdef3c16821c68332a22489e33826a5fee0b17e471e8265
SHA5125e1bb169deb6ae581306e33fe9b634ac8da41dee10f8c71c70f0637222016a46ddba82c43ad65850c7e503cd99160df24a3fada474b0494e95c719f70fe63cdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac49269ba42574577068134171561ce5
SHA1cc36bc26ac6828687f8fd3a313d7a4b8dd3ca45e
SHA2563d70ecee9541b091bc61acf7ed6d4aadc6fb2c56bb35124cdf590edebaca94ab
SHA512b945269dfb0294aad8cac71061948d88d1e2c29ab0d628f58a5bca8023b5d46c42e6274a75dccfff7392552a0c39255b308dfede783991b733b96f04aef19b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9849d626844bf70428292f9b017cd74
SHA199b825bf9bf1cbd35b1321329daa123dc2db418a
SHA2569af0d5f8cb745360a8a3ac904bcdfcdee4f358537902042ecc715afcb010aad6
SHA5128e888d5e9f2a7a676e7329e4ac881fbdc050866bbe63deeb28667c9c8832da574e7d176e835fbbb9822986db14c309e817cfc19329f75bf91bcad093354ffefe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a97f7482431b31266a273165aea1ddd9
SHA1ed86f5516799ea4a17a8c1425f5725e0b592a144
SHA256666ab4cffa6d563f37f704ce7551c3bb60bb81905db9a186ee2f3dbe6a6e2a6d
SHA5128aa42cdd1a7aa4ac34634ae63307de5cd53b42ddcdcf255f1fcedeb1cdc3545e274efea5ec18d9fd119a867e9ae4d8bd3ccbe2429d62d0114bad81ea2332c1f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba6c3c784f1abbc871e6029e600d7650
SHA1199acafbf3202e83d22c733f2e81227558a5b56f
SHA2569b9652295c3ee32e2713fa6eece07f291d3f10f83e94b9869284fa8efb9e1283
SHA512ee516bb9f03adc3faaa90ba230abe64e54df709de61e2186f41ff2750e0eb8b5d5ebdfb4a1292acc2d48ec519dee51b0fbccf1bc01e0c4cce3f82d7a85ed2c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a915335529f06d81f999db460e32c4d
SHA1a9e1afe1812f1cd70b92bce75ecef9d4c0409913
SHA256db1e5544ddc262b94cd3829737476ea4c92ce483ef2a81339a8e8be3e24fb6b7
SHA512a1b00a1f6d10dc892326e7dd75d3ab60587196fc647a82d7274c6a8ac63e2609f8d79513ed111df3dceb299c42e02cd7978418e97abc53e7214f580b607e51b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d5ec2fc022b1294d7676277b0183ed8
SHA11b372d7cf8c144c933b0192afb8a2a4b65422d54
SHA25676a2aeb35826f751d89566000bb84bc1a789bb853c10c9ae52c12d080ece5942
SHA51273fbf511265cc2af4c561da796fded913847d39c9db11e92ab35f6eef6148e0874d41d48e7ff529fe22c14437b71b960097fa514ecaaf3599c93a3f26b404789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e14f0253910aa1164e773b2d9aa510c
SHA18a2dff6ccba405a8a18044bfa38e3b7ed342d133
SHA2565d8c9bdc5755c6bff8708fb648b1bd17fa65518f0764cff30c9381d3d52b444c
SHA5124f3302b598d08d5d3252908b99f6244f9dbde0df6243e3b6d23ad3ea0ab186ea4a76e48729344b4b842f55c1f94c39cf0336321ee94f8fc894dd84f8184194b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1696132ac7468c22ac82437cf30463a
SHA14d98281b59db8c6bdacf211972be49ed5f29b395
SHA2561e9daf8fd140613d1d8f5e51cee5a8a7c7fc01f700853c8ef534554eda7668cc
SHA51263fb6faf29cd069a97508e5234b75ed44b63bd6913a38211c6e64bbd38e9ef76ab2650f29dc5aa54bd3ce39bdbede28d32f9e7f60233e2295abb5b37d77b85d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c06e769f9cd87972e3845a4f176e2ed
SHA103a5b97d96dfd6198fbd79d36744e80f337f24de
SHA256a95ddc7711a5d104ba932c9d01c8e649615d719eb315b55f01ceed1380ba7b06
SHA51201d596146675e5ea515dccd0836b8ee0a58022dcc40e63fb5392eca999b3d85719d4656a2d0e37454478311cfff845f0fed9e0954e6052de83c99a5542cc3f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5860e4b43c434fa56886ed42ce04edb5c
SHA1a5e070a786ade3c8ae537257a923847932aecbcd
SHA256b1f2074fb50338aeafa482e1a9e0c1ea6d8d3b5c206cd97cbb79a7b1cdb5503f
SHA512b53105f0c33bdd0cf10d270e44135bfb1a36deda7b9f5aa1b8ef00b5fa7539739e253aff1e51391ea15d5006936cac7d7f8fea8b85ee403e8f409e89b0a1a533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5518801155330f4501d1c0448fd2ac6d5
SHA1e3accc614773970e3f25ae6524aaad2899eb8097
SHA256040e4fc9e59f7c66637ac728304e0c28f131670468946a33e4445ab89949ecd7
SHA51248ff0da5a92d4824ab1a4930c6fae5dbb40f431dfab40dd3816de07cdc0a379a91209f958a6a81ecde7467c4038c191d38ae50837c9f5ceef367518ca132307d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b9c07c41b9ed11b0d37139eb8ee6d1
SHA135836d3636e0693f3456d4d3cedf36bba7dd2958
SHA2564925ac00d79740010da755b029575ad468b03870e784c1dbf7c53693c76e0e01
SHA5125dd3a8aea3f1210d3917597986e12cf4a34b82aeb46bf0ea40736cb4b3abe1cab2d9150c04cfa700e338ffde9a9024a474d6e649b7760da3d961703739da9f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcf0cd2f55762404d01f8800f7616585
SHA189309fa40e429afb543bc62b0e70db1ebbde8011
SHA2565dcfc7e87e53568b41deee9bd0db1424b8695b9c0181ef48fda2decfbf50ffd1
SHA5124f14aaba33846c973bcfd0fa3f35c8b40652ae8a4baca6b8780cd7aa67842bd9872d55bca8b8ce9d32f2b69216c38628305516271ba8009c42f5d27d9eaf2bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53143304528583e0f7af023e1b491ea28
SHA1efbd0024ab7f3884034374824fd2d9629ab03846
SHA25626d7ec9fb2b2481d434602acc218e64e672702da0c0f587990cfb8bde062c32a
SHA51218c9671848306cca9a9e6327b8a914423c88d72f22444f8f3d8c66063cd945ffe8c3657556b9898375b0ecca171ade67fc7dc144268a5586aec8aa715753b159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0d70e3a33e370a4bc88183a7fc68f31
SHA15e64fbdbb48c6c6f17472963d8dd4dd35e52a8cd
SHA25669bca02681082269009a750481fbd47ffef5aeec9fa13e0e96c4495655297a3d
SHA5120ca381836b95d633607c4defd3ac7e26c6daf69f19d767b37cfaf9303977fc2944c7ab8344cd35fbbcf5febb163477bf40d6405933578ad630c252f0d1db8e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f922c8c01eff31c4bbb370292f28607
SHA173600686eee0ae7c7df560bf13a6ef412f3c555f
SHA256aeb7e76b043de1b723e855262f8be7029ae293de119530c04b428e512eb572b0
SHA51289ad14a7d8753646e9e8112d9854e692ca3005fad8a5cce48447b4ab27b6b9995ed639c183142d606e5b28ccc0b33eeddd16019d9419bb52f6b0b659bd28607c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5731c875e96c9b0f695611a2ac73b7557
SHA1dae37052c73150f41bbc626b5c65502b2953d858
SHA256f9ee65e906fd16bb2c36726b4b208c8b9eb39558d143326fdf6ff15d4e88e609
SHA512ccc842fcad2d07fa461d6d6d27e3f6c8fc33bbf182db004cbc1a3dc25ed119dc7e5bcc4733af8e727a3face1843b1ab84bab39df3035e9de30e7c8829caf844f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b