Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
b09a2e8f7b3adcb17b4dcfae75897238_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b09a2e8f7b3adcb17b4dcfae75897238_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b09a2e8f7b3adcb17b4dcfae75897238_JaffaCakes118.html
-
Size
229KB
-
MD5
b09a2e8f7b3adcb17b4dcfae75897238
-
SHA1
9fbb9d6bf2535f65140af93bbe559b7864b6408d
-
SHA256
a5b5db8e0dc99185aa9e319c90b94582f3de0bf76385d547dbbe0ea75b9f75b1
-
SHA512
71b672e1e07c32f235d6935597b38fd466627310573521febb3f6a7a399ea828f24cd59407fd64691b23b2e69e4029287ad4fab2e3ff604b8d0c1efe51cac48e
-
SSDEEP
3072:SsNM41yfkMY+BES09JXAnyrZalI+YuyfkMY+BES09JXAnyrZalI+YQ:S6MXsMYod+X3oI+YLsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d08a349d3af3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000c32d6af1e52c0a73c10507291d3a2247ff327c7645276f2019d2520663506d6f000000000e800000000200002000000047c6a7d368ee6589dd9232e4466151716117c578f88eb590d56fd4d67d5613aa20000000c02280306cbb05d2a8e95d03e89ef7cca64674a48f10e8b1e926fee6945e1cf840000000771b80cfd8d5205fbdde96fef674331e8860c0bc43db1c59225cd194cc5f60f812da4c594532fbca4c01d754775e21a909c98b3e6dd18bc9d9c3e3df00e30811 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8879B01-5F2D-11EF-B507-C2007F0630F3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430345443" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1648 iexplore.exe 1648 iexplore.exe 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2344 1648 iexplore.exe 30 PID 1648 wrote to memory of 2344 1648 iexplore.exe 30 PID 1648 wrote to memory of 2344 1648 iexplore.exe 30 PID 1648 wrote to memory of 2344 1648 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b09a2e8f7b3adcb17b4dcfae75897238_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1648 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545b21012c33c0585198185146e81d220
SHA1618250118513caa268ec3c2d56f36f1756608f0c
SHA2568e9f92f45bfcfa350314cf98467049936ee27baf74c391aa63f19a96c72fa6f5
SHA5124116a2783280b94d05156988a6e7f89161cb1afe1497a04c6e7ef20280cf106b60f696d83e29d55aaad6e6defa9171d1352955132c1499496c938ddd6fad8b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d15ef33c4ab488b6f584a66182d1efe9
SHA1e026f8ed297c40ba71bb85520186abf060f211bc
SHA256b4def4aa7f217f448467742e98250ee39d643d11b590e0a20600682474dbf04b
SHA512c022c49ea15832e60f7f38d87a659073b96fa775c43df90e5bfc7299073ffc0b96acfd30a5a3bdf5e76735f842bf3ac5fa030d6502a390c0a2849028c39e3d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ce1cbfe095f9506d67d2f8a4f56dd97
SHA1d252f22adc183f8da433821bd53e4709b02e1b93
SHA2568cf2ee6b087d5c500ba269dd12827717348d6399b05cf954ad73f871dd50f9dc
SHA512b41ffd3d74d1a0e75704a841918e5ad4265156535ddd0fef19e6cae773c44a592f0d0eeb0531c06b6e5dccac5264eece5218f0e31010a18e377923a1d3e2e867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d13c92234c4527fde2498ead480ba5a
SHA17c9c21b574fbddb029359ed503cb950064e2722b
SHA2568460e2ce57ccdd6d20248915d7a7b5fb114b0b168b8e11ea021acde7b5fe570c
SHA512fbdf0a374f5c1d2d059b91e94ebaf4455798a80e59f629849dc7ab7a5ba45eff8d000096f522cd5e229d3bcf8aacdac619d1985055a3c46fdf5ffad49a5c3051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525af4d7308a86a06a639f3d21343b761
SHA12929d84cf4ba2edd9e4f2be78968583838aabd9b
SHA2568fe01ebede025858b5dc03fd9b611d7caccdfc2a7c39f6fb0fe9c4edda68800c
SHA51210cb6c79c75d14083b26e779f04034c5903258e9d97eb3135da0b4e91576079825a253c7d9af3dfcf8b77ff57e7ef789b97cb468764b2ad2c633bb25a86d7a56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aae113be6a109111ebd117bbb21bb7b3
SHA19ab059f5a30eb8c6a8b579f8bbf1114e4f02e692
SHA256b00b4a820db7609851e170c2f199be11a1419c87ca06ce145d15ddab14ced4e0
SHA51243ec6a4483970980030c90c12027734cbdb79beb7345b4ac4a7b8879d4926095ea3416947db098d2c076fff733cf91fae7d07ce6afb75c77cc5a53f8587e5a7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522a5f85a2214cc1bd1672c16a472127b
SHA169a4a51f9651c73e5691bdf7da3a3f4b99597415
SHA256e80098d1c96b07e213003bc18dac5739ae89319663b574d86c9975c0892f98f5
SHA512de121505abb41d682b2688fc4db3e52f6821c126bf01e2160d8ff2e03f6c5ee04ec5e08d409702174ae9af7b0aeeebf4aac9f8e6b4830365b60bc4a4bf10d150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a39a6da5da0129874db1c31cd409353
SHA14ae28db78f5b187c983a9722124f9b786bcd6dbf
SHA2564743e1ed9d2303b78623c4d8fe15d985e3c10bfb575053a54ed6c4c3ee48ccc2
SHA51205596d91197cc2fbdd3cc18290b032c21d40d971fbaf3dad3e49a5fcc615282714e005ea70f49c9e487610d33877adecebdbdd6ad1de6b2b8f7db776d080a49b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b