Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
8738dbbce3c171f8f5a1df527ce32406_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8738dbbce3c171f8f5a1df527ce32406_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8738dbbce3c171f8f5a1df527ce32406_JaffaCakes118.html
-
Size
3KB
-
MD5
8738dbbce3c171f8f5a1df527ce32406
-
SHA1
62810fb2bd651b544ec5e540c33d72bfa4138af4
-
SHA256
6b63cac6859305a92d8e8261c1d3568bfd0a23326ee05b6db5f35edb22fca28d
-
SHA512
88d32f25b8982a92b7a9a23db764ac7cb1b1ef80b95b42ca3f54289df35f1197c55a55eeae97b970bbdc57f0e8172c93e1c077ab3249dbb4ec31196b64b23149
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a8463255ebda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000009b685e77987e443ec8063bc141c1292823aa1864050d2608e7513ac9bcdae7c2000000000e8000000002000020000000f7abd27e2ea28ba91bd9cdf509f62e8ec3b76fc24a31647fc7c1161979b6610820000000763e15f83b8c2cc69e93e7cbffb15feb0398e75fc934029ff6d1cc04c117a4c440000000ed09495320fa13c5df55ba70276c27ff20537da1996b9b5781af5398aeed3d41be394dd21f37918746b6a36f56c5d0d9ba83908f35d7f2d53a1df426ee4282d6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429477277" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F9B3071-5748-11EF-AAD0-E29800E22076} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2664 2644 iexplore.exe 30 PID 2644 wrote to memory of 2664 2644 iexplore.exe 30 PID 2644 wrote to memory of 2664 2644 iexplore.exe 30 PID 2644 wrote to memory of 2664 2644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8738dbbce3c171f8f5a1df527ce32406_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527bf717bc1627dc17c45158980c50c24
SHA16970fbf740739c1b9a7d4c8a8a01cadd876362d6
SHA2569afc1e296389436b1e5ec6e85d8acd1d2db0565943a1b2d63c56b5b339b6a317
SHA5129cedf7c7c95e86ffbafe9eec70fc3299c8b6695ff8a5368fcfdeadd5eb86e1e3af755859c447c0a2cb377dfd58d69965d3c536bc901fe4884719df871786a5fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c1ff57d256ebe969d81ec7461176df2
SHA1ba21d7ccf88f3045b0064211353d20c7ad19ba88
SHA2565411a9fb2f5b1e29ca72f27169efc59ef2c5b5a1294dc8a71a79913be84be34b
SHA512dc54a4ccf6db96177ec71b2126dc0b1cdd3d029e8a002ef6863e4210aaa5d99143e325440d13a3ffef8713972ad621ed4f471d8bc20cb4d8077586b41cea3746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dddd6da45e36b9efc5ccbcbaf55fb6be
SHA17ab6c7db7b9903fe93d35ed83cdb6dc420542b4c
SHA256a638f726113383d3bc227cdcb5bed9de7d17e4afe8cb7c76fa278060d6146d38
SHA5125de82151a3118c46bfca2775e9e99d425542429c332482603ca5fe4dfda3ab6a6eaccc886a02b23eeb4516eff745f4ccfbec9bf61eaee1dbca6be656ef9bc523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5196b1c6f89062dba0df8633dcadd6232
SHA102a3109a4e9562c9ec256722db3fec521c70c5cb
SHA256defdbfd112464eefcb8e46ebb1b3808e152caf58ffb8d66f94f17db2ee27e38a
SHA5126d38826116babcdddffa14c04c5b675cf105b93de51f55b52a8471e177a67405d6f387e74d2e89d1a74baaf0b426c611c801a956dcc5e3fb9e958b8745e59104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a1aa326b2a9827a7bd259da4b6ce4c0
SHA1cee2bce025c3e3646e3a2673a75312699d1c0b72
SHA256e757ee7f841c963b04f8efe91dc20b87e820e3ae20bca1b41002efadd7645208
SHA5125727cf211272df55261de6e1dc83b861928752ddf6352c798941950e20d8d449492c26332c5ae9dc5488897fd5b588153eb83c5166dd285d3686cff241e8b9bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a956c7d8a2a5061465cd306ab9b18e8
SHA1ba4b226158023faae7d27d984651e95e9fac524b
SHA256dbf996e1e6495c01197c660d4fed0242a43f5dfaaacbef07fabb612cbb6df661
SHA51200db64a414d6914b8adc1773008a4a2180c6c898fbe7220787bac268c071b3311013d971e5872c50285df68e150f0c6ef1b8d29a3365c9aeabad128a2953df8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52adcbb4cba4b36a467f36346c6d209ce
SHA144a5a26648bdc34a70445edb1940298137061d97
SHA25681691bb38af2cfe998990cc698ff76f4824dc28bfb67d5f9586bc9f63ed0df7f
SHA512defd66c6fd7d74c94cabf72fa1b23db3b73596f1a31a0935202eb11f74692c3ffd96c73d648d092ed8c3ff4fa5091b02e0406a028a4a3bfab4f4ea10fecc9040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573e8cc0f93ea1690230e3c74f043e217
SHA1a3f363186a56e9ce14a7802df6d9abe87d5d9878
SHA256289971c46f9e4358bf5880a1ac2a848cff8f38830dcaaa42bd131214f51c5cba
SHA51270a272bad6aad4da403974114baf572919627f61cc273e6a061d1ff654784e3ca2a2d05e59febc32bc7068532889cafff6734bfde3bcb440f2d3791e94e4de04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ee59fece7bb89a167fd7bb86b5e215b
SHA1bda04e3f5653f8664cd940dbcd75674dacbcfd28
SHA256244be237000d1e15700bc933d568087bb4e533db40eb63ccb54e362cead00bff
SHA512db71c25e30e0253b1222c04b26608db43facdbe76e5594c5ac166b07be042e3f6c782ddababb6667fd4558b0912c91cf6c859a155b81db1dc3f2a22cf7e9f7d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0ab2383e7e78365f79858aa4f6e5646
SHA1f8ee6a79f2b9e48909996ea7c7fef01279fd56c4
SHA256552fef9f36e7b75be9ece5e29db4f38fd51b8957e7295e17629a5b1c6d3bf969
SHA512c526cb5ae69cbe6c3ac40bfd5f615fe6a611712e8c2da602d7fe3dbadab7d22c3ad051abc1c0e03dead50cab48c402b36475e72c7c77b0920cb62100c44af6dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54055fccb14406e9d0ac80c92a9bc420f
SHA1ca513469bb52fa4af6e9be1e6adf44a843b391cc
SHA2561afbed9838d055bb2969455ce6f5acb4f27f13e0ab22a82c67306c364de6a9cc
SHA512cf2b4c5ee658f35e4b1acf756529ef7a1b9ef36fc88d577b80e48dc2b5461d7e356ff15d2372a133a96fbba8a05308772d56ee5e568d59372e6d20e039ce1077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a741f9422def5231122dff0e38301efd
SHA19958edf3143feaa0824f55b37bc919492383b8de
SHA256fc06fc6d048c6ba4694fa9dcdfe53fbeb78e47aa9d1e33efec1c57eb29e8b381
SHA5124e9195d22be795ac02b105cb1b9ac45fa1be9c4cf24b8aeba90a614fd8637729ebd88f166fbeb9a9e99290c53b3b71a13b3d02bdb98116847c9efd6902bfc3b2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b