Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 11:53
Static task
static1
Behavioral task
behavioral1
Sample
85f3eab0163b189a2b2fc052c32a901e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
85f3eab0163b189a2b2fc052c32a901e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
85f3eab0163b189a2b2fc052c32a901e_JaffaCakes118.html
-
Size
51KB
-
MD5
85f3eab0163b189a2b2fc052c32a901e
-
SHA1
c7efe38132935c48bc1c75bda9886550e3699759
-
SHA256
d9a46cda421fd2b4064f3a6d8599c91b622418552cfacaca8115dc8777f34235
-
SHA512
1857e6aa45d42284dc572ef810eb25464e21912ee1f5010f28491fd986bb62eb4e04b2efa522c8fbbe1d514e5f05ea05e5292be2deb8838f2a844deaa2d93671
-
SSDEEP
768:S/YR49z3ZNh7YsxuaFvG/Es7nmu4eyTP9BzTJwLY6uwjg:S/l9bfisxu8kmu4eSPfiM6uwjg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b073e7f21bebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000aeb7139173dbccaec04d907311c9efbae2c62ec06b902a9b0ec73405136820bf000000000e8000000002000020000000cb70ec2f2ab999e9736494a52e154b5a938c8b2da1362b1b3e516cbedea8ba4420000000c36b23c7bba4651085f2f0ff9ae542c131c953f0e08d19257e4273d52e859ca740000000091baa711db0bd95774970dba04f7ebf8dc5553ae5ae30db315ea92dfdbf85ab1f790eed3daea0cd8f3b4fe14f05db874446814e6343bb570f2e4a635b9580a9 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2FF7F541-570F-11EF-B586-DECC44E0FF92} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429452688" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2716 iexplore.exe 2716 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2692 2716 iexplore.exe 30 PID 2716 wrote to memory of 2692 2716 iexplore.exe 30 PID 2716 wrote to memory of 2692 2716 iexplore.exe 30 PID 2716 wrote to memory of 2692 2716 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\85f3eab0163b189a2b2fc052c32a901e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a50c8bf947b08f93b41604f91137ff9c
SHA1413dcd6a84afd8fbcee9dfeae98f1a49cdd407d8
SHA256a92932b383cbd74a05521bbe00d61aed8979e089e64eb739c76c7a0853885d08
SHA512343a0914552e16c3a6ccafe9cdac0216a8241f49712eb8bf9d8410e7162c4bbca8b0f49ae9efd8fbf3caaae4c11043a3761d805c70f8b17099e91ae1bddb860f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59157800037e06662520b2d0e35625c58
SHA1a087a5fd449b0518ab620315709b9f9042d1bd76
SHA2561de66b9b5722eaa9f09e4210db47de16c6ff5b1014351404bbed175c0d4e3650
SHA512933cf0c95831294804afdc4e1db46e80c55a911f6833082b2d150c9639c9f597405cbed35c87ba2ddc820f8b295c11b4e944f335d7289d27257b9f2de6ecbbc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a3ebb376e4f94fde9269c2cad822df5
SHA11fb3a738ac9ccb8022c0e1e4bffe3f758c2d5f1e
SHA2561fdfd84958263e5ebea030973eef452f5c67916577046e50282f45c50a3e68b0
SHA512d7bc3fb40dd5ac9a8ddbee5ae2f851a197774bce5dbb189dbf6b56cdfa0f6c873430de8a1e190df74779aa938345ca0099e296b33cca2f8a95ae5cdc1e92121e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9f64438a8a5bc76ac2648dc5e936ded
SHA1af1dd5bfcc4424e176371efe50c4087e44094a81
SHA256deb3b971965df40b4df427ed9fdf5b002cc4c365f6bae09797808ce446a2cc4b
SHA512405689ddce6c3abf03cdeceff7f616fa723782c4bcc043b586739f1c8a8854bf1d28f083b693e6c8fbefde37366f9dcdcc2f6f13adebac324fe987ae36ac5cb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a03fcf3cc3d9c0d089ad6759aa812842
SHA1138c5821705867f7b64e5507e07036a5aa3de813
SHA25650de2f23dd48d54ffa49520a07cb1032f8b9142c7d5d46ebfadd6f385dd31fc5
SHA51273b53a1ae4c842fa48c5517a757b035969e9a8436ce2954d3b09d7c962aaf2db11d08723a3ff0f4ef96db5f27fcf174943e4d313af5dee150120442343782fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5568d42a9d1bc593129182cf2bb48b4f0
SHA1414d1ffee539133d6f326c811d26ba0412ee1c29
SHA2562885f0a47a5d7b0045235c17610031dadd2c04b7a4b0ab02ec5fdaf413c82703
SHA51232613510c5ed7471f921fb125a338b5c7d983afb7647a1496ffd40e6968842f986cd799415f36caf848011d66970e767f12ee8d7e75e1553528f781034e0b150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534abdfda98edfc3d563dd78796cf3b36
SHA14604d122820a1573cc7a9f7f5d30dd8c711ffa5f
SHA256487275da2611ca7eb633260bbe8ae6306b79012776339669ede9a8285da46fa2
SHA51238aa71d014d30dfa08e480ee27233dfe307d5fd89467af55a5528c1c50ff72d5cd6dfbbaf175001fae6b513d9db1f3ffe6589432f01909bc776abb04471655bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b7320d7c4b7b57ae9bfb0eca41785e7
SHA11b60fb07fe8dac52406930447a8fe5d29d3157ec
SHA256d93d5756c2c4d60134612521697c9987da84606f1d74ddd9abc4cbca524930c2
SHA5128c474095b6a4d6bd6ced6f658dc1697ebfe192b4bcaab5518897f89e4098b3a5ce76cae40ab63a63f7a315e1e85f0a5e2940e0db6abf80b7587f6d243217aad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592cdfa2aac0900b748edf7aece135dfa
SHA1f07b78ccf34e020ec01e83b3038c7d493d343c81
SHA2563de0c62f213df7cc7bc33dfc9f1625b3dcbc7333431866d5cdebf8b9540dbede
SHA512ab8633c8d980958ab10bd216a440128e36fa2c12c1d51f619a8abbca41e1d98631fc5579e107740fdd5dda715bd1fc1b1265ed98b2d6d819f3d4ffa0ce45b74f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f5a4dd96af303a5ee425eb1dcbef389
SHA143b4bc5125477cc79e5ba21b77d16a6fc813f682
SHA256351acc982da8071906989151c00e84f5e0134e97cfb32027d22d59bfd8da26ff
SHA512e52e23ae0ce6e5e879ca14ddc2fb636a5cd7459cb29403a4076e9aa61abcce65bd9c098bbc3511a21752ec06e13f562f38c681035942e7355f20df09895da0b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf0653b7c917a5e91214953a20d4b80e
SHA1887c3bdad67f0a5e3c3d23f12eb41fe80323af26
SHA256b3887904d7e3c68a7a39a84d14a20d228b91132471728c2d033849a2b03be388
SHA51281d30b9dc8a2dcda3f82c9edf5aaad714ac10f8cd4155ba4285337e6bd992157a7d33e5c698b79ac04262ed4d995eef77d31cb8007f7f6514b9f1b7965873fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f63ed003fcf148c76f82692d0125f0e3
SHA1c47a06ccf296653a178edcd63d81ad7fb09d6162
SHA2569bb4b125da44188012d710877b1c953631773bcb6aa69859d5af84b6c04e27d0
SHA5128c3574ce795bfcb08d7c6299e441a876f77610ce27b4e65114a5d0a5547a1f75eef29c9877d936ee66f122b9cc9609492a08e3079f62427bd5ce7661795a7d01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9ec19ef8908100ead04b7cc3dcf23a3
SHA1281d38690facb37deba8fa34a9f63a7861c7883b
SHA256715a7fcda55fbf62502af3c9f46333ef6130342db2e1455558267a27db76a518
SHA512e6b73d8e9ffb197078b82b4a32179f10a4205ed3ddd48a306cfac66b16ad334f676d0b75affde22fd22124a3d8f60429e4b4575e44e75972efe9d507785047ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9b7dbbfb2d80608b23168b0fc112614
SHA1d5fdf324cfd1669d1afe4109b4f74524d465049d
SHA256e09b46134a869bd6741224a0d81e852902883441002536ddddeac89734d84c48
SHA5123f1d00928b9cb50b3b75cd846b155b58d128cd786821bfd22ba3af2da6087652133ccc80731c06f044595948787789680b007cb28e6fee6347ea6f268d1a47ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566256d496205cbda89f6774eff0dbe81
SHA1d42fe7bd8fd39f2a83a030127f923c3b19d5bb48
SHA25693571adaf651f85f9ee0717c53d51799d954ce5e8e35514932a6fbf4f1b7a679
SHA512ef2af6829e8b769133c314db96a700274807b6b19ea79f1c4c8a2bf796045f47785a3c9b42e1d673ee0c4ae4b26bf9d2efab1283835eca24855b745bad0f0113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db5a27a21aef8c1521dadfb44a586884
SHA1ffc1667185888488739307b3c19ab73976b324be
SHA256611418e6f0fb88422544a93b470ea28121f426ba39af9eafca50ba7cd2186600
SHA512376f0d96bf5a27071d33c735589f00a954250c84b692a8b293ef62165a3c5bdf80628f95dd301e40d4c51335e0e7414ad00bb2b0fadae712c0002bc7f9a6cd72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5102fc94363aea0a18262e7d031bde3d6
SHA184984f12ae3d16f9d466d2697b3b28754cf22749
SHA256c22fbbfd9e1ac9b48e088052ef66813cb122457ab21d8d3834b5a1a62308f68f
SHA5121b76c83c56b296df6fb62558d8b6ff8e77719f8600789568d3f46ec17503c3c369719156f97d641e7a3c02fb6c1d25459ef674fbc829067b19acf6d3613890c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f634379b5a8d065db2aadf54ed3d9f4
SHA123c044b8b7fa9218b72e2ea71aa571e117d41e60
SHA25667d8c390b97ccc523d0f9b2fa4eeb08343eb11462839e740399dcfd6314400c0
SHA512e6bee52614e6af15acc6ccf5a2b6d57cdcd579702ee503382338ee43bf19856984ea71036c58c94231647d4979138ae1130572b4dcc37c6ea9474f98000f113c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b