Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
b1a740cd999fdb4fe358211f583f2b3c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b1a740cd999fdb4fe358211f583f2b3c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b1a740cd999fdb4fe358211f583f2b3c_JaffaCakes118.html
-
Size
28KB
-
MD5
b1a740cd999fdb4fe358211f583f2b3c
-
SHA1
edaccbc5f7b96ae24a0e8cd76192bbec9f2d00c3
-
SHA256
04aca2d37e6f6ffd37723bdff9481b531048ce750636ce79998cf5c89cf36cee
-
SHA512
04f083e8202b07f2b7443743675258410f81cdab57d17d3819dc07d84df6e5f2a4f55db1a10ca2464f6163ca05b540c10964c5363ff75e3263181579991ebe00
-
SSDEEP
768:hdkR/+1hg2ica2W7tojt4d62qYxkIYvz3PAhIi:hQ+1hqca2aVdPqY07AhIi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0bae8ab6af3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D3486121-5F5D-11EF-98E6-E649859EC46C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430366073" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000091fec4d87f893a2a15e18d8cdaa4b9c8ec7e44effec24e31cf097603e1924e54000000000e80000000020000200000003fd2b707f25c0e00ed2790bc87c7a6ebf144f8ef715d5e0253b08b0d5844410020000000b301d8e3863d0b41eff8331d0372c20732bb08dd3e421c1f0f2f477981ea286a40000000a5981af13037caeef85c9ecaf224d4e351a969773834d98fccf2ae1d97a03e0702feb22f72b52b7d6b6f142c44dfdc7fa8af98142fbe68b1384adf4abd5d5d11 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2584 iexplore.exe 2584 iexplore.exe 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2124 2584 iexplore.exe 30 PID 2584 wrote to memory of 2124 2584 iexplore.exe 30 PID 2584 wrote to memory of 2124 2584 iexplore.exe 30 PID 2584 wrote to memory of 2124 2584 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b1a740cd999fdb4fe358211f583f2b3c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2584 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD586b6764f5b4e29c5cddec7eecc795f3e
SHA1fc9542f2495e37abcc026ae17a964672cddfe0d6
SHA256ea8456e8347973d749fc151ba352a1ad50ac5109521cd3a3e22b38225e2fb2e8
SHA5124680dab648e25dc4f574ce8df203339d160c2580098b88943b0bebe5215842de020a59cc7ed2f718cba9d843b2abddd6f74f447c586abd3af92bcefbb88d32af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc965f397e8d5b56340410f94a6aa93a
SHA17e352b264f24cacd6cb6a64aef891f7740dff527
SHA2562f7a1a2e54b80e03626c36537717c23fe2cce13c92499ecf17f51a6a99c1ea21
SHA5124f7253624981683949952dd6d73cf238d872d03d9638bf1d3305256826ed570ed61287cf864ff63c78a936709a934fd824aa0d75b173d8527d201362bf0ac143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f679028f0d61d74316c632b5e0b7a381
SHA136fbbf06d9c68c3dfee4521afb892e0dfaa41819
SHA2568e64b355049317c8fcf02ba23f808c37bd716a9691e041f2557bd8ff52106fe2
SHA5125afd791750efd836c22a5c401a6bdbb97a9e61246c048410e7af1719ad22d75a902ad12533340090b5c2fa116c96639cdfc254b9ab526095f15096c3e88e4acc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d1383fef3335752d16dd7e93d3d0858
SHA1313513a36605ee278864477e75f9d34c6b0ce3e3
SHA256b835517d7722fc00203c5343281237998a03c1d97c5e0a7f49b1a2ae7da4381b
SHA51229a7321b2d821ce7edd6e5bffc53e9feefdc1d88adb7a3806cb3c80acdffb2fe32db86451193cd309d22efce49789a899ebc426e4f4fe030fcab3b0e83256a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5567178e1670503427ca8433752b9e1a1
SHA19658117ed53b7996421e1edb82a98bed3a75c276
SHA2561080323ec5b9ac775d8efb9bad9bc9752be6395a6118c334e779b649df96d00e
SHA5127015bb566a16046ed22803f4407261a2e5c2723b92d7058b9a3dd45d75c81f1f5da1ecde6342683b3a2a5ad3859c29b8f0a8c7f605682b5fd7c8b78c83c7a360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3f1cfce471333c43fa45b2d91ea4733
SHA1f8df876ea0977498697f0a48b9346624e02610bf
SHA256312895dde0180315e3c4d0ca91bb4c58f7539fbf516688cff7e17c9964b76e8a
SHA5123ed83c376f211fa236bdfb44a8e2f6012c52bea299d4a4eabf4594a453d87e10190d6aff1d269d9beb6cb3ea3a051cc961532fd1326bad287f12f1adb0808bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5070395b9789b6e43ba1915a4358bffa1
SHA1bdaa8b9ac951d7cfa11cb922ea1eaa9e7ec373ee
SHA256d752855bf73237e5f14e0a856c7bda16d9b6d0f4630ea99c66774783e264058a
SHA51240e2ccefda621239dba57424e46a0ea218007865e8efa1af60b7582d8337e385aaa92e3ec8c6baef0b389274c854009d33e00dc4a8a8c8bde94d2659f20a757e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509a89b1a782b992bd232d0a0a0353900
SHA142b0fa3c6a82a5c394dce69edfdc4bc5e38566f2
SHA25631f9425b6be64646e23668808288718b09f3083ffb34a49e331a3c6b4276e11a
SHA5125c20f0a715a39edd7bb41b5b6533cf908c889517af02d6725145fae99dbcd59feebc09950cc72b3e4f57d9027e19beb0fcfa6ac7f7c3ecb8a261cd8f5a1259fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcd947f0eeb1932149a95605b518f49c
SHA1b16417bbefabcb56700c7aa5e9f18e8600a77282
SHA25646dd62b814d38c32d974bbbb294ffcb7864e377bfd5de967475aa00f2cdc7e22
SHA51217db4a3ffa1e3edca9fbeba89f0ef0b92cbceb319acf25fcb9fad81ba490fa5143e2daae4ca0825455c2d3da624146e18fffcaf701acb5b39cf8a711aaee7a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572d718e8ad8507aca1e6644e2fe25879
SHA15a71f2d22fc7c8ef425d9b92edfc5c67bdbbc8b5
SHA256f58b3ef1443dd3d28ab39d585e8c7722a3ebd9463baea78009a79f148427b8e2
SHA51276c876201387f999cc42b791a5faf9d4dd1a145ac177e721b3a3f6eb386f806da08e4f46bda36d89fa849da3addbd5ef468488163ce1f99f5401f568268f3733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd68adfb16632ef29cc55d3aca919c47
SHA1ae33c7ad59a602c0b2e8063308b9322679be0d77
SHA256f9f9b8cf92aa139f135e98c3d26251a104b3ba9b20a1e200840fd9a03a7ad884
SHA5127a7e281f42d452589432417542bc504b8289f49b2206fc2636b12130583d6f1e08c72359b095fe082a56ce746a460dcff5509058bf03dd3a8ecb95100f1defc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bf1295068cb0413435f5fa204a6358d
SHA1f2435e550c0ad5d43954ad61d7775fd72e0b354c
SHA2569c98add2993246a8801a960fa6b857820a4da1a922598d5ca9aab7bf48d37251
SHA5129f066797833f1f3060025ea33393d782fecdbc9321b74f688e45850b3d3da9dad386bb8cf415e9998b8fccfe26a6acabc8bd6ce9383b2d2c90610874f6e8ca70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a9a73577889044a6993e5b21a0e9d89
SHA1591290a86b9443b0e77abf28c6a7f8dac2e450e7
SHA2567e0f053b7e33598301662934791f93a8053c7280e1f82293ecb29616f3227796
SHA5121ec1b128d8c35c668144f832dc735800d9b2e98ee5392fa47d83ef1b822713f1e06bc97eba4bd51898a37856b2205454d8611122fcf14bb9646a4632168eb0bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596b49cb92c3d84c2ced7d64e52ecb2c7
SHA10c9ed9973883ef010d5bc9ccd67e03f9b600686c
SHA2569e22c92454ff0f9cdea920bb6297a14f95b6d3230ac0b428d82d5a0573a2c589
SHA512dde800889d437a49e6c1a22b0cfb3de49d2c5a40491000f78056c1588a4444dd1d0af33db8bbb9c0eaf39dee08a416c3df3ec330270ddce9ad60d893f938d18a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5563574c586bd6f2d37f5ab0b2691008d
SHA113f5220a92a97154999292f6ae5781fb05e10aa6
SHA256dabaa8dbaf87e0c54fe494c309933d061fd9b8a1a3235112b919b2ddaff85da3
SHA51286e009e208d33faadad7bed3ba9389ee5fbfde1e44697ce8e761ae0ea9548cbd28f1e89409c19d0929b3106d9b55412c7f81985c23fe76927dbfa468599febf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3dd709a6f93456c64bf43820c907d00
SHA196f664e9955b4a0d52c94bc4e4ebceeb49a799b2
SHA2565fd76c650173af89fcebfdb98399c0cfc431b739886d7e2d1aabb009bbdfa4bb
SHA512d409bcb9fb1e0f3f5bbb425ff5c9ffdfb9fa87c2e212bb6a4acdf352708c6f5663be85114edf8a83b42ef34b230337c20cd640629d07013bf0c0e8c52d8c0bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD574424929e1da4a454a84f12f2c26d981
SHA1703007a0fdd6c6f5e6ea790bcfba3f45e46f5ce6
SHA256d086ddddd130601649dfe92b1169d55484ae1af79ced9bd67cf06e813d08e1db
SHA512fc37f68f112c0b882e98e254a1b91ad6b665e5c9294e1a14635d22750b3c632bac04f71ba02ba339befe09c0289d1dfb03512661f26d5e7b3d010ec5669aa1b7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b