Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
108s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 00:59
Static task
static1
Behavioral task
behavioral1
Sample
b9bf2f77ab648fd9dd1a465daa32eab7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b9bf2f77ab648fd9dd1a465daa32eab7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b9bf2f77ab648fd9dd1a465daa32eab7_JaffaCakes118.html
-
Size
12KB
-
MD5
b9bf2f77ab648fd9dd1a465daa32eab7
-
SHA1
7980260915222d942c402d318ca6addee87df89a
-
SHA256
46a41f00189bbf26331458a2aec6f9ed1187af476a0c6c85d4a69d5b6d26f161
-
SHA512
5097ebaeb6c2f733258b40845b0d433f76553a3266c06d6e7b675922154be3652d7988094ecc8ee241176c8390960457b706fd9f88a2fb23050ff1026b2fa8ed
-
SSDEEP
384:sGlIc2VGj4j/gc2BVZVnz28vI08LOXguLZ:2gRnUExLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000003fdd41b81b2e72b69128535e5d838b38e8fc663db2abaad0fe4e221a106cdb4000000000e80000000020000200000008bd5d9bd420b3fdfa2711345bcfae48532887af2dabca80a8c68ee0b4796d9c220000000afe5f4ba22e3c60978720e6a3e8f7aa7ef2ef0a890b9f31d37c869992936a83640000000c96d6fffbce030d2631486b94f41af60e57ba6718f770061026b447b38667fbb54904199561b51929ef3ea08905801de89dc128796523978a366d4b24fbfd97f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430536640" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F45844F1-60EA-11EF-B8DF-E649859EC46C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4074d6f6f7f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 560 iexplore.exe 560 iexplore.exe 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 560 wrote to memory of 2016 560 iexplore.exe 29 PID 560 wrote to memory of 2016 560 iexplore.exe 29 PID 560 wrote to memory of 2016 560 iexplore.exe 29 PID 560 wrote to memory of 2016 560 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b9bf2f77ab648fd9dd1a465daa32eab7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:560 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6a63df8c9c3518d0d91ed2379ad2336
SHA13f653804f6bc1de29dfbbbeca029754e8a35a88f
SHA256ffd73660b21208488e65a4849495ed16d39ce8113d50c89d09e68638f700e52a
SHA512b89756f8181412e26017e3ee1207eba9339f172fedc1005b5fb861c8546c30d16972f3d00c22635e379f84c24ef7bf205b37beed43b4a586307ae273e5a3e826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7fb37c99f00eb0cd533c8b73be738d6
SHA1940795cb29875459d82d97b1c2d7a409be32cb53
SHA256f7ff86768a11de88e3b2dcc5c8ed40cf84b77aed398badc50688e159c2e62446
SHA512ff7f26ca225e4b3e60004c3248274a43ef891b730b29bb5c33e699f0fe8427cce8ddd9d8362145f4dadf2b762090cb3473acd6ab2dbccde29d30750d5471c62f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544a20d6ae7aa1a1d5945379e52409efe
SHA166507d80ab7aa9e40c324c9a31d193f093235be3
SHA256e6d26a71cc11643c0b1590164319fdd13aab2de2ed80584721fad4c9a6ada38a
SHA512239ddc4c68d322378e638f96c8a5b78aac7419d2883b43c4e1f927159735b1989a8d3d3178378efe2985b417d0457c62cddae47f3bb28598990e26d65b65d843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfa847b4684254d5998588c9a7997b6e
SHA164bf99a178c9a2c685b4a99f89f6710a3f067d4a
SHA25656c3cfac82e06ac71290454148d2a2854b44e5967144696d531bc2583e17a76e
SHA5120bef29807ecc5515e67f1113e48af88b3c088845a28a2eb4c7e8a43afe5fbb6287156fb6c51957d07e6a8ba505ed6418793b0cdd5ea39761981828a8d61335e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb506e35324c2b3a5f3468b7e35d1132
SHA19a023acc9682ae601a7f4ca9c343b60c90a0d2a0
SHA2562b43bc7204eebede6770bd3906377a4a095acf374333731c808b276d295611e2
SHA5121d68c69387ee440ead108a1a97b8e91b41ea048e4aaa52280fedc8660ba1c8d21d76f9d766ecbaacf40f01f87288d9e4b4d141b0896e8486f062b043b33c83fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507f88bca06975c36e75ef6636f92a2ac
SHA186aa87f1659951e42d85ea8a9f82b065c461ba19
SHA256cca8014a22983c2c51d3a7aad97a244a6cd3c2b0c63fadb776bac73e484f32b0
SHA512efd5701256e5107345544ab4cf42d1cfd132cf53c8d538d9a61de08e223710998ac59b13e25c0a55748582200df64c9a38a40b94e1ad760b130cb8c4c65a429d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a0f26ee43059c45d41a2eb8224050bf
SHA1754d48321092b4f0787a7179cab330275fa4b057
SHA256aa1412b2bfad15e9ad255cc5f39f561692bf7a59742971ad773a38f0bbb76542
SHA512b9d768ed9e6026fbdfc65a834cbc193860f8a0f42211e9089f560de31281576af6a6107d2d54ba6af97e5bf754d469e59eb3365c72cf6c1658bdc3669ee05879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd96e984735f0c15d2de2bc381268ec2
SHA130d4cf273a1ad3d39e90b50b4122f4d66ab0295c
SHA256e2e91ea1638a97a89632f8b0badbe883aaa8b8c1e29acd0280d03fd094d7452f
SHA51274250f1fcb784495175969f542ac19f9b521dd3b0800b7a0f1e041d2536b56026adacc11b73af5fcb84fc60d2942df26a7e25013ecf4dcf65b2a3e003743f699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f2bdb3f24c682d3a7b98d2f5b432c7f
SHA1f78d33b59a1b72b2130206fcdf509ded78c1020f
SHA256018f87e1b8326cf699136b8a4f6ed3e5f303e02526ff9c66b47410003b41ed90
SHA512c463e2643637a9b417c1336de1853d9ad39f914a2e22c21a49dfd4caf089d16d237ab939ba9d5ef76bb27d5ccf2bacf21282aeb761dc82fbb2db1151372a7a4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecb2ac4b059fc7e3667908b66d35f93a
SHA1967f76a8060e3190ffdb722e621aaa1e78b789c6
SHA2567b73622cb3e12fb0f186058fe645185601b63b909129dd3f10b9847380bf82a0
SHA512f3c64fcbf50f76a8671b73e8557e8cb2ae4143e9e783c3d1d689b91a63056e58454dbdb4b02eb47fee85f3d3db3555573a9364cecbc8c290fa3a1c27e6617ecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa77e7181b68c8b88e9df1faa454da6c
SHA13749409fa60b2d3e5465195e91fb414ec7f4b547
SHA256d02c2992396ac2dd6f5b00527d866ff862e56a2f1c9c49e1fd24840bc4a82a46
SHA51213c93143abde9d6c09695b4d32143272acb4b2e41cde3b488c251c64aa462d4239a92cb7cd39101bd8dbf8464ec203d70a595f82b489953d50e954922ae4b58e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59775fc3e6fd64d59afb2d1125833275b
SHA152af8c4403e6325c6f725bceb879f6ed51552ca7
SHA256a1a7759f959e6d13667c4deb15e8716b51c26b26e979a0158511e990f3dfeb44
SHA5127163197a683bac58ce97586c296ba31bee1af816aeb6b6b9b017c21ae9ae7f094f36065f96b86cf7361b38dc9e2a94442adb08cb2961c24bb3db50867ec7f4d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a1d258dde4308ad2835789add91bbf1
SHA17adc40e6bb94a9d7d75e9cf4006995435faf9e0f
SHA256a851c72594876a2613d9ae14efd55ea6a5b735d2793c37dcd689f58ab1af9ea6
SHA512f26c701c5e75859bc6966c5fe7c40e46a5f147a42b252a462e69200f45503dd58b3839bccb84028007514bd3cb47819759fc1652b4e2e85b35d5b2010e315143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565bb3fbcaa32de9109aa041537067924
SHA1368b309b96ef9714c06af94d53d11f03387baa8d
SHA256b66927f05421825ae6cfa1838f9b5270cec50c53b5276e69fc3092433bbe8581
SHA512da420fb2dd24c4a8b3064c71db58cc6e6ff7ab8e3507a8da466d2bc6d171abbe08c82c8576aa8f0078f0489679b5bc1943a3e8a8128a2c7b2bfa099c3fe4844d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dac6be0e90f2a6fc79d6d7f92b97ab8a
SHA1b54018f6a922bebb0ff1796f0c7b4bf182e64df9
SHA256342c6347f5bd936ca6dcf78d04137a2832fea2d2ff7f5f78977fd15335b31db2
SHA512b7ce0d7df65d52a86f98b6f5e8a25ce496fa84bca12004d5093fbaa00dfb94066d91a56e9044a0e669d30d5f6a250ebe5885a8bc6b429761c2e5913bb6b091cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b71f313aa96b27ff2b543d591e4b95c6
SHA1fa83b3fce7bbc7d8001d4e0d0dfdc51b3ce28b48
SHA25623ab43a8ff710702912811754661a4e63f576fe166615d827d37c1678572f23d
SHA512f4522c262e5a0c320ad0579af14574d2f200f90f45e508b90b97a2049ae08196ff06828ff3cf3295dad1788f102a11052ca1009d394e99071ef852d13638b5eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9575613292c56f0b3a4fbf52c293b4e
SHA1de3eda0d637fb583accc8690e17fb596f82aa747
SHA25653877de5abf0051797bf23fdeb5a59141bdc9f7c8f8758299e80cf95ac14c083
SHA5129a296a2bb5228f2bd207971d524ab2f4344346aea58d11e93967c6f63b66aa5069f4729cca7108255b1da3c289d5086202835da8f98607bc288a441673372d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f6d73d9890d201661f6107ce27797f0
SHA171dc65d485a5d065eac61bdb91ff971771273c62
SHA256b2d99df35ce9ecc6c04faac4f98917a3572bf44749771c0b7a921c0cbd82cf77
SHA512ac72112f2248f440824533cc828fbd097ec95ed02f894500d7749c72223d9c4bdb5557ff9ee35148763fc39d513f253ee3b13c8094e5050f416fa8b3637888e6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b