Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 09:17
Static task
static1
Behavioral task
behavioral1
Sample
bb2628e6646b894f6be8a8c65f331f6a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bb2628e6646b894f6be8a8c65f331f6a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bb2628e6646b894f6be8a8c65f331f6a_JaffaCakes118.html
-
Size
254B
-
MD5
bb2628e6646b894f6be8a8c65f331f6a
-
SHA1
ebcc6b72c859f4d240ee8ec0c7ae751847cc7ce4
-
SHA256
659f4954bf2c5079b3d3f485ce580688f939e2fb1c2ecc8242998f395319510c
-
SHA512
18955116f3aeda2143774b7d2fded4acbe5c6e83815cd95ce222d9333dce97ce6f4c5ac2b442e12bd2c20c70daa533d605f20fe6f7081b4ee99399a9f1c4ab73
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430566543" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b08c13693df5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000001122b9a5f0c39dc3179e3c68036e0926c2828468bcdb6adf1f52f9907b9808fc000000000e8000000002000020000000294b1a9849d341da683f0d813fea61646e9d913a774997f924d2e2dd46e2a14e200000001b51f6e2949950f9fee22637f0527b8f765eeb093507e9fe1940954f30e72b46400000009c158b89040149fe39abd6033dc50c4092d0f7efcf94032d878f1cfb619d6eb83f26441eec0500358c49e8d1864ff1bd99c98d2eb5ebf168229668fba487478b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93FF5761-6130-11EF-8FA3-EA829B7A1C2A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1140 iexplore.exe 1140 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1140 wrote to memory of 2212 1140 iexplore.exe 30 PID 1140 wrote to memory of 2212 1140 iexplore.exe 30 PID 1140 wrote to memory of 2212 1140 iexplore.exe 30 PID 1140 wrote to memory of 2212 1140 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bb2628e6646b894f6be8a8c65f331f6a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50267dcb67e90dcbf023cb1a8e3ddefe8
SHA1286c865384cdacc10d896e01e76e830aa19f353a
SHA25644eb53d3f3f332926428453dfd1deccac84d9d38299a9e90588d176644389b0e
SHA512182ae3a1454a7c7dc9cb9696b1da0edee840f1c8e60607b934bcaf6463c0e6f6a64abc6c19d612d45a4165cfe6dba99a17dcab171c9dfd7a9ef75bf0608d4c2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fecb47551bd70865f2f1ffc9cdcb4244
SHA1755644fd8a20dc83683b8897e8cd55e2ce7ca88e
SHA256cbdc5dbcd74164a8084298008c16135866ab06927f7e011b5a8835acbe02a7f8
SHA512c5532ed74e14f2959803a1ca4c1672d3c7d9ad2902e1c7dc7d224163597c58e0121d057717bf39adaf068e5862f73e1fc3ce015b8059ac932a547e2fa70c5b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571ca5bf374efafb89072c559a810a0ee
SHA17d97ff72a81428d02efa030da203ab5b28c3c21d
SHA25656f796639723b33e35e496dcbf66075426995648905e4760877cc5b70c9b48ae
SHA512d9b9cc944c3ca450e32b9894dea6f6882c3862019ee1cbab4b3c94cd16d88b755112476fd7575ba6e6e5a6c31034351cc15b7754d453578a763f213827f35eba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57891c45f6ecf904856893cd977e655fd
SHA15f804ba295e92428c782fc046459e6db2404af22
SHA2569d2f14c65320a0d6f15ee9c81ae5a59e8c90e2d72247dc4cd95575c338ccb9aa
SHA5127140a4b2210a4dc223faa75a76bd70688864f511762cbea0015154ea29d9b01beeaddc1dc25ab19504c6b9ca130a1e2957afe099ed3b62920170314f4f21ab4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557f5d1b137d437462cea097690cc85d2
SHA165bcdfdd1303525591fc1b18da094e1857c96c87
SHA25609e6df869fa7a90107e7ef4e723b42167e997fcc3fb6b86daee0221cebd5417e
SHA5125cfc0caaa2a84ee84dd349400f23b1f89a549fdb6f5e29be7a596a1bcd4150e518f9ab8d9d6630fbff3be36affd5119186df1661e821c20321602f39f19d9b33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511c2b23a002a3860b2155304e02cd399
SHA1255538d3a6a378d3a9e2ad8ca025c7b5b545e0c5
SHA25691e7a55dc8b98a6c950a98e91373cde0c07f4de3211805c80f230353819095bc
SHA5129b3dd5066231b1761c8c27572a0ef8eebae797d92d58b082c7ed9efbc73db033ce982b2519a8e75968826c9151692525961271a615a668d4ef6120d9ffe4e44a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50584bfe1d6a2db9931bf059f8ab9eb9f
SHA17d88d10e64bd41950f2bdf619e9221a6c29a5569
SHA25606d8a81bd196aa3982831d7f5effa66cec853be2d65f6ab2623c21af1cd103bf
SHA5129026f6b6fce0abaf9f578fb446b5f1f6bb6e6b761026a488a421fde5c15b9cd6ffd4b06a923f55241252099776bc5c27366e3feaa4d72010c10e5c0ca45c0a5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ed6bc5e431e35f8bc9d88294680953d
SHA163e68386c72ba5e48fc09708cffe14b0bfb3a102
SHA2562786c65d3dde38a2794d6d6ac4363cfdae031d8166d35ebdb370386ad6dafcae
SHA512e8eb5629f226797551728908c3baa03a45b50575e94fda556527794ee8a32142f2c0569d21501c3cb5e78c9dc6cbc7b86434608b1ce590a847b1ef553f680e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea9ff9081cdd216756469ed5402ce026
SHA1b1f31fc84635e7e4f1fa11881152b94e0bc93a42
SHA256bdcbca38d17eee39aaecb3d42acc50f377d871947f161338acb424aa4a80440b
SHA512f63b2dd4b9496b00f21c8c0a73c32cc20f70105e2fb49b6521b58f7b7d426568cf810f19f1d629d2b38f610960704ca3d7a8440a3a56d0586d869ced0164b9db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5be0a865150871ea7026772f749298c
SHA158ca05d4716184bea87dba00984ea14ef4eab661
SHA2560d71b789865ed3ce6cc0254ed73b0950e69219a5348a48f0b473c26b445dc7b9
SHA51273557ded21ead12553537f5e81474d002a16d9f5dbe684cffb3a097faf798d7bc186de92333a8ccd5713768d554075943a24277e6d7d8d0c48dadfe700787990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da3c8a9c43621cb88bffbd18fab48a8f
SHA155423cebfce8c6e0846566da756467ea367feb87
SHA25679b12366669e245317c2fee358908939db7f74982d4879689a18655ea65af2d3
SHA5124caceb435c209ece1fae0497658cdfec9167b1d8106c9b311f36ca1a10c9ba953cc10cdb26d9d3fa0f491b2c7c562bb02483a38109fd60036d2e6c5f54cc9dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2439455bc13db08fb2e9b77bb4f60ca
SHA19e684edecc53383529f4c87d639e8f6311020851
SHA256a3c8f56f449b0d33245452df3a6ec0001b232a7142b40deb25d660631931fbcf
SHA51287c4b90998fbf4e91656f4ecc82e9a34afa8cc4ac443b115b3fd60f8e12c8607a3f6d0d5463d5c77bc67ee57be73c1429934a42eb8cd5f4fadf9aeb7335a1312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c31397c728207e119ea9265b6784685
SHA1701217beba9964579d1d1b962bd67aff071869ab
SHA2568e40c77fddfe1333900e1dcb6717957ea97200de0864ae4e7d3af74424e43354
SHA512aad89bbdd3ff046d70c07dbf8ea77b54c763b2b52e18855160e75a069abccb2423d846c488233150e66be352f6d11cb5631f3b40e55eb82c5c6f9cb16b7522e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e60d1aeb3be9ef33db6f513d77db2257
SHA1ae920a60ca29afcfd62f45659b3310887468c79e
SHA256da92f647b8cb6e87b63a74a1cf421ff93875933a13b74d71888eeb18774c8c32
SHA512a4c070da59bccd210dff7609837e02c21c49b27580db305be4b659ed783142917920a99b0338b5431519fc67ffd775c4d2f84f8901117b374c9d93b2c752182c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594cdc208d598d7a981e49dcfa33fcafd
SHA166ded7747dd78604a09f9ffc2a5725513a33d0b9
SHA256bd60fcb864a20ac83a9e443e0e408b6eb88545a0efb0de9d540c010781bf4b83
SHA512bee51f8bf9d22eacd99d6ac7f8dff2ad5634816ea3010e018f5d3edb8218592fa86e385245222566644c69e3ccb243790fb001099f02b7bdb42e98c431133d56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580bf65c02fccd6be396be3702744c47c
SHA1090bd318d12f89808c97569cbb5e2c121d49f7d8
SHA2562fb58e0ad3887523a0c5fc83a2839b637ca2c1ece5021acf88c73f88b5b34309
SHA512e3753d17e0a664956fd982496eb00a14b57358840ba6a370433c7b19f63a3f1229bc8318dc48c4f62baac0839bb48137ccc51cadba12254c86e4ca95dd6f0e63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587677c3b304ff75ea4082351283c3e8e
SHA111612b58d8fd8e9263adf54ac9caebc2b06d70b9
SHA256a357dab55a87a1a1b0e5903cd93a4e541c3e4dac39cd4fb9214700c530d00e81
SHA512ce17f656b958b581b453f082a268779471e7b9bc274c0228aef2f75f6b66c3315a74702b20ca58a470f8f330dc1b60ef4ae9f6f3eda5de9c9ddbc6efed185c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa31d2b4d135f5caa26dd9c11c328169
SHA1bc0cbeb8f93d305ba1b0600fa9844eec51a69ead
SHA2566d16c40ad228a87e7ff39a712fcc007a9e4c16a92327bc920204f89f9eb1c4bf
SHA5128652fb289b07bac28de2004c9338361f0735460b8adc4a30d49081f6498ad9ddeb58f00a263c8468e2bc24c7464ca0ed8bf6b67c3939bc21674174ed09bbaae9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b