Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 06:47
Static task
static1
Behavioral task
behavioral1
Sample
8db8afc0c5b4d0185b537ebdd7875bea_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8db8afc0c5b4d0185b537ebdd7875bea_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8db8afc0c5b4d0185b537ebdd7875bea_JaffaCakes118.html
-
Size
8KB
-
MD5
8db8afc0c5b4d0185b537ebdd7875bea
-
SHA1
9d1af7961ce5ef9ea876ea8fc74eca214cd04da9
-
SHA256
14d82b260cd7288e63850f65c008781510deeb8a78160d5a1f133c26a9ca0613
-
SHA512
9e00f9e460b338a501186bf2ba392fdb9179fe7d411d0824b622183bbb03925f3ded3837ac81ba741bfa89693d6c9e788af1958d32c44e91266f304bba6d1485
-
SSDEEP
192:NQ6qYNPMMnIooSGW/PdPlpu31uNpx8ikiuNphVa6eyS8:Npxz5ZehVa668
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000ddb6745aa75649d0b01c2111a6532561bb3981dc683b056d2eaf31dd0a9c6fe9000000000e80000000020000200000009cd77493d5fcf55ef4a0b89c3a9bdee3b3573a7d2cb325a99d377e159bf722f520000000ef4115b7c07ab4ee2b335b325d3b2cb4424fc4517da12f2345928f3cb11dc7984000000004527a047a197917e71accc1563e720a896a9e7cd40432eee6255dab52118626046caea3ef3171bae2c3cef3e7533d4d30376bcb661c5bc608d3074718bba74f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429607088" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8036528c83ecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD9011A1-5876-11EF-85F9-DEBA79BDEBEA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2688 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2688 2188 iexplore.exe 30 PID 2188 wrote to memory of 2688 2188 iexplore.exe 30 PID 2188 wrote to memory of 2688 2188 iexplore.exe 30 PID 2188 wrote to memory of 2688 2188 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8db8afc0c5b4d0185b537ebdd7875bea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592118e04bf391b1d6784602d90bb94da
SHA125b2e958f47cca169c3e84ea35147efb42cac706
SHA2567d47c26b500e6c16a944b9458018aa1cc418009efe119f53fc7f0fc9a4af381a
SHA512b11b97cdbd6563c1968e3440cedeba331c2f127b72b23fce986af3456ee947c46ded32dbe7cb08e490e0636b88e3cb380095566e458e57e767978bfa8ff4fed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5404039de154213c956d00b0c69d14cb8
SHA1c615f48659cf45d2538a3125e1a2cba463604660
SHA256800a0b41b6fae01225e5c5db883c59c3b1292ff105f592bb845e2433ab17497d
SHA512b2efab8e7c861aeaba598a3ff6086965d74e75001d4445bf2cc9728991b8e8f435d67f77b2b9f8fa09761f98dec7ff7b85d1fed6b3530e96abb028a557336525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f66cbbe12a2b7d915eaca7507c69d48a
SHA17291ccdb2a141cfa64d6d63401ea5fabc15bff44
SHA256d68a7d782a97389d94fd383e01fb86043b1776c00e1a21a9ec72d2fb0c094332
SHA512538412d399d07a71340d8a34e0ce5cee52b918d71901793ba25773fde9c12ba76d33f1803c70b600dad52d086380056c2af6d4a240642c5473ad21b4bb000366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3ddfbd9f290f764b877e47212500d8b
SHA10db89573a8334f721f8aa54afa0224460eb8dac9
SHA25616a25110a85bc0f096395a30f516df4523ecbc9f4ee5dbcfaa458e7fb5e2ce6f
SHA512eb9b4e52a4455e7aeb3cbf5a10c2275172a9a7361dbede67fc6e794f9ebeb1c2ab82942aa30eb9c9ddb4d110f2e7985b21979d2f3e91a4fb9b122dbd14f98f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53308cf53c1cb54fd963a21a16e5d936f
SHA1383c17aeff7b1a8e99c26d64179ce882cc6dba62
SHA256e7b49ac2e8251436f4b61557d65eb670166a5237906b2d1cbaab353ebe7694b2
SHA512acc2b84a80039f2a21f011496fa7b235ce1091989c320eff75add380b2cca459500b29416a50cfb255a4d16b5af1409bd5aa1d73f8d325a38ebb1250159409de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cd461cc758dbc324d764810b028ab61
SHA132421eda11dec8fd8f7ee4ae351fa112bfe8f421
SHA25679fa276dca6f0765fec85ffd6b32ce48abac3c74268050a81f4b5ddb62c5324c
SHA512d5beedb51ad5ef0fdf79ef04567744793e070ece276e719174cdfd7109e75839cab98253e4c53442ab4546fd600f6dd8dbd415d22c74b05ed6516b5d5c775761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b6d9499bb7136d958a63f284ba804b
SHA1dd2a778163490bd7e1eb42c1786a85b681873e51
SHA2563e053d79ca396a8d324f324476fba19caf47d891e341edd48c5e75ecec92b81d
SHA5127bd4708fa1b00776da74a3b5bf1675a7ae319bebc8109ded7a61d48a12a084c4cdedb45a2e9dd1b5ddcf7986edd4cd7c2173c7a1f6bf1b45a176a835e67fea40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a514dd6ca88c9f22c3f47879a2ff58e
SHA104cfe91db86d038414596a34d34868e4f8f6111f
SHA2563402132e0806c8b9ed740a9a0f2e659aed0f94d986cae21659d2f3761b69e8d2
SHA51232a2f7f4b0f71144e43c6526158851c1b99e488e08438973d07fae27f1fde3dd4b99a1905e77313f290a20665d7dfaae7cb8f43e16312bd4de88a6a58afed7bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2918299863f66b9dd15eaf1293b1f37
SHA17dfcf4087afc790822efdc75ad461ac388534322
SHA256ee9feba8aca1976f24f300834b8a920c0ab3120e8e6e4112b45fc2443cfeeecb
SHA512852193958f6b8c026a2546e4ccae399f1083c8429f39f4018e29214954ea23e4fb67d5f5064d977446a744160b7b796754cecde59ee1e352456efd306f30c0c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a0137f56243dbe4a75e3d43f79e3e55
SHA11a83ee8bcadb5a1e9a545ab7ee76b9ee23107197
SHA256b6d76d632cb9bd8f5080900393800d84088ad5d5ba23a280967fdc10f6990625
SHA512078d08867731d3db81703ee5304f07b343c943eb05ee4bbbaa609b08ecb6d7fa0018d3c8933f436220058f27bb44d778d2ee407de18286a38c9c9a660a800175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527238858efd125480d67cc3d33e4f526
SHA157375e4ba46b7851517dfc094a42c01a16bc325e
SHA25677228bcbb8e9d8909c854958f0818aeceb8d12fbd2c371b6d0f00527285eeb71
SHA5123febbf3d75a04396457236eba80dcc7857d72aa313dd32682d0b5c7f32218a57e07464d991a0568590ba5518a3788d6a99e56f890518d1a702d99ba0ad21303d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5182587d7c24e121a87b4f45b11271887
SHA127aa9cec45c3b8b977c1ef08d33a6a219a4c2d28
SHA256c0b224c20e3e324ad262b78a87962b10c3407e8222ef3b41a50db37927b0dde7
SHA5127a345cd9f8b92e60185fc28347e29c2ce8478b13a87c251bc084d348029a1a70915c946056311e013fa7e4bac94e081847834e197d1dbaba194fd57bc18e9b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f60f182c837057702d1c30652e517a87
SHA130ff75ab5f90231664204f35a02c0c074c03745f
SHA256748a854f5d9635cb943d0d55a726b8e9d30c8c3d648e9d39b5ad1b953aecdfa6
SHA512678613a507ad20d0f143496eaef39854b7fff7674d6e04999a354cecd21ea541907c8ed9e83f30d383c9e86888b36f902b195a7e6594905637a0dfeaffd2ae07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59edb3b591f2e2448f8f7886c7c7f1329
SHA166f74c7e415f591595d4f9163ea9a07b063edff9
SHA2568db1cbce0f0bb5b4f0dba9d1671aea846e9a96dd449f19d6e689b8045d707f0c
SHA512c26a2df5c0969952e4536c59fc3d54a1ef07db7ef1e0742971f2d4f3e02b8a0ab2db2eb520732ff0124d9ac208d524d3b653bea53432f0a351e4460bc7c6afb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e63ee96c163ae56564fae36b7f02903
SHA12b192e71a498b2461332874e363e664a8e72b5b8
SHA25682e28585123d783b81e74f54fc3976c0f4c8e7712f556b49060f063466cda4ea
SHA512d46a57ffcfe7728424984853dee3e4492ea8741ffd36459fb6d29ab7e16b2dfe16a88d11502137e2f07e99438c80571e2fd405dd25dcb6b102b1034c2f86e898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535c2362476108141f92b4611164ff8f1
SHA13baaa807382f98abfa7c46849d8f3d64206b7bff
SHA256670d328f88d618b7faaca724569c458a6700ca3ef1b0f167e734a05c465bac5f
SHA5124227ec0984ed86096df59f584ed26c18c1524f66979fe815b998111b473327ef37aa3c50c946fc97007bc35d148132748f17ff7240b0b9ca7e327aa797ff7442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551fd702cd7a5e7046a6ddd0cc7464cba
SHA1c214aa0fac6c5b6c5da6b167a56f0734a6a3cbe6
SHA25641ffed05b7a13cd2049bf4a644a82deb4ebb57a7abf8e9904540c11f985bad8b
SHA512463e8fc3e7867dd758f36520bd34827e23861a2f5ccdcca6eb3637b59d578edb81f2596756d8b1cf5bf7b17bea95e1ba1c71a34f3ee3a0bdd2c3b1034e9f8f9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cae35aaa7bef3d435559184fd9ba43e
SHA117cef756242af62a6452da7af4d79787f6858baa
SHA256ec3bc4c659b4bf38e2788f6027893b85597293106fb456af0a73b6c228442127
SHA512cd073168af921b06943d89b606fcb1d375fe6111008019e7ffa65b6224a90dd058646dfb6bf369656b199545a59db1ae2dd1e574007131f91431153c42b81f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7c83747bf3f6760f54fbc60b7c7e96e
SHA1c77682c5a8176d9e395b05d1a5e5e8f0d8d9fe0e
SHA256bf26550834be16a2406765441615760540885f60d82e1e16c550b3fd3e4b68bf
SHA512d7ae660d77836b506753f70ef1adcdd8ed95de7cbf38ff1c1e05427aa9272408ca09edae66e87fa4631022972e289d80ef88dc9d1b23ed3e4f62ab933064f859
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b