Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
bcad72c76c24b5ec8622a20c3f7e4935_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bcad72c76c24b5ec8622a20c3f7e4935_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bcad72c76c24b5ec8622a20c3f7e4935_JaffaCakes118.html
-
Size
74KB
-
MD5
bcad72c76c24b5ec8622a20c3f7e4935
-
SHA1
18dc211704d373cd41f8e5ada2789c60f89dbd15
-
SHA256
678308bb200f654a79fc93ce92247161cd3734fb5306e91e9cb9194548a3e6fd
-
SHA512
fc1449d0df09bb584f9dd4fd54ead5c3a03cb4ccb39b19a9d509d21b9aad9759e1016f5fd90d714415530e15fd504fc655014b05da13a8c873aa638b860f4a06
-
SSDEEP
768:XEqGY/ppj9QGyjzCGIEzFG7XRIpOMwF4n70pTk1FsuVbLXQKiIwG6CQuVcphrl3P:iCZh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{47FF5711-617C-11EF-90D6-5AE8573B0ABD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430599059" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000e518e993964d3f5a2a08ab615e8ff5dc7bd2495ebd59e91099025a58813f4267000000000e8000000002000020000000ea160f403c44cc620bdc2452d5fe4b0635b2ebe8e75c343b7522f327e453713520000000a1dae5a862eafb8992fb60a6e9cb1a3d0933e3c6780eaebe28e2f26a00b3533340000000de1d1cb183df58a65a4f85f61d75700550ab307b32f29b75cacdd8755e23d68dc4cfa5e806cf2ae093927cdea0bcf632a6beca101066c809469df4c61d41a8dc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9025911c89f5da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 308 iexplore.exe 308 iexplore.exe 1352 IEXPLORE.EXE 1352 IEXPLORE.EXE 1352 IEXPLORE.EXE 1352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 308 wrote to memory of 1352 308 iexplore.exe 31 PID 308 wrote to memory of 1352 308 iexplore.exe 31 PID 308 wrote to memory of 1352 308 iexplore.exe 31 PID 308 wrote to memory of 1352 308 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bcad72c76c24b5ec8622a20c3f7e4935_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:308 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD541acefbd4e12e59a32cc4f2f84b7c579
SHA106d544434f0ae65ca6e2f98ac9b2406e402fb327
SHA25627a227cc5a98c0b0613c260601d2f7e0f587e255966784dd51dc66fa2e739c47
SHA512aebeb53a2e80ba1fa9642d7d7d94991a82550a732f3c4a23795ca3bae364d228e8f8ccdd43730dd031f5ce3fbec464d968f052f3ca4e64c5ad2e59f9ed402906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54a6325f49043d632f0dde63da6f55b27
SHA14ffd6718fa44ef7fd3e1229ce31ee73b6812adc9
SHA25632f7832ec52a95488d99fb6433ea73159b3c718df84c16d6a627d8badb3f026c
SHA5127f56a800e9369c6239a3ff0bf4da36d0c6be601fc77452c46519ece70d2970431e4c3c6e90041e711d44cbcfe2db044f33fecaa96abd1f0729fad1a45a1f2707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e6b3803cb7c9182a8526e64fe7a9740e
SHA1f9f49b12a46e35b73663279e466d68fe7b356ba8
SHA2563c095e22169bfabf11f789cc1b6afe152ebaafacf7262920420312e857822ddf
SHA51211000379dade3fe5a8834920b86dd448338e30a12bed3cdeaf5d42f21b55da06d8d64514b6ec745b2935c8ef63a1410cdeaa89b7dd850e58b573144e1e2f6184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ddf1669202c2c861bc7b1d03bbcbf275
SHA103e33cd735a27d1305adb579aca4b97523dba28c
SHA256cfb184143a3ac7834b643175eb84a1db59843abdc2f66f9e9fb7a514bc66721f
SHA512c9724687bd8dc2b4ac4a795d82a888d892f6c981fd2deeb4ea3731f9065c9d82db039605c3c897c7eeeceeb351683f068c2aeb9ce20187337d8bb7d786d056d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59996dca1e4a8fb18e88c42cd009201e8
SHA16fc8521e21bb1a6d4a64ff2ca8569a46e2fcfe10
SHA2561a8b6ec46efbeaeb21426be0b61fe3649812fa5b097acf2375ac1ab745a1b1cf
SHA512f9ac8afdced106990f15ec7072b6e75d5328fa3ef7f24f00808243676dd6e8699afa8d1ced3e778fd51334737bd0144050b7b35e9613e4ad98e82e8ea79ac084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54a662537cc29e2e1067dcf8dd158d007
SHA19beab62a0d2d51d57061877ea4452ca7e4d121df
SHA256815fac6a2c7225af8588cbd465ff186dde8b61aad94b82ec1e905f8cb7e7d6d4
SHA512cf198fceaea7c7354e5fb93e29a61895ef49031ff0b9b58cccb096b28a3da2138dcc95537aad43dc67fda30059db1594b5cbec5da9cb3b30495221d74d4d4361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5db6a023df267b4f9233db22f47f25dad
SHA1665a539ea2af5e8aad805569e3ede4f376698914
SHA25600d4379ac94d1ec7410493c433b09b2b6c8f61f78c17eff1f19f2490386891a7
SHA5120aed9664d12da34a3e74bb5a2ed162647896187e5c01ebe3a2e3d4acd11bfd85ac550aabe0c94b08cfd23ce5d23555c9eaa0bf495fab2c76936eef0019aeafa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5609f8de9e19f20af86a2eeabafc2d6f7
SHA1b339a0abd4b366d5699d3ae3d612e570cc605406
SHA25680ca215bd266f7100d33b12972c799cb8411ab94a44b1e57af0ff406e09b755b
SHA512c3e339b10e210ffcdc3ba6ac9159ae557318794e953be040b75b9c1a1aeb5b2d00c91298f787bbea69242b8582a8076b01c3292929dd5ca9df329f8b3af5dcbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c227096943a349e730ad551328d8ddcd
SHA1c5acf6f48d7ae7a6032c06b5a8abeef61cb5b0bc
SHA2569f037b68df783931a262c5fb21a3f014a0ce40ec5d3795419ce6bebb1ae33aa9
SHA512ca7f9df947ce11611591769a22d47f635ce1ebb03b2541066f55d0c10a4d5d00db9aff1fad07ab0a4425d07a654630ca450aff7ea6cd1141ec535aa2c5a18110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a4cee68f8f77568fa4079d5e6224033a
SHA155e25c6d9dd601ceaede321214395122330a394b
SHA256d3def8c448c1b296b81e01b3c531908bf561e2ea43febe54d99f2c2e6f919d4f
SHA5127c4a4e6190714e8fb83ba4fea1334462012e3bb08ac11885a0ac56575f99e79a0db67f77bdd78b5173e5cda87659c4d00c4ceaf2b8c5712cb45036366652a45c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD597410b43850bfe6e5ec8536af42f7777
SHA195ab044a4d82a1d9af6b4fae97ba5bd5de8f30d3
SHA256e231f9242001a5ef5187a7d57e40bc3ad3d0392c3d6267f1bace5ec08f65add6
SHA5123ab8895ee7d19e80ce3433e81decc42be20735d74031db288ea6c4b226e160b03f798b793f8f6f34600c62bdcb3175be75c8e9ba991a2780e358a3010a6a969f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5de130558fd3cfea5cf14773508b7b2bb
SHA1b3a30a75fe12efd62225ffde18417e9ec47d1bbe
SHA256a9eea3128e2e8e21b39ab5c9cdb7c638e7ee94f66156b8c4c6458950617a65e5
SHA51272a3bb1edc629acc4c7a9130b6814e5ac3f1271614b6f1ee5eefe66ef1dcfe875b98d71528a431d223df4e84f3ac4e4d68cd86e20f8ea57e01f8c95cafdb5c87
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b