Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 06:59
Static task
static1
Behavioral task
behavioral1
Sample
b282ee99bbbbb623288168199e5c30b5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b282ee99bbbbb623288168199e5c30b5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b282ee99bbbbb623288168199e5c30b5_JaffaCakes118.html
-
Size
6KB
-
MD5
b282ee99bbbbb623288168199e5c30b5
-
SHA1
e29d6d5d1af23e2e5f9ea18ff9208c9877f24504
-
SHA256
06d797aadba0e9f93a7d11f68800d3771ef560965bb6348d9be3abfd5bd82395
-
SHA512
31fdc2615ffd6b281ae2623438c652eda19f542852d99251a7bc2c6e573f2d6ccd0633394eb1f782b5fb6b240e7559b3b5c0c808def588587757e3cb29979a88
-
SSDEEP
96:/ubGiozQqLs6pR8L8PysBsLIoQQBFYX9nl/RlwEHpotXfsIYt9CS:/UG4gsSR8gPyrPBsnmEJotX0L9d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05d3ac197f3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EC307151-5F8A-11EF-A839-E6BAD4272658} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000e0181954afc19c5ed43ea19c3c0d36d507afe21e7ca5ef092888f50654d643b0000000000e80000000020000200000000e810cdd98675c9a972d346f96f4ed2f788d18ddc092e8e87cd3748a9e51bfd3200000001f1e13c07ac02ab71bc910a3ac9a74fb040edeeb1cbcc9b28f07855404e14d3f40000000fab3591c563a36517555ed7add47b04bc87621ddb12f98a9a88a305dad988e24d60ecce5d670209ba86b75349400363d1fc5f17124b17279434e9ee5358b5d4c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430385442" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2560 iexplore.exe 2560 iexplore.exe 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2084 2560 iexplore.exe 30 PID 2560 wrote to memory of 2084 2560 iexplore.exe 30 PID 2560 wrote to memory of 2084 2560 iexplore.exe 30 PID 2560 wrote to memory of 2084 2560 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b282ee99bbbbb623288168199e5c30b5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2560 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ef87d4311c796e4b5015ff9bc12e7eb
SHA19fdaebe7d3de02934c991763541b28f0b670ba43
SHA2566d31f927b69ecb7e565716daf989ac895ef39c861d583170c6a2976b9ff48773
SHA512e123f222d2b213846aa05e47bd61c006f12a826ccd4187b096cd475e0228b072c94d53714774140da1cad3050d8ca5ddbd4d0d0b44084b1e247abe6537b5ea2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd1c7ad4b45f2cba0fea9ff42070d02c
SHA1d95c6cf47789c0821f358dc8a65d78733d28d6b2
SHA2568dd863bdab091c57d1f25b1ca58f76413fb8ed1ebd614cff18f4d2cc592d4095
SHA51256b2b72d24fdff4d74f364038ee03901475c8a5e2cc037a48a38f2efec642d07ae560bc8eac89ead527c68755e8216ddda3b01dddb29ea9510109b6a012cb96c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550c4fa91e3082adb3a9cd17647e7d20a
SHA1d7a314d226916b55ae70a9501545195ff5a21907
SHA2561293b5eb9cb0246e7a1370360d90409f594f8254a562ecd4699b9c7f924671a1
SHA51276830619df3611f49b94124af5f5717e775f3985b7ddfbe3f361e1eeb8bcf7fbd48624f1e77d7cf7c5a8a2b41df5df62578dc7f434ca78a08aacd7f2dbe7ccd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a81d7784b6db8381568a7de031d900a3
SHA16bfbb1ba9104ee64cc34f839061b3f153eaf9a03
SHA256f4041c404964dbfb6f8c435e979a5d690e3ddaf639abb30a389e1869c66d522d
SHA512fba21f12342fcad24524990946444739757b896214c41652c47d668b1269466fd571c8b11f23ce8a8705a5fd68c4894042368ef2d196a795237fd422df5d328c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5137b271ddc33778e9f06b9ac412555d4
SHA11e3b54f1bbb15a9631fe0772da4062d999f7894f
SHA256b28da37c9457cf13f136ce3480f39ba94b3ae05afac28d8477f9a5402b303c3d
SHA512de9af6270062eba44ae50ae3e5c3987dfbac8ca4b53f93442e03ff07129af7b1c7011249ccfefe96f1e362e6c1a11893b16b99920562185be83e66359ca072b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509e0e0c9088f3407fef06948397aa752
SHA1825164329ded05d6792475c92ecb622546b44cfb
SHA25645ed058d7744daafb78ebff4597606ccd9e2d0649226d77945f2f40bf413fe90
SHA5121e9d2bce2d90e64c889535fa31384725c029377b938af7e781f1bf980b1b1f9b42e196bcb9b320cb8822e8a57de61578c25a67dba43f17acd4ca77d6fd75fb8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e2f0bb1f89050b44922a1e9f7fed856
SHA11ffde6c10ee7dfec5bfdb5619ddcf92a02128e94
SHA2568e3609d12aa0fd68bb11997f1f2d113078115e7a735f0fe9ab2cec6b99a9b15e
SHA512bf0f79d909fcea62b7fea6ffe9113a1111f99881360bd7ce3c03a5184e31878b1ec4701437719f0a9f7c41a84c4426a86226ddf96e0161563c86b91d2bd073b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5582f25234fa2eb76ce3a66abf60cc0a4
SHA1cd1ab3b6cd3f2b07f06ad9b7e326273d94ab6c35
SHA256d5f4ed659e14ca83c9d453e07702b0e98a87627b592d188de715a571d2acd50f
SHA5126fe71ae2b8d410e46d55b0886d023d83d595bbfc3734474cf1825eecdeb43cd80181b9260d179b9eada3044bfb60bc979d1f0347cbb168978abfb0a3bc3204d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c78e1928c4aec70bb9312e303b8883f2
SHA1d7e840dbdf20f1bf8630a1884ec5908e20b2a9c4
SHA2568ce3f56b0c7480a2e5d74131e811e7e378c169c6459cbd405c7b51ffa9e4ea45
SHA512450f7ab9b9187e3cca24f2e99a3082e49f7a93569fe0ae2011dc0da09a243b6ca2f61ba989d8efa0c0cb58c1ec34a77919dc40c8e2efaef880684f4c88b2e7b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6fff16aa02f4d227b9c8314617b3b03
SHA10665cd13f8def06bb3c3c7e4f8b7e7f6e0825016
SHA25674e221548c9618bbcf3b94314dca90344f59d34f761117c755981c16ad73e00c
SHA512e88509002b188084a4caa1c9d1774da3bde00d548d19641b9bb950a4512f35022d598e6ba361e9692b7814105535de4f3b298fbb5bd5feb69e3268d27b7e8f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5383c292883f3b14046378c686757a0e2
SHA1a9b92b39adf3d5b4205e4a5aa0974f3a60648e7d
SHA256d6fb04ecdb39cc6f70fb1e6e1c47f8b6c5a88e03edbf77dafc492aacfdc89edd
SHA512c1c3e854184ee73e90936b7874c81f083cc871b45bb7b516b460fed4c56693f4b2883f41a874c06a4562b0f7f6cc2de7d78932111e7ace6472aee63ee9c4d9b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b02776e584083139d3bab2e2b03a380b
SHA1ac5b99b8c61c36db5af8f5881f6c5fafd8a35688
SHA2563f85ea3119b42e5f1a23539f0dc8c124393dabbffb70b97c589eb8190900b3ab
SHA512635b3b9fc44bf9101e39228f8f57808a6877dded43fe0960a1758c5f0bb7711d5222c094625a21d56f3c58a38f6ce884bb4526a2c3f135be742891945d35fd81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c12433e5d77ac6150754a09a4316e9
SHA1ef99b11f2ec3b966db104ad5eaff741bfda28613
SHA2566157073563953f674251490e3f8de395ce156a332a4d77f75a9bd816941f711c
SHA5127cd149f18214f65c4944e65066ea9957a230376ffd7b31fbf4bb10de992f3597e952ea8888d09701b5dc239ceef796694a78857cf6d9f026dfeecda32318beaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51600402bf5ac47e5b25f44bbeb4d8bc3
SHA10440350979ac0c30ff350179139be98ac6dca138
SHA2568d8e8fa106c054a0bbe0a899f8b26858c4979a151c398fde332e5a96ef2796f9
SHA512ec44d75daa303412fd5731f4b9f27a5f9629b34bcc4e9712f5b0127ab8cc09801cafdf150169797a9bb4a89f0abfc738505ed79bd76e106944cc9e4ca2187cd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce609701b9085032554daefc5aeb1892
SHA10aeaa26a74fdb3578a806f0a1bf66db933123330
SHA256c70af8b8848f42a5e2fa2ee5700d094f32799371e87d6de63217cf155634ca79
SHA512becd52b65d161b6ebf05fa5689689b40dfb27e07b2f8f32d4e285eb29e08e063ecc1daa2e3e24d6beb62588c64a0c5424f63a86c964f166e725067417a43f5e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595a63f5bfcc081e01e0d438b64025814
SHA100c32bf007a0a4ddcc46e8de555bbd13b6df46aa
SHA25607c3bafce030528da71067a930a2a7bcc9e480197e1ad67acc47f687d873c8ef
SHA512642f0c0b50579a534386880b453b792a312e6712a1a809b5abf97bbdf82bfc831bbaa903e8cc80282f140238adc9ebbe88b5a8610a316e30e2e6f2ffa59b681e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e05e15d347504b186e28b48829781fab
SHA1c91335dba786d9584fd94095401bfa91b9b06b80
SHA256d9c141258f8a741eb4cce76d7b2e2139ee97c5761cff4281fde428085970be88
SHA5121509d8065f0ca756d2a6d2bc44d209bb5b284fbdbfa02776a6901f78ddc9f8386b3aa73ae9df99c1d573eef8e43304c5459ce7a2f5f491c55e4f100473e50257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7b231b95090c616d8a880006a32707a
SHA151aef979bf03dc1bc589168d95b3364930f06503
SHA256722b0d18ef92cfdcdffb7a0bf9ad984d3f699deee4d680d06b65560579b974ab
SHA5126bbf2d81b89bc417a8b9bdf7c6a08f081c30c183322dc6ab834e9252624aee7ed0fde610f039fc44a7879864b8ecad8baf87edaa53fd5cdfc9600a5d8efd0dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0782bba9e552d2f15195e84e8ca3e58
SHA1e2c866291256cb8f164183f4008ceb9ba7ba71cc
SHA2560fedcd608142818938e367a978f7848541e7468b4adbfd2f7303214eb489b9fe
SHA512f2cc3ba21c6c5c1376efdf1844cd8a5be07c157d35da4ea02bc6e756982b79293fcdc55d622477b4eefafb87054b726a1a99d7e22685d03f091ec2cb5e116bb8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b