Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
bd6ae22b5039921edbf974dc3c095eb5_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bd6ae22b5039921edbf974dc3c095eb5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bd6ae22b5039921edbf974dc3c095eb5_JaffaCakes118.html
-
Size
57KB
-
MD5
bd6ae22b5039921edbf974dc3c095eb5
-
SHA1
41f24e346a535716028890571c05f437f6a9eccf
-
SHA256
2e8fc95cd550cc06fc072775b22199f86bec3ad167878b6b70a189ef4b9e553f
-
SHA512
ba55d43a6995fc5e3e7f69a74a0bd7315be630bab6e7af10bb06eaa69e0301f01c65e609822e266ff46d022cca4ab95c0c83b178c71330a2f28ff0fe7efaab8b
-
SSDEEP
1536:ijEQvK8OPHdsA3o2vgyHJv0owbd6zKD6CDK2RVroFVwpDK2RVy:ijnOPHdsL2vgyHJutDK2RVroFVwpDK2m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000bb11cf4ca3845999e403b9e68abaa42d87c3a6862279e41ff8c76b8f7ab40a5e000000000e8000000002000020000000e8161af21e5c02dce15e84f3747b9e8d2d7428f9b8f7e803cdcf409926ae318320000000e467cbab7293ee84834cf27cb4300000b9775ac6bb06e67383228ed8a994be4240000000cbc2225c33179fd51b757ebae07d2499bacd0afced5a6a0549235fef19c97128ff47d538b47f039f01beeb28bc79751eb1c849928ee499fec649ee701b3e8429 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0033d447acf5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430614146" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{61F26A91-619F-11EF-BDC5-D61F2295B977} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1256 iexplore.exe 1256 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1256 wrote to memory of 2568 1256 iexplore.exe 30 PID 1256 wrote to memory of 2568 1256 iexplore.exe 30 PID 1256 wrote to memory of 2568 1256 iexplore.exe 30 PID 1256 wrote to memory of 2568 1256 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bd6ae22b5039921edbf974dc3c095eb5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1256 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5b26d2fbaca39907a61696a7c5d846b7c
SHA14bbc885a966a9c3050cc1bf1bd4874c55b47b3d3
SHA256027e29f46e98ad1fa7cfcfc593c025f51791203d704b361c95176010f3f0fbd2
SHA512e27a8a8caf84a42ec2c851441b71340af49785a443aea706c219337fb9eea30851e1d823801ef94ebac800f862f80a02afab2e09be22752e29b43f92bf24daac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5794363e6d7d6f27122ac6f25ba5342cb
SHA11d19360f546a3505a40d2444204595d70972058d
SHA2560137ea2f7bb318b19ec3a09593bb1b92a1c9d2bb70e990d80c30b73bd1fdfae1
SHA512b97c504aa6e3a5ef8c097eb625413c9719e8b6794e06dbf5ebcb815647dd2bf7510a3604fa948bf596c0a5863676673e6d9e9bb2fca6e63c66a70f2c01310405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5323000508424133c19cc9125d5c1273c
SHA1ba700ec70c959626066d496a1459a102393cbca9
SHA256911c615fcbe7d763d600be033b8577cd962dcbae5cc1aac1ca93684b93baa419
SHA512c6b67678754a93ab1820b949febbe5f1d252e2ff4c2c54a282e0a76490ae6de3bc8a55b59fef41788deec8497d93f5119bc7f03825900d8240b6133784a7a56e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54fee7fb71947bd33166087658879642b
SHA1af19d904b0f935416dc7e0fe345d3de803dbc496
SHA2563952e184f878320f5f48c880b9faf0b18c814deed44f5f0f56b488c99aee8afc
SHA5120e5bb82b30e2bee30924e2cc0dd223ba053193939585796552e8c18224e078a05202cf652419d392bbed47e6a321ca280eba07c0200d91d3c5cb19912b839ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59317937969859b27d5221bfd7989e773
SHA19f0f0278d9e0f3e04273e9ebb4557050ed6ce9fc
SHA2562b024176982392c21e45e4ca196568d7a194afaaf30619e4c47cde0a755d5be0
SHA512b0229fdccbda170efc2ce2d470fabc2920113eef9a141a6eb40d4cbee4cf4001cc9187e9b42200b4d1f084b22cbc41855355ce5fdc7bcc6d428ca54f904d775e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c80637fb2d4c938157a22451a9bb4d5a
SHA1659efecbf7be3042dd836a3baf50f7284f40c74e
SHA256f7c9fe9ab4d3f6145f75a8c81e01a13339a96e7ffa5e62ee2d8ed647465d330c
SHA512fabec41a5592b0040243a97729d0f69ba8b729105989f640476a91d1453bcabcb47391a69391425c67674e5e2e73c9c9d0bd3d061d004e8e73c65fa6f59ed9e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD502d48bbaad8ce34623cdbcf6144ac65f
SHA1fb42b32fbd999b87977cc09c51f765b5e0443bdd
SHA2568c9cbde0dfb5b15f2f09d88e23382506ca36da45e0d24e1f4fdb4fdd458ca43f
SHA512f1c98bba615e0f46c6572c787fb41e33d74efd54e85888083870adf6cfbbc4aa667f7aae02e95d313f28d3d1a25b806a683b6912dbfc45f7728843da2ea92782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD578d76e09c957bf1ca27b897cf8015259
SHA15dbe622cd7a4bab1e4d3fc81e19232b069b3cffa
SHA256454b940c4eff83fb3b01da925b4c09d1cc71bbde71104239f2d09ed9832f6da0
SHA51274b019574c3f87374f49c1ba67c36462242dc728f147dfba2a28f88381e4b7b1d61a08d5416eb13b0e5c1534c067bd04dcca2aba4338274ff2b6a50e5a61b7f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59e1e6eb9a278667eee23d11dfcb7ac16
SHA1ca1ff3ba096715a9dc52e9c236cee66e90f10e6b
SHA256f188e333b7d41072dd46289da2697221b63f61e07ff145dc24db2660b3810b29
SHA5127addc94fa81bda3b17ed5e5047a6c64024b52198c6eaeee751e64b28b816b5202c9eb057e87ad8e41bf399bed562474e58894a0a59441362766a02990ed9bef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD591933cccf97acab537703889ddd3dffc
SHA11ce03e6a78f28592bc422e9a34043a30e0d1969c
SHA2568ce6bebe5b3c95b0906cc39f213a8c66d53ec8d33aba9f3579036334391b3dd7
SHA512b80e5f87c82cfb37dc68b118e8e65ca41ce4c7118a926a43f21a788c665752340e1e0756e7c0963ecdd29dff90f0105a1e69731b80f031c51c049e2d25662e66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD551f173f36632191466913603b34faede
SHA151a0434b513a21c039e790d02238e2bf7c67754f
SHA256cfb7b78f45f60168f428f67bffaf644eb1ab38f7ed70912d052423fb842901f7
SHA5127ff7f0ac980c5af5efcf1519421b25602114281c27bb9648d8d7bcedeb4730e69f4ad064fa91581cbfcf965297b46c889f6fe9b5dafc829954f7e5d730d22563
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e8e6f0359f0f4a38a4df925d838731b8
SHA1cf659ee895ed03f3f2adda587da7f4e955ff0fa8
SHA2566a99e83b0d136c2421c8273ab6bf3e93370166036b489b07a145e6b79caea903
SHA512908dcc7808f27e1ae6d47d51c75eed49939f5301de52cd326f370e0c3f9b06db10890ff47cfe5ddc870d56213f1dc7b65359bf47fa65d45712d7ba95cb9f0df9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5342f52115ab000e254ac432ce00a3987
SHA1c0e90eec12c4dfce8fed242c9b366cdeee95a60d
SHA256c45d6069ea6043e18076298d7e4182a08eb7d85b8413545c9d678c2a289cd4a4
SHA5120738fe449af5e500aecb593bb58248b683e8ccdad9a825155c42f11b63633d61dce65f2dc4535881b944a583617a2c1bf4424551d1955b98ca2a2922d0f0273a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52ba4f42f1236e4a3b6d16ef12b9192ea
SHA1485036bb95dba7d04eba27006c12396ce867f8d5
SHA2566bb638c713eb00c1b9e868634ef234deb152d5ab3f3f41408dbe836ebe98e706
SHA512284b46d1966b152c763853a2db2900132575a70bf55ee14e3084d4c07ffd467d65d6ed3dbf7d9fddf9c25cdf92efcac9d2c471283f7c9e6fc6e6b1e941b1ee4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57860e8301347bf374cf164932aac158f
SHA1f5f323aa207b4a3fbba0c02b97ee338b1d1b471a
SHA256d424b0df5bde2f17adc75c14362db4a71561cfe699a56a918cbc87a451de1abe
SHA512339f6231b30924eb180e439bcda0d713b2c245c5fa860e803763575cab1e3c9eb647f02a9e13afcf146469dbfe35f7d0ebb43c46cf657411cb3a6d6d3874233c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53770e1cefb17501300515be4ae0edfa0
SHA1095c7735f4e89aa30c908d85501259e21709a506
SHA25692816ada72609f2570aa627f037a65cfa66770b9d469c05e696e8db241c335dc
SHA512e4f05b4a1f56889cc4e3a120062d3564e0fc3b6008f1859dfcf46dc5b6bbe17f21b6651ebcbc160862f796ca7b598a6e0ceaf006e6d5625791c7bcf2d2700923
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2LF9I1AK\f[1].txt
Filesize39KB
MD535e751e9ad4488fdb799ff2ee5c05093
SHA1bb6660f96662615a468de0e613e2ce703730877e
SHA256120541cf1ce005e98991acf361a6f8d344952c46ac18aeb2edba61f3dc3cfe74
SHA512e1cf23aa3fa90aa6555b3176f262aa79fdd2a8b9119f579d45da012f61a9f32b5993c1fbefb715bdcbe3ec8563d93c239fd623b58a46070dc4e90937fcb31914
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b