Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 17:49
Static task
static1
Behavioral task
behavioral1
Sample
7905ee49bfe7d5a34e7a63ad9207c0e5_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7905ee49bfe7d5a34e7a63ad9207c0e5_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7905ee49bfe7d5a34e7a63ad9207c0e5_JaffaCakes118.html
-
Size
160KB
-
MD5
7905ee49bfe7d5a34e7a63ad9207c0e5
-
SHA1
f4f3354096f4beddbcda6d0c23754eab07ab8ee6
-
SHA256
868cad87e482a21700982fc784bf79ff32340dccc9938fad9558d99fa5fe8565
-
SHA512
8d1342a188f9647e920240eb88af704cc0a959fb072f8aed34ee79172609e13aafc0003d3e51deaf7839f33feef271df20529ce48741613ee63ecb7e2baa862e
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcLfBHA5uCLQkST4cZnWCkCp:sGctLri
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8047ad9e78e2da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428502859" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000001903b65ba936a688ad1bed3356a2a2f3a7bbf2b5305868d634c16cf8b2748908000000000e800000000200002000000096b2283bd124a3940dca52d5edef6ea280c37638c2ad21f23a900490bb726172200000002825d7b51574115b987c112ad3a92d35dc3e9efa3e5d3f87705e80f8b582cc7e40000000438459416a6e8add8ea1a7a8a81cb87aa3c275d4f1da1409165eda02290bed7ca74901bc9799018a957560af13ff73bfc30ae473a4d6e1ff7fbf65bbc3840859 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B12E2001-4E6B-11EF-A641-5E10E05FA61A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1464 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1464 iexplore.exe 1464 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1464 wrote to memory of 2180 1464 iexplore.exe 31 PID 1464 wrote to memory of 2180 1464 iexplore.exe 31 PID 1464 wrote to memory of 2180 1464 iexplore.exe 31 PID 1464 wrote to memory of 2180 1464 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7905ee49bfe7d5a34e7a63ad9207c0e5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1464 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59add37302264effe2e30d4451ec5c09b
SHA1c8a30f7c39b18c70b528ad42f7fa58d6d1544dd3
SHA256257cc7866e3134e906e85d0ef04eaecf272955f2ccd0f53d2e65e7e46638a901
SHA512b74d10b079cbedbe62275c760ffb6e4deeefe65bd37289e8246c882737fc855dbd786aae78a02150bf258bfc7ed6d7d512123febb61cf2a1e0396686e60ccac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576697041e600fc7b70ae1442f9c13505
SHA1c9686039fedc9fe7368f28f1257a7b4dbe92d145
SHA2566e6202edb91df6820212fb7ab2ebcece1c3d4e2fa128648f04bb71aa3f95e897
SHA5123e8c0bec3f355a954e2591a56670a549d21ea1268de70daab564e02dba18eb837e8085bbe62d1e791c6e5c629cd244ff56265668f5b7ed919f4e54977f1f5038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d0ccd03b3446aeda8fbb4b6f265ca32
SHA111c21eb9f85b55d9ad8733887a67bf6e49673331
SHA256e987def184bc61f953ae3944e7e57d71c7c442a7fbabc1f1a4b88a2c144b5b0d
SHA51298bde93e66e059423f21b6e9975cc5d262932f973abe14426d512a0f122f0c913cb034a6a9df8b53fd75f02b6d51584464e95f4c333dac6340362a8e1585499e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a713060d848ee76310b7140f429df81
SHA166fd324cc9d021bbd619b3a5c64665f4fd347a0f
SHA256f5e672bc6ad6fe9a803a80ee244539f00edc69df712810ab8aa8eebbabd81aad
SHA5126185ab9961fcd847a2027cf531eeec1d0a2307c96564266398c0728c4b2f4068b3965596cbaf8dcd325008d3659c753ffa3fd53441d8dbb14c7790c224a0a900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abd98bb8fcc9b793be8e0cf90d320338
SHA1412e02310cf2ca01e4961a2d433df3a33728447b
SHA256026026d914e3e18c4b7b7bad3bebcecc856d8e482d4b16648cb885b6eef6d898
SHA512e4a8f110d2d9e1b654bd2de71a8b4f179ff4dc294952f47841a0d6d64f39137b5ded2655985cc73f21fdf22f2da4d6faef0108ac1a51ef0cc38dc25653f500f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526f6562515186c13997a816b4b819eea
SHA1032270407adf404a8dde6c808a8607547f998233
SHA25661f40e810985f21aca189640b4cdca89f2c587b75e4ca80bef0f64750aa7c595
SHA512e6bda10c0b5314262c70eefc9f4f97fe6d1ad6cdbc6ad9d8edaec457b4bb2d0841a936b5ac53de608c90953ec0e680d64a8aee35a34f70082e3f18dc83c6aee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b21d004fc5b618f33c001ae697539eb9
SHA1190dc20b1e1557aaf6285e6a31386a76633ca434
SHA25679eff2b700524431466f8cb5a7204942fc26d2e738a4c09fa1a3af37abbfd58f
SHA512b4c650658ce1e80035fd25a9d904039bb77c8fc9136e93238117b408c4bc51c473af1d7153a33ce52022fa0f10646f9ac71281d94eb3202c38a0bb2d6d130ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52db926ccf9d880fa04877fe19dcfd849
SHA11d8772d442f564adb9ba6356f0ae821baed468e3
SHA256b0cc652d409dce58b96ac027a934a51baedf071056193328a8e301de6e1fdee8
SHA5122318b73ce7acf2a36c98f72218a7ea0e2ff962f1bf857eeb2f1d8f7f889cf82efcbad4f4877d9275d363fe5195968dc9444f544d8b59ed091ae8345bafd77a8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a372069cec7bc194be6812f6d1e9322b
SHA11974e23f56c8b62ff7d21325db3452792b8a79b3
SHA25615e5a5d48a0733c22c21035e50d2f11099d9aaa3db028ca1e19956eafab084c3
SHA5126aaed77b8d7939f10647a6fc254ec53c36ca77f3ef8bc975f2261ec1e795dce0bdcf8fee56071e5e330e32f9f718426030f73ce65d26d6633e6692c3c933388f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cfefbf431199eeeb5ac018305b28cc1
SHA11f11ceac6abaff0ef49ab9b5dc2fa320958a685a
SHA25625c81f768834e1e2255f96c10f8af9d4264220b0c33204e45d3df10e4d15813a
SHA512c74c1ed61758b61956f06b4e7062eb4596b4fcb60b77d2e974006059a8e874aa0b342fb5b891bdc4cbe3834f1dcbe9a251b4201a80975c512ab56da495b36cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb71f25a4e1883f87ddaa76195d612b5
SHA1543f330e7e6dacce9a5775df9281a5d9020a6573
SHA2569d39b7607efb5b8a23e8c73354343568bdfd201b476c1f5da645ffd0a60490c1
SHA5122133f1fa21072a314a3972bb0a3091ce35d8d1a5a8610ef427c2829c84c5a6ec7071aa3d8fef5dc4926427c6f1e3dd1dc8c27c2838fe24f066f8cfa448d4b858
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b