Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 20:19
Static task
static1
Behavioral task
behavioral1
Sample
a3fe66dc8ad62f902feeb63d624f89f4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a3fe66dc8ad62f902feeb63d624f89f4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a3fe66dc8ad62f902feeb63d624f89f4_JaffaCakes118.html
-
Size
58KB
-
MD5
a3fe66dc8ad62f902feeb63d624f89f4
-
SHA1
a40d727ecdb990727374fb14b14791951e7338db
-
SHA256
41c7c63864309e309a529e78348d774842505b40750a07a1576207ae304e9669
-
SHA512
c7de1eae6beaae161f5c6ce8dc944f8620cef6b6f7ab5d092a0143c0992bd50b40e84e1502088736038368f0e7bb2d2e5e231ee2f11a91913899b7bb7d21ad4b
-
SSDEEP
1536:gQZBCCOdP0IxCgFojfCfIflfSfefAfvfeSfDfkf1fwfEfJfQfVfEfkfn2fzfUfU3:gk2F0IxEaw96mIHfLctIsxo9c8P2L8s3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430087868" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B294EE1-5CD6-11EF-B062-D6EBA8958965} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000003bb1df478f130681aae7a1742b46c1efac6756bfc04f536055f35f92b1d422b7000000000e8000000002000020000000f4b3ad0e8973624ace5a5dad30e8f429d3a25aad4e7dba4dd931f9ae02b7bd1a20000000d6c4fe2278e607c208f865ead510916e66a730cf33bf4c0e95e47c3bb213a0844000000002dadb0e5f53c328a9857761fe43c417504c09e441cc1a81467c63a173c7326d503055db54a7b8d42610c6e87a566871fec2d737b80af36b2f921a6dc182e9d6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000a36ada85dc6be08bbd96dcbc6ca96573c14a06a8c2d1f8ac0f7125716e59a07a000000000e8000000002000020000000ba2cb5eccc54e0f10571783ccb07aa9de511f517129bbf271411343fa6a91ba0900000009be38655d928f66925b715d005e79fb4a89f3af49df7d2ac95ef0dfcd2bbd47a52f318195e55f0e45c80f0a4caf1535d2059ea44d3934efb65ef100a5c836dc04ee6103c2659458ed0219b3b551f789f4a3af2fbd5457630c65d3d7cbc67e331380159ee6989203739e99b6753c618eafad1f009da39769010b97963b4b317ee1e8559c4431715448bd1c36bbe75d26f4000000011d52af7806c72191fe4e6b77dcc25ba8b18ec12d957b949c935a1323f459aa32f4de3533344cde558c4b60911ebbc4f0538b0b98773e5d9170ca5dc2582b915 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0cca4e1e2f0da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2960 iexplore.exe 2960 iexplore.exe 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2264 2960 iexplore.exe 30 PID 2960 wrote to memory of 2264 2960 iexplore.exe 30 PID 2960 wrote to memory of 2264 2960 iexplore.exe 30 PID 2960 wrote to memory of 2264 2960 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3fe66dc8ad62f902feeb63d624f89f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD590c076ea4534d4536d3eb6286cb72e3e
SHA14f0adb27c87edcfffa188eb556de5f4c99fe9b21
SHA2565802108390ab409d040a0d044fda519e3b9f851760b503f35ed38af689327d0a
SHA512419bcc380ca876641d31320bffac116ad2d05d78f2fcc994fe254fccd4f064fbf0084ce2ac6c9061b45f82e5424dd9dae8f0cbcc67731dd1bdd1216941ed6556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a05c1cd0ae41bf0f4c302340ae72c25c
SHA13f5fc45aec0631a91da3977f24dae3d8b1da74cd
SHA2569e4e6583ac2444d9f4f9c260569941c4cca82cd766e56432bf7eb07a2d119e01
SHA51212aeef8448a5258a87be873a999c5cbaa431f69bcdf84d374f89f9ede1cc5836a9ac25e83fd3d6b652f940dfb79eac22cdc341142d507af003df598fb5671a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d28bf208db7da09af998bac8e48f1e2b
SHA1385398e42e47e23350068c5bf375b43355dcacce
SHA256278f4881bec109c9e20f2b7a2e8a4c32983b1ba4a88737086bf6e544ffff11aa
SHA5124f35761a4339b94253908de4ce9ce8cf15720c863ee7d5811f72142f964592f14cb8e4518fb6fe1f9550c087bd8a82ae044c49fee16fbf659400c5448c087a53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fce5c5d516f60241a905b09349030d2
SHA1d615eb2d6fc4bdcfc10d006ed28d8d7a0f503e0a
SHA2568aa73559c794f0c84a1de3b4fc70e740e97be52159f32a9fc976fcdc7cea94ae
SHA512db03e9312d15aae84e29b3797583113b609c1fd91c41c263fcd66bf3bc09b59b16a06c53b7e4a2322f079ae1b640351710d307bb1132dfb72961d459108016f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535551781ff58610c895b9cdc767a5428
SHA1471ff4c7b251a70494054decd7360b35b67612d3
SHA2567ff3e3a310e8dc82a0859817afced0114dea96e310ef17cfeb31dd9ffc8a62eb
SHA512305a6a123159ec20b43deb1f836a0a33685d77d60c59b98b0f02b4b848aae51f2fdbdb2f252bf282bee092060c634a6bb00208460a5e08a7eedb1c8c211c6c79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3ca1d452d59714b89249e9724b43916
SHA1424467d08606f21f861b2eef1283502b7d4b5822
SHA256367f65dbcc878c85faf2084163af4f5ab8c69c3e5bcd5c276354955c66c2bd3c
SHA512bd32510ac22c487d6b9ce011c89d777674156da0b298922920a2fe3ea873630ef706f98acc1da0cd3eda9b0bd3ae167df25652b07b6e53dccb87449690c07298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d67af9fe480d50e995ae24d481a5630e
SHA14829569d560e4f92ae1e2b39549644845bd8f3e8
SHA256ea44d71b4e2c561178d8ced62e2035641e422547ee1551de36ba083ce8dd7292
SHA512f6b02938d32fa1f54f78a1e86a494d86795318fa6a36c34ee8b30c4569e86b0b9eb6d0989039171807f121426334b9a07d19d65c92e0d5c4bd1a36f82274912d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ff1b7e2d5ea8feac8af9ce69ba22d54
SHA1b0284d44b45f2599a2c5d539df28d538943be53c
SHA2565348e1a9fdd60ac372e907964723238202bec1d8d436168370b820eb3f1032cd
SHA5123b133ae36008e4b7b17007059da5caea803cffb374cca9ffb41cd7a1e5c2cf17419adae4e0fb55baedc11927e062bce4fcb4b18aad2d43aec5632828f4f8adf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2403764b7c1f7750e5988c47c2620de
SHA1a8f2baca4f94c548f329cad2e41945519cebfcef
SHA256167dafac9dccc00f8a66252ddf55bd73d953d54dd2ad38ad150639bf3c8683dd
SHA51242191aada0e936effc0bd6c4d48e0501a4fab3aa5edd426bfee2cff308d479dbd1235214ec316d2d963a8249ef3e674d4e767ebbeeb58e168fdb1644130b8881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0107e37953d689e52ff337f3956af8a
SHA1342c5212f02c77459553e650e6439318de1f38a8
SHA2561b0c63931d4a5f91e7565242ea552993a731b669591c5bca6d4aae9d6ab9ab6c
SHA512688566f6dea35dbc08059c6cbb376b744a9bf7fd348ef0d79491b89922569f4e4ec236f4e6c594261560832ba037d89933e2c7fa150a4d0f82368dd79b539ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521b8ec66af0b5aac3831bb3613585b25
SHA1df454aa36eb89cf458ef0a2e9593b06a9757ca86
SHA256f6856b1c8edceff2e6a3aad647944b4fb00f0d22c5c98915c393fe9e3354de8d
SHA512d3137a67f0fed3dbbd31cc54b0daecc416234c8f4d6386bc2e243f23a2c33b588ee05157b9690288f0073e5410a511684ed939b52f4eb4466f110700f2648f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f3e0ecd09f368acd884eb864cc2e260
SHA1fb0e329c3dc387bb62cf3783662b9576cc5ef12d
SHA2566fd28ed18a49fdb5da4419888cc07adfc0c87326ad5f6db846c54338fd0a21b3
SHA51238f3bc5174ffde88eedce2a42589812d47dbac3b05574ec1061c8b742a86c3b3a6d8cc8a52be62066355300eb13109c81bab13bf5b637471cdf9922792a4f7ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbd64c5e7a86d1e61d3bacb6dfb7ac41
SHA1f6bc01bf608ba72da83cc8130a08aaaf99574ac0
SHA256f47655ad1e7ff168d23bbcbe305c819b6b5c6e89cc708f29d5e48945340724d2
SHA512d0d1179ba60db62a43f00bae061242d31228582b56925397e77a236f8e6e23ba72600ad9f5596046530b636bc411d381e732495d16b7f300df457db29d5bb6d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51c72b3b9d80147ac631dfd62e57bf4d1
SHA123c07702b5fb3889b9ff9183a5ffaa65b9ce901d
SHA25685517da6e5cb380eefd66a25d096584c2587f427907e19b357083e06ae002fe1
SHA512e332e5c2e1a6ed44ed99cc5229325b6765c224a91e12fe58895c7c5e56ad5fb3f958b3487f5ff7a8479e2fccb274d67bc5b063160cca525890a2930fa2c1b699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a3752b2c693266b1b86d0436458e525d
SHA10d227bea0c88e95884b0555d3e782f8d22b33c6e
SHA2563cc76be84c441b2fbe7b0ea48fffb698a979071fac4bc8edcde4a2929a2e8374
SHA5122771b6fe84a73106fb1112c0091c3b3fac6de9dc6bd1df03f771b43603c93f5dec55b3b25ec34a2b800aef03e4fb55b7ea5c1681e1c6c7110d4a825e5dfcc316
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b