Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 00:54
Static task
static1
Behavioral task
behavioral1
Sample
b18b90b7e0dd5f4f39c95358495c4ac4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b18b90b7e0dd5f4f39c95358495c4ac4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b18b90b7e0dd5f4f39c95358495c4ac4_JaffaCakes118.html
-
Size
53KB
-
MD5
b18b90b7e0dd5f4f39c95358495c4ac4
-
SHA1
b397d0f664c5c28b804fc490e87c13e5805b2936
-
SHA256
428830e0f614224b6393ba4670f9e25059f9688c73fe8ae19a170fc226224bc6
-
SHA512
7b856322ae3a81cb86eeb9e4691fb4353c57930f09ebf0bd819a40b3f1d1babed30bf816f837a39bc71cfac61137876bc2710959d6278544f086e0e111c65791
-
SSDEEP
1536:9kgUiIakTqGivi+PyU/runlYK63Nj+q5VyvR0w2AzTICbbGof/t9M/dNwIUTDmDH:9kgUiIakTqGivi+PyU/runlYK63Nj+q7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430363560" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F966B511-5F57-11EF-B586-DECC44E0FF92} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c7a5d264f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000ca17bc123e8a5debdf48b3ea588866eac9aecbb75c84a0d654165885f6c46ab2000000000e8000000002000020000000eee9fd836778d59e14fb1d8ddc8ec786a58cb7c10e8333ec9e0d707170c4ea6e200000009d79e2cbf6f943eea8be25ca8e35a52a85a0c4757e88916a861824fee4cbc2044000000070cb682b9f92522ca47fa03922c8adfc0a46a61913e81d60063649baeebdd1f39c1cceb48962721b4f230ec3c67d3219569fa4cb166596126ef3726c7e72cac9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2864 2348 iexplore.exe 30 PID 2348 wrote to memory of 2864 2348 iexplore.exe 30 PID 2348 wrote to memory of 2864 2348 iexplore.exe 30 PID 2348 wrote to memory of 2864 2348 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b18b90b7e0dd5f4f39c95358495c4ac4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571306446796d30a610f1dd76e949e656
SHA119f05b778cfa524d0bebb8aadb80402af966c2b3
SHA256f71b33e78b6e00ef0ecceb8153b65db0b12ad0a4900c862bc392a258bf076697
SHA512664be076fea198642d263e41c2efc3ce1941822904cd316d5ad416807888b28f861399c281b462abe5f21ed685099759b21d80a7622c20447c7e5ac0faebc30b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8f9dc9fd2161a8e901995a771cf1120
SHA1654e10e6c5a8c8c72411c8e66eb241f6e846e949
SHA256e660cc67a5593547680077ac2ecc8348c2445fd48393a2e0d1f0c2f75102f6d9
SHA5128ef8254fb848dfc15ec2ebe31be423259973b2cbf20183ab15e72cc669cba4c697c4a2721ce47ad3d22391e0473025711ee6fd025b39c3e3b146029196e1200f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a4f3632566340cd071811258a513f30
SHA1b2f96ef59ef6c8b10097fa6b66b3d7bc7206b622
SHA2567629bfcc21fae2c353fbae0fe850fc7a99fb2550cb5378db0f19b02a3a53fdbe
SHA512defd501816bf4fdce58e2d1b62200e3191650c7b914d97edd2fffd8079f4fabf1b46c10e91ad0cddeb7445db696f3e74c849d89731b78eed6ab6d25da3a82991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583acf1c1bf52d946af8a64ed2af4d96d
SHA1c6719d388c5593d1dfaf5fbe1c9729b157c96486
SHA2568a2d96dbbd1a4c515d638a0c514ac0c9fbc280c16c6d6329bc57a651fc7e4f7e
SHA512cb6bb1387de3c09ac8a66f90070f5db8fe029b1669e3f0a1bb93f95dd71bb61fa5076a41f750eb8fa7ca4342dc28a8e871e64471e01efe67c3f7e1f1b82ab50b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594edb1686fbdbf53ec53442a666d450a
SHA174817ed8e0fefae213fb4bd54780ea535e4fc9be
SHA256e96e2dcb20417933719d8e5fcfbbd7871afc9e978bff9eb2b230f20c4c69fe01
SHA512fce92d2b401d77a9e2e74dd62b7d94a4fe883f00072342ce96ddf85c0af30abf73dccf6354184e8577156ef3d24bcadba188de425e759bb3052716fa86368550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf6e0fd61113248444fb7f5a86924843
SHA190f8ee88e3e888c2390a3817cbca61bf024c6150
SHA2569c413bc77097a0e1fcffd1d51f459cea71b3c4b12e9859baebcdd9e1d5b2f7a5
SHA5123baf3034a7cbf258638b6fdf011cf93850e39fc288f87fc7b6ecd9178af2e2d9fe04a69011f2c1217f5a0470bcac32b4ee76abdfb0fa4929e3ba64441c4ab949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5130396df745b9cf51232a9930e2fe498
SHA11bb5837b8a22be898e413ccf91defda111da693e
SHA2562f7acab48582178b3937349055b8da0eebc4235289a4aa6cf7a6da57643c9c8d
SHA512fdc06e9e5acdebfefe09311d826a44480e20c101fdd21870916c81a409c2af17319d407a2f325de9bc949e0e4a27e879a9f9cbca9b6a07c66b89512101449e44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7a14073d2a448effb3d62f83538e5b5
SHA1030c47a721222e1736344c44fb20a6a3d6b68a12
SHA2560081745aeb3245210f92c612b6f9f49ac026269c08b34e81a8ad25a3ba3b5cba
SHA512fda9bbed702304b623977f2d89e720f87edd0fefb0d1c019e7755f2868a0681a03d04824f15c411c31d766c3f64c9305f6aa8e76ee74a6e0fb7836ba48ae2761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbca9a761209f0cada791907de02253b
SHA19bad77aa5fa6335bb10c3c5509bc9a51693ab216
SHA256171716fa8d3146700105acbf9d0238d718916802a13dde34e751c82808a9ac6b
SHA512a59fb8a5f4cdcee0fd7865f8d7fd1cc2c360abec64adbceb7f0bb211982686cf59149e4f1a97fa0675ce4f0daa32b1413e39b3408ece32c7ca95ccf357fffe78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5102a8453d5589b7ffae6337c782bbe54
SHA114e6e7c25ea7e7e429b3c4549f79b1b485e39425
SHA256047fbc72839f18ae4c1e52ab659eec5389e99daed75fa279decc1b9ff51e039c
SHA512fa5c8b2d9e9b4fbd133cf503a7aa69472de37dbb6b2ccbd913ef266b483ab384bb742709e7a5def1084cc57a7db81ed36b82d8506b073c3a1fb8aca132238207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b91c764a6caa9e8a047c0126c839799
SHA1e17f2c8ce61bb15e84d93d8ad693c2be25eceec5
SHA2568706bae4e7294ddc2d6a92d93547c72dd105ce63635f7c8213baf69bf423cc00
SHA512617659cb3b2aad96d81913f0f3eeaf1555de4e3ca5c04bdeae9a9355cb19255cbb4b3330aaa08126e37aad398ff55fad0de633ee618e0bbf12352bc0d4774be3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588df8756576848388466cc5ff2268e95
SHA11df9ab6eba4b52c980459e0c58ee997c2b4749a2
SHA256d40a85796414f044e2d41c17d3edfeb972c65f2da6559d338daf428c0e00982b
SHA51225cf755c8e1a154746bf7ba8f4067fd4c8b4814b5dbd12e502d74d2e5a26e688b560f71d87a95e8f3aa35700152cfa633eda052df47af06791b93c82c69593fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52307f6afaf1a63f14aac3ec5b73a7666
SHA1d17eabdb181f28b28fd32353679ca7dfec835e47
SHA2565125822a84f6b8ff4d434515e30e42b0884b930187ba03d69811fd1f61d89993
SHA5120ae8dfe7e9e399a082f015b174d2a4482f27b4581671bedc820a4a5742e6750ff75628ec19f2caa287a59fe264db3ea10d2df9ab5869ac080e853d3bd5a07e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594b75eff80f1ab89c43f29b08c3efce9
SHA13eeee00ca54e79d48387f00063003d5742ba935a
SHA25653b45a79b5e9c01e929a6822ceaad2de5502474fa6fb7f7c0f60eab5e628743d
SHA512c7dd2168b96b6e810b2ee009b11917c8c5e41f890f6b8b94bc53e16d28b73ba4eb058c648d04346bc9ca8c217f0316a5cf58dcb04ba8ad7537975f1dfc093643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5390b543587567cc64c0d693ca9c5c297
SHA175f8b278c15d746d1454c1e3f36aff0dbf2fcd3a
SHA256232e33467da961e70f44bc633a819c17c3d1d36abe568a61694a06e6c0d0c2bd
SHA512fb9f75068e7c797dd4beeba39aef3135c1adf5d26894f00281e4280d8695dc831e2ac3658ea31de81cf988089ae8ec8dd7591a551917e6ceb41a2e37c30af2a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9f688f2e2030c2b960edfa22263fa28
SHA1903bec120bc2d477b3c651f40b02888c33fe81ff
SHA256a12e66c08352baa9b38c217f168ee30ea825606cd2e94316951dfb0cbe5830e6
SHA512a7f6622be9ce9b7a5a391dede11b7826e81263e056d9e081a50a6f709e252e3c9cc99aa80fdf703c954e8dbf3c1a70023a1feb28f68d6927c7728d7e6388f447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddfccc38d9913d15c67cb96d26080267
SHA1e847d11b4e21235087d0819c12278dd54c857787
SHA2566622a77e351c7ea17065b4a8e6ba687a89e09a726ff5b061312a78a6f2e3ca1f
SHA512711596311cc50019145425fd9c395a95d8f075dd620815d2dc103d47198524f7bc313168aace6ab5b671cd811ccba63bee697d3bb5f3fe04f56e84bee08500f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dc460e78c429cdcef321133fd143cd1
SHA1ed1b75eefec0ae53670f88e9d2353a965dba92c4
SHA2567f371da1e4126fd2e8ec165eabaafdc6d385fd4539aa63bdeffd5221aa3f266c
SHA51291178165814b23a90e61f37d2dd619201b09484d6d07601984b2c7a96af1e42b787c63c3b419331bce1c3bf3493f9123b1608d13729880b64f89fb094f376815
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b