Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
b7b69a1a5560d920c1c41ee41c658bd7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b7b69a1a5560d920c1c41ee41c658bd7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b7b69a1a5560d920c1c41ee41c658bd7_JaffaCakes118.html
-
Size
144B
-
MD5
b7b69a1a5560d920c1c41ee41c658bd7
-
SHA1
55e539222661b6e5fa325c2a158ef9a7125eb6ee
-
SHA256
572a4be456d8744d6cb88cb5b5306c1f72ed62fd5625350368c5a5ba32d6cb12
-
SHA512
c39342939f0944517a765c1580d3f4232bab4ef27403597efe0a57cc6c98cd3a34d075ef6b33582f1a908b4e851334a5906b4cbabd8ad8a914cb81f35219ff83
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B4194D1-6085-11EF-845E-D61F2295B977} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c05bed6f92f4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430493109" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000001d484a2aff836edcc50b66565bdbfac06fa3368f4c994582d0835ed9268b2c97000000000e8000000002000020000000d2d76458590f86d04bd914d2480c9f33d59e45b2eb26534a18a6a2ab3917d4bd20000000db04dd56014eeb804ede772187661e955c23451cc6e39e47d86ec0c1bc66c79340000000077e157edf43ff784a1556e48d22f758e392839eef50d1a48eac53ee3ac0e86c25a1dd43446296ae0dac8fa451ca1c93e1e7a7fc95e5994b81fac4c9d61f5ab9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2684 2792 iexplore.exe 31 PID 2792 wrote to memory of 2684 2792 iexplore.exe 31 PID 2792 wrote to memory of 2684 2792 iexplore.exe 31 PID 2792 wrote to memory of 2684 2792 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b7b69a1a5560d920c1c41ee41c658bd7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5106213f4309ccda3b611c60a47815ce9
SHA1482c11f9d4307b65d69ed5d35adc582841f14560
SHA256ce809cbb37654e61423a8499cdd273b5d239d8b831cb3a46dc12e481f69c836c
SHA51278c581e75b37054fdb2b87f3be23292d123fe6a0161847781d26d76f4ac4f468ac43fe77403a56c28ed0e4ee0e600d88cb67fc5a12bc464361477b9a1378caea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b82a1dd92b70ac84f76d1f04e0644276
SHA1b3fb12dcc9145e0b7edb379f24d07df72067e2a8
SHA25694e4f46b903fd3876266506db2a5c63863dc2cbeb6d80b4dc1c8fb56d5bbdb2c
SHA5127e311a623e7553845ab26312b6e67e75dfb5842c43a22eef4d41c262924f24a5796c5f2a2218b9fa23c81315fb62beec572b3d586c65422a897f13a45291ef02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac98f396bbf8ad681383c232d421cfe6
SHA137a6055ab72744af66f5af81c79f1ab7b62185c7
SHA256b89ae5f4812802aa1c8026113c9c5aca2b0992a0df3cff3d52f083c8a9c07930
SHA5125c6af2a6ea9f1db3ac578822e0e884c3dd3fba2d5d25a5ea71cf888f6d4f34307e6e644f28dbeb272cec710e21351787005047ec6d28a39938ffe2196c12b80b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ccb2abf5a49dcbcebe85aa8914b9cdb
SHA1dd0cad80932f453845d5c1753bd55ed2a44542a6
SHA25646b26d25b70abc1c5306b0423b1799406c9170134721ef61d695f121fa15b599
SHA512bd596280f2221af35d78d8c2df0db4f858d24fba13056ae0a127561f2a84e1fb6485ab10226068df7c336d8d0225c755087ab9255b1ec7dc44c44cc3e9aaeb9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb773e9ba14e2d0cfe7090054e224394
SHA12bb07f8ee43cc0cf33f298f828f5cd722b2f144c
SHA256ea074bd796be3e28b1ee50c7cafca03e2895f4b57e3b481e44572be48814eb0c
SHA512942c91918ed02231278a7fdb9f110c44ce81008715ff25f63d0b7ecd60f4f0b2b654ba34dd00a558d0688a5a2470c97f125673b1b38ec750cba4bee00e5bbf51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0803138880ae99040f101a1c7e10124
SHA1d78cb0069d04f426e0f79efaba6500526256a20b
SHA256439d3be3cd52c7e9b9e16d4e75bed8ad6b0d45f7dc805fcecec272ad7d7dcff8
SHA512e013c25e191067f3f377d9b04dbde0c05b5951519e764fb780d7320cddbf091e2c02fa4a9872d1d4e224b630e3a3c5f66897cea214d8fdd6a68b7ff8b318dd6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d064e5d71148d69ab1557e62c2c4f72
SHA1686fb07a85be9627621601234035256c1f3fdbb0
SHA25672deb82705c42e239d9ce2f16a7969e8464172f1e255fb98d92bb32d220f8ff8
SHA512df2c4aaece704fe3e30b42db9653b62909a657e9eb286379d825973fb40e5f4a932d413ef7dc2d87466f70508fd25500cdee2d68eaf9a24a71a0f04b00bb2a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bf7c14cd710f044573c985e718c67b4
SHA12662cf8ad9b8e9d64a27e980c8f354880d2e7e2d
SHA256744354abc52a35451fb978cc5ec4b216ffd136b89ea88a7e81e465714507479b
SHA512447f1f466b531aa7f564fabfc2df03be7a3f8e79e32e5f6205bba9cf017f6a9a2f743d898b7716b0a30a0e7cefef9cf8af383c392e93a18892e8204ae072867c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da7cbe5b63f9a6044a215e503eb59872
SHA19c5f66f5ff467e1a757721fb277d39fb41115e17
SHA2563ae73d39d34a2844d4f3149b94cdf0c115848303c93ecb6684eb4da03c93ed21
SHA5122d6a24f66167e40edac5925b6fb37189c8a7799d382a255ba659b56b01ce6ccfc4b1f80fe2925bd3a43ba4927b8534ea83bbf573068d765b6bfb42de388d98ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e7acb7ddfe0ce05f102cc6401f83725
SHA117e23c3ca67f69ac00872960c3f19a6b0fe255a8
SHA25668d9f14cbcefef7a66eebd06393715e12cd39b1e0d14bea6eb848caaf8b19d64
SHA512a6d302997adaf05a5d3a481adbf43e2f7c6e2ace8fb8abcfc5efbb7f79ae7870b21aec02f283bc1e6939cf8a6073d34c6c03135199b2ad89c0166663f50c3d39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567496e71f581524d9d61c5f24e6e7221
SHA13c1809e967e4a4d158abc4afc625275f5ff0d0a3
SHA25684613f324c1be190097b5d7411112b66e0249632b9ff98e4cd0a445480183144
SHA512823ec6c2d4d95df3ef0ae38295a305bd09737338f243bb4e8f48b4da63bc8c1a574802d7aa03f62aa989def64217d848777f5392baea5fa17b29a79b59f45072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6948a83ef336d7042abe47a27f9647f
SHA1b26d458742ffea0dd7f09094186a4a7b20dc557e
SHA256f8be08956b1ce287e4a9022e4978b98a6c5f88d73c49f46180d8ec809322bcd1
SHA51245aca6770ea4eb2c2d6e918b55283af689a5bb3f4da06808e5ede3e6f89b884b914e1f275b6c5bdaa84538c44cfff726584dd0cd44760ec3b684e3f7778b59c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53320205c176824a083601ef86b44d3a0
SHA1ec34d13a8231f5b16d077d2557e280caf922293d
SHA256f8e43581928b90e4c97216062a344aab9078c22ce5cee9806b60310e7c060771
SHA512f3af5812a680c84a8c9a0d9b88cc3d62ddc11bb1f1ce14cc63f9d9b99aea87c682dbb43a607b2d60bdd75598a95abc24b4cafcbe80aeeb21c23486d313b09b4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d5955de8a7f8cefd6d4613743ff3e75
SHA14cadfbb3e77eb93de2c11bd5fb4bc88a0bbfd8f6
SHA256856490f91af6a90762fd7c835bb72379e641c3ce4027b5ee68b6d6093426f57c
SHA5121b0531ca5b6ab4ea678938c2bf562615aad665538224ad3a3646c1091cb4a2f61d147a7732fb226472c897f71e2a400c4f6b7652e99efca1a8e88adc12eaf1f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597e21ff69c6f3643528a8edea02e46c5
SHA1c82e9ebe632cab0f6ae94c01e475920fdbc26dc1
SHA256e392ad093e5cf2087cad730df6c6d784a067f77ab415de7bd6deb7dc0f976896
SHA512af0fb41f3b839f947f50f69691c934b5006b53bffbab4fce4769c0466501b4731f9a2b019342ebb279f9bbda8c12721239e41748f308cdd03612a4aa22e1e94e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e45c9aff112816fa733b991d62306551
SHA1c177976672e1ad3245f3305ff14c07ba0de2e5d0
SHA2562f2b716b0fd28c7b455caa604f84024a282c723acf57c24318ddde1b05abc2f1
SHA5126df7cbb65cc85a65a1330887c1658fffa7a1b5e7726e21b51a5cc871526f1f863457bc1d78eabd471fd78a0eb9d4d81e4914525bf888d95a47c97c2f19c02fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59da49c9ba1d6ec2ece55550083196fd8
SHA187c723fac13cbaa8f42bff139d4bbce541714fe0
SHA25622d720d46f93ef7e00e36e9720f70580231d59debc118d95b291993a4b8a9431
SHA5129e821b67fbdb19c3621c6450ffd80eb2b1eccbb4e99ad5666a7e59251456b23887e8c3e6a04300d00976c75d98b44a72cdc8e8884a32659b9c7250a7d75b51e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa3e03cbddc49615e3adcc0df39cc4c4
SHA1506fbe561d436715364366bfc47d966244fa72a5
SHA256c51197a8bce663a775fe3a69c8265c427a66f948468a99cad74c45ddebbbfae8
SHA512817255ca7fad46aeb358bc057dce3c8242d5acf01814c8df968f820047ae260c5d64144c27262f92d35d07fc71d8ed328b0749b9235bdb178eedfcb62323a374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c839d6c70be456dfa67d15563a8b24a6
SHA1aad48cffd54c7427860ca936da57ae9acbbbbc56
SHA2560147d031e341fb479855d587d7075e8fa7035aa659320786ae0a908394b83997
SHA5126695801eec5693440bbe6f8ff4cac6c84844db7373c74a2018ce68859057d9dc85c2bf0d09bc4a75182d90c655cce8be8598bf48d8aeb9cac1e66a0ae0443639
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b