Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
67s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
b4cf1cd2b7d50dab7a10665eb7d9355f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b4cf1cd2b7d50dab7a10665eb7d9355f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b4cf1cd2b7d50dab7a10665eb7d9355f_JaffaCakes118.html
-
Size
6KB
-
MD5
b4cf1cd2b7d50dab7a10665eb7d9355f
-
SHA1
effe62ddd215eb9bd4e343360b447e4317d45286
-
SHA256
44c21d3a44ad840711339540ae0e3a751861661fa45ac5cb165cb7bda227688f
-
SHA512
afa78b1a9ef1db2afa98227b2c0b13e874ca0a09a34f1dc348b91948d8b6a7dde1959d494e69b15533e7e597c18db89e6c07cae93db01f00a61d0e34940eb06e
-
SSDEEP
96:uzVs+ux7todLLY1k9o84d12ef7CSTUTxPcEZ7ru7f:csz7WdAYS/oPb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000007f37ec5085f76096fe2a1f98d509a0b215851048ae8894401179f6dd5d74869b000000000e8000000002000020000000fd22a07581cf134714d810005d1839c4e4e9ce723589e0a2aaa39aef0b2600dc2000000005f45ec41dde47233a734bb480559dcd9aab8a974a5ac62c13e5e9c7b917db42400000001867c69e1055b882a8399b758dbbbcc412792cb7cc9d4c7515c651883910c3ef12448278d179d172baa4d2bf0e40ed9e82b8d7f668f0d515e327c9206280d52d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430431777" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CDE22C41-5FF6-11EF-A2BE-5E235017FF15} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7032dca203f4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2548 2220 iexplore.exe 30 PID 2220 wrote to memory of 2548 2220 iexplore.exe 30 PID 2220 wrote to memory of 2548 2220 iexplore.exe 30 PID 2220 wrote to memory of 2548 2220 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4cf1cd2b7d50dab7a10665eb7d9355f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a5f1b715a2b79fdc5aec47392bcd94d
SHA1717980584cc937a1beebe8b34d31c8846a1d2cd2
SHA25654d8884e97c2d72cd169a5c8171a66798cf45e327003d51ba7d944be086d4de2
SHA5120de31c9d5e862ead0dfc861bfa6aab4f9ec85ca884f10d31eb4ecaab9070474c65b4e3c32c74ae7fd3182831ef63befb4bc9479e709b4b4fbfe95a73de89417f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1dad5171bdc20e5052accc1e3ec7096
SHA164f3a887c94815cc31a20abc04a578a0f058f21f
SHA2565cb0962c8544f229b2b20600452091481aa23827efad94dccf6a8c09861fdf47
SHA512b1809ddc1dae8b3207a3154876f2e3d7db8349466765564013cb113bb860d249d34c3b846b6091f777a40336d5cdf24405c7096ab8184c32ac7f378b9df4657b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5753b5090c3fd0bdd470ccaff3b365597
SHA180605ea4e2506cdea6e1d292ac6e3935329c4165
SHA25613bd118e2153a82ebf63e7c3e1bacf535347aab85d8b3028853d2770cd7a472a
SHA51255fa3237c0f15bcbd2460e899e9a0aeb183bdb6d2da9fbbc29b3462a9ba79a41af80903a2ad9f7a15967ad0b92c9f20326e10f136d0182257b86394f56d31f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a342d580f2d749114ff22d233a78305a
SHA1a8ac03db8de67bf78ca17e57131b02e72367eb7c
SHA2562ac0785f55fae64707efe07148f7c066a9e702f07305cbea9cd23d7e5d0af2cb
SHA5128b8b66bdd33822d30394914192e2087cb98cae4c7deb394aa454d63773533a7358c5efcc1c406ecc5bda2312b9cbcb2e5585bea4512641ca892c345ab9c0449a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fbfcffb84f4881ef8cd78888bc4ab93
SHA195754b6796e42a64cceab5189ac1b35e09af8b52
SHA2568134952536dd908e0dd821693f106feb6147a475d0949112afefcda098e95c80
SHA5125ff4e0599f3e59588d365544b3be6e1cea786116332a6a5ae56826683efc63209031754ec4ac6921a0a5be7d3e33587fa03cbb65dc61c59c93bba729a9a0d4ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590f82ce442faea480eacd3452134623d
SHA1086a60939d0e33ba2c76a246804c6e1b7d39075a
SHA256162af83d55bab8f42ec988fdb6b59899b23298d2c626ff488a98e929dfa9d83b
SHA5123de7c24eaab039fa8c03aa26cfc64d5ee48af1cd3c8b0cf7f8d7ba74b7ce58611ad027b0faa51f8701e39d4cc607905f6d06a8e3ad6003c041b63dc53491179c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579d61095ab2fb155fc9bcfedcf37d2ab
SHA135d8dcb80134a8b6715e605c49b4ff4839700658
SHA256ad795c3bc4ce99aee5bfef604b2866b0d795a405152c5d22b3371af5e608a57c
SHA51297ceeb077b6f3a5785cac567ff82f1713407dda5c86a5f8161655681d1735e07dd06e550c42c471603d0ebe866fecc57f081aa3d7cf7c77dc829333969279424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec8842068bd5ee358d2cc24e094c3b27
SHA165b148f03716f0183e4f0e5a07ecc8c78f3d9c1c
SHA256d2abf667419547792225b4faa404c5c535d0ca4ec26362186af3f7c1483e12bc
SHA512b68341b3501d49c6b2826fe5a68b11626222a3e771946642557a69dbc194b8051084801959f9ef99217ea13e286e53a5d7f48406ce7c3466ed0d144e1db8eb6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532c525871af132428347f82f8033d2f2
SHA1da3d5f1899edf4b12917cf93f5e483845d27ce28
SHA256d17e6c0e2c4c60a95e894684dee0b1372433fdcef917bf390a50a51cbf0c0d14
SHA5125c96cb9f97078d965bb3288120c2fbe925f9a11c5d48751bc43ad65951077b6b6ccc12b5ec948ab4eb5e4dd60d87ed49a7b9d00acf47ee3efe8d164f71066c6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583ac1cd0404552950c569e8863d58311
SHA1844f91982126f1fc7778bddb4ff96522e0cc5c26
SHA2567c5d7134a53778ae07c13af7eeda2622edc71f62259ca45dccc7612660965dd6
SHA5122b3eb5d0a01ace1499d738b1ea2220c601e1f1f69865000591b579b19e60774456b38eab283b42a14142a7d0454660682971e2edef7102d74cf5783d3631ed79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d73a8a586c787dbccbc0fb21a41a0331
SHA12a89a3cb02e02557345458f6d2d8f791665242ed
SHA25692e6ea5fa7fd126f89870af50d2a6581bed44501ebb690536bf93a2a5099591c
SHA512f8e6c80a1b6feda4957895ba1609b8c106084005b99ec668c70273c6dcea519a150f8f71414a1b578c0ce327724f84bce8ae207c6417e11509a0b626e524768b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb961d5096c5955978cc2d9a82aa35ed
SHA156865c11dbfe85bffda8cea2c6785c5fb223c292
SHA25621ddb5347b34d3f357bed2aaf41903dd7320af3288b2d10730faf9430adef5d1
SHA512b065270362aa42e82cf0e6cb236b7540f6de607d389f3b41e58dc19c93110173317abee035ff3c70c391914c93e4797233cfcd19a6cf30364422a6ed25107db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b97816d4ed334e8584ca914876bcce8
SHA1f74c7c79da83a9299664a42d17d20a52a2b00608
SHA25692b983770dea8fb89faade112e46642a1d40feb9d63e2a9f391312dd9ff6b597
SHA5122143bad1e1135ccb0af3649826369efd7056859ae898f13aa7d720ae0e0f6ba5a3de83da230553284995d73ed43dc695f7987c35646a2a998b41b3588d3720c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c38d72384b5923992968696cd45ae96
SHA1c2155a8a08be92d2e9510121ef2b9158cf52f08f
SHA256fac7e4b0cac7803217b6f4e6989c66c589bd05b3deda17f5e6536aa8831a44af
SHA5126e958f94922a969bb452d1c52e2428654c269363b54e1ec11255fe3b2341fa7b86fa9adf8a69f185e5f04cb78a216480d6bb16829a52c453a5ae5581441e4c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be7992a7365266a91c087758e6db5a75
SHA152aacf1e81b612e75cf76e8a0de444a322885f1b
SHA2564e19fa42354cf44c16cd4400f800bb8e39b1bc61202ac483d78171f51b89e36a
SHA512aa6d2aeef94d0458c208994c14a61f3d4fca91f9f90316916f73318617434b0c8ca1c96ff2865c08137c7f77584926beff793b1a45cd517df8dd5011856becda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5679020d452e9b7c38ad3452efe961ac1
SHA1676f776c4a5f456c818a8841bc28367a11b2967d
SHA256656fbe2b8ba42c4b78309358ace87af2834affe243e49879fe39d05c1d7b9328
SHA5128d8cef288a02f8e08fe2870e7226a8dbcd1a2b066f26f96bd1075a61e051f47ab5b25bb80eb68609c9fe0cc7c3c1739f4373c57f476d39935f2602bff1dbb6d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d92fa06214676feb54260578cd512c81
SHA14c35ba0850f81d180d4cefb4260864261f03f55d
SHA256a294641f80ce78c885eaedc888c4e370e7fce230bd038d1cdfd321dc36e5bc23
SHA512d2ff71ae0d46f56007346ccd4e21789d9533249f316cf4b8088d635f8403f5a84e0b4c7a5c19b21759796475da407a4f8c73af5b39d5edbabf23baee39d2575b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f74a35be45b2047b08e75b946b515a91
SHA1f369a6e5f93c2d6af5f4549d20db99e8f400074b
SHA256fad214319cf895dee86bcac459073b0c843d53795610cfcc95d3b17b61e34db6
SHA51293b8e833da8cf2accc0947883d0b67533eab34b249c139ffce32593e051e5edb78a34e6f78fa63e4c4b5f29aaa79a9c794aae719a82e3f59c6144207db61b3ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eee0edfaa54bbe9567135e15b6b789b
SHA1268af8621a17ef5dcc1b43815a8696ca081f9da1
SHA25609b956e66cbc99aa973267dc205f4980570112a03c1f38591a1f6be52077b278
SHA5125d323a447012b3a831d772606ef4dcc641e3639eadd27f3eb726f12eb45284a1fe4eef5ef4133c44b59b5893a9cfc41642c4f623b11d485225e532d67f148997
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b