Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
b3bdaddcb36323701f8bb16d6abb30ae_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b3bdaddcb36323701f8bb16d6abb30ae_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b3bdaddcb36323701f8bb16d6abb30ae_JaffaCakes118.html
-
Size
53KB
-
MD5
b3bdaddcb36323701f8bb16d6abb30ae
-
SHA1
ac08d4281f8759ad083bc720bba77d02ecd895b5
-
SHA256
97655eb535d7407e3cd66a173be6b25b571d7eee5731e4f7a77a3ee0e377540a
-
SHA512
5207032256d9ff7b4e1aebf0c77546be4eff1ed70b909d1c0170343257f7b46dd1184ee1cc8c0096838f3b5fb65b4ef3dd1655e5b3632fe13065b8d812eb95b9
-
SSDEEP
1536:CkgUiIakTqGivi+PyUwrunlY163Nj+q5VyvR0w2AzTICbbfo+/t9M/dNwIUTDmDj:CkgUiIakTqGivi+PyUwrunlY163Nj+qL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000195ae3232039778928e384156b436eff8d4e2fa9d460926c410ac0411d2bb02d000000000e8000000002000020000000bce336d241bdd858e71c076cb7aec1c91bee56fd6970faa0e68aadc5443c255120000000ab0420dc6bab32cf80cddf0185dceddd057cf9fb0cb48015796de8da7759711740000000e696653c029af3be83823cf713041005a29c261e63d9e85c768cfa22fb41128eeb8eb96fd3cb271458f171cc2c78b4cf63b8bfbe6b73b7a3877d7c77b9f51d7a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430410717" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C49AAD51-5FC5-11EF-855C-D6FE44FD4752} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7043af9ad2f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2288 iexplore.exe 2288 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2756 2288 iexplore.exe 30 PID 2288 wrote to memory of 2756 2288 iexplore.exe 30 PID 2288 wrote to memory of 2756 2288 iexplore.exe 30 PID 2288 wrote to memory of 2756 2288 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b3bdaddcb36323701f8bb16d6abb30ae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ab3bd3dc296b18e3a5fb47e38114cbe
SHA1a8f08a0042ccf3c08198c5736c69707ab5de35e7
SHA256cc957643fe2b43fb225258ec79e9d1844c7ab0e7906f946d0cfa6a335f77cc00
SHA512978df0f7dc7e7ce300ed3b820b662855cafb01148f4346e5af12b7a60c7ae17485037f4a6d0cde56e50c1d03d00d52ce6657173f9c0e7ca41dd0f83d09d3861b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56393d00c4d4006f81eb8c686336a5764
SHA1a5b21b37597f0c8b4343c2cf49de3686477bc89c
SHA256c6394cfab5df238a7b36ef301a70e3b48b5f9cfbce7b54c82ab7071327dc88c1
SHA5128635d5bb457ae278de97d9e5de8b9f969f5291495f1d9e6c8b267df1935bb49251f0d4fc99fe27d3f249089171bd8b4a0a78bbcebb4e0bc7793392f15322823d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5263c17fbffdeacba09de6f33dbdaf1a7
SHA1b7374438aca2edc32cd223a08ea53b313d6bbf3b
SHA2568e59e2e2e03a92a345bcfe960142bacb41a82fe8b7fab19cff56fa5662cbf0ee
SHA51202cecd77d0968c3402e24fa42ec00f801ed6f05380e69d49e4611066434a3a753ef17aa8d48760898338646d627a3914501c4fc8e4bdcfc7887b6245137bfea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559fadadf98ad8df56ce8dcf24d3acfec
SHA128542e8fb616ba085e02a44b82876b395785dc66
SHA256b606631af66722c11ec9fe20761b98893234d61228e8759572bd607a0eb3933c
SHA5128b50d7e878a66cb8f4cfc107a40aecb64310a7443af4e9d5a9f3a4a685b2dcc29a23303da0a50242091b483aeee419d5fcf1905a959ed0f3dedf074ed6066e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550cf7876530d08081da17ab7c2394626
SHA124ed5f7d6e018ab2b8888d57b11b8c573b71d2cd
SHA256f47652c0931bca032037dde68a2a332b331a4c9bb668aa24dcf1fddb3199578f
SHA5120c1fa73f39da7bf67e0df2f6434f75867ddaac09ec40e4aa110bdccbf198d7b34eb17bdcd37e6e4bcd6baa1fa50e3540f9b4038f16970acc5d9a4021c817e1aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56df81bb61d2c04f7f6e6d3b263842239
SHA159278e9ec790a343ffba2af2d79cb63274fbc962
SHA256042c0b51a9227fd1f3c9a4ad7d16bd47a4ba66949de156059d9ac74fa48879f9
SHA5128e6c35313e4ec7a6ad9b4f088a9b46cf955fca9862e6973731f646c99b56805c36ff652f75a8282cb38639c7f9252496458fd1917cae2d86c132dd4a82af1d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c84f22806536c7537d7c2525adc30774
SHA1d8d12c287936c48f95300a9d49262be21b74434a
SHA2562f501154281b98247e2f62cb73d5491d0f8b6bf66b19050b980d907cfc925f4b
SHA512e93d5f35f4eefe32bfcfefd15cfcee7f8475101484a5e1e9cd0d282d894e1222fb48a32cc500a61404a03abfadcfe6f3c98124c2d288af8ebf8f1a074bf7e02c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe3bd61296a3f29669b837eba19a32d3
SHA1791e6a1ae876654df5736e86682fd201e378e2f4
SHA2568b1c73bb2522e093b1a07ce58717904697ecbb74a4479b5785b05bd649c54d59
SHA51291da92448a8234e616ccbe637b2b8cff43c7289764efa6d20a7da824439c2e1ae8e45182bcfaed7501b95a52450bb3cb047fc23cec19ff0ae209f730cb290629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b353c7139f2d987b2b49905955b07e4
SHA10492e95ccd477c9001e48a74b1267026be89f705
SHA256778ca14c3f3a02509683bb991be29eee590e16a6db88585d7b491b2cbda7c660
SHA51224a3c80bf441b4889d495d04393afe061da7a239104391106b632b86cb055e490615a1e76bc0b72502eb9cc237da072cb75e670bc8d5c0c9cb00e558cf5caf88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58703e613ec1116aa46fea934db832ca3
SHA18e81901e93e94ab3dbe2b5ad8c1661683e4ca3b0
SHA2563ed962838170f59d2acb713789754c603195fcf729431fe804631d81c1fe1fba
SHA5125f502f98625b049ab176ad7df84bdfb692cbfb3cb70b58e3d1b5503525613b18a620f5e3ed61792499eb3bcf44d32d6f657071628ccd9223e03456676090ce8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573d139ed763ce8f0f71bbad72f6d6d0b
SHA19ab9f4c4f60ee9a1fb9467c373ab960703237b83
SHA2567e343247a9ac685eed6bd9a62b0415e8332f09afea3203e822a70bb7d36c14b7
SHA512aee171c663d15b7d4f0fb61491a15a20c1cd34874cef516e07c1fd730243e4023909d4e78a9026e6ddaf8837754b0fe19a4d018c4fa6bbe22e18818ec5ad8a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f10860a06f6c98cda121081533d2c0e7
SHA1bdd86cc25de64f3aa621597c13e43765363a1d0c
SHA256e86a0ec80b034f9ba16551ac3aee20bba98b1ff84bce6e624696fef4c3e30907
SHA5126a6f7bfcf37c5971d6952358763579fd00b893294fc1eeabe13e33c893f13e770e17795a9673180b63b8126122b602059a755e5cdc70eb788d68c62cb438385b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5367ac1d0e8d07366703d1ffeefbcbd36
SHA1a319d42407582c2b69db3c3c6f6c5eb5171f5a26
SHA2561cc683279775ef1dd67d85a0a3b2f41b644c38dd0311feac09172e7e446515f7
SHA512328431a6477d467dd34304717ddfd92440e1d05502ebba20d86dc6501b5645da88f71f1e3087f92695fa75d52d0be7d00bb9b055631ae04b39e8b022dad402eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50049a4016867560c8b88086c511196ba
SHA1ec2339e37da4498a404f45a02d2ac75ae8ad2399
SHA2566936d365bd4d84ddd093f024ed1fac1985913c35218ab3dced0e8f539239114e
SHA512a6837b9070f84eb0fe8afe188578a5b608d93491d153cbb6305ef0b1d871aab8b9d84aa22beb7d3e90da2f2f60bc355794da109f4c382f829f7b44ad94b65ab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0b1f07c7772563a422e08b25a891dd0
SHA1deea87585902366aab34e7d337236432502b383f
SHA256aaac58c99511cda5c12c7dd065c636cfee9783f356a8fccc59b61c62fc534f40
SHA512a0b1d2a9ee7fbadcf123fa4d575aeccf6565dddedc497dd5ca5743a2e34147b22c280180f5d68bca1d8980a7aef0560d5f8e96447510cce942865071d69b929e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d2f13605f3528b1b4f7144200500869
SHA13eb95ea9a9c9b0d9ef7608972f8f6259db9ab35a
SHA25637885b6ca768468f25516714b3dd35046a0914d031f9836b1726793cc72d234a
SHA5125c76ff83b07bab9a1225723fb34017888d6d02c1df07840b0f1a188b343c3e6d12afd3e1438bd24bc3e029232cadbc3bdd4ef404be96b072562e20c550babd62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2172318656f7d38d92aa8f126703e8d
SHA12db8ec8281a273befc1fd9470b97d91f401311d5
SHA2569c9f7d78cc642eca19380972a1658c40c005ad198e4656f1fc59a839869777e9
SHA512e834507a476e61a9272f1d00bb00983384bb2c1a5d79d5048bea5920627050427d2ae2839eb2b6c56b92b540a056a134aa90d50a53008ab17c14e5506b0a9cf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5852425d903ede1041f30c65e2f1dc5af
SHA11d2ea44ea33655c87f3514da772bc6f0f3fc3da3
SHA2566ca81ed44eb65855ae357cf2760237217e02d66102ae2cb4391e1553cfac7a77
SHA5125ecb59776aa1bcc2386f72bfe7293fbe2ba49616bd9c6bbd34cccfeb265fdf7d8d99f1ff86f2d6b73a2bb85b5b10214680f953b862acb37dc1d7db751fcd3599
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X761FPIN\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b