Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
bcf68b689a919d9d7bcd14df708f80c5_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bcf68b689a919d9d7bcd14df708f80c5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bcf68b689a919d9d7bcd14df708f80c5_JaffaCakes118.html
-
Size
21KB
-
MD5
bcf68b689a919d9d7bcd14df708f80c5
-
SHA1
ef74dbabcbb6e977cbebbfa870b7689f64966ba7
-
SHA256
46572fb942cd76b79bf181f2ff421893f410651071639a731e080d8cf5e21015
-
SHA512
1ac57938faf86d9544edf2678b5b0a9149ef0de98d3103c1ebf2cd862677db95185d32bde28bbf694342bb7bf857fd91e4f469b59173bdd6ab46eaf472afb8df
-
SSDEEP
384:4+QfPFd9QZBC7mOdMga+KfpC5IgSnbmFe7Ac0Z6fi8E1jYGPd:Zcd9QZBC7mOdMgspC5I9nC4Y6GPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10dca13f97f5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430605126" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6939F5D1-618A-11EF-B062-D6EBA8958965} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000ba8c5553e4cc8f8b8aed1746194fdc4a67e707f7670abfd530423927e939b17f000000000e80000000020000200000005955f5963ebed6d5b742154a0f4bdab91e79dfd7ad5a72090a605b1d89d75a2a20000000c24e00f62b1fda0c7ca575867eb571b9bb070156ea5debc2ee35d2bb76854752400000005821eb5c4f362c2fafc1d7d2a677766daf53a08b0409a4340feaaacd3d684be3c0fab3107c0f2f3c619d65930bda75dbf098d2af88b2449c5489fdd18cd586ef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 624 iexplore.exe 624 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 624 wrote to memory of 2332 624 iexplore.exe 30 PID 624 wrote to memory of 2332 624 iexplore.exe 30 PID 624 wrote to memory of 2332 624 iexplore.exe 30 PID 624 wrote to memory of 2332 624 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bcf68b689a919d9d7bcd14df708f80c5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:624 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58593aff96b025b32b7ac3e86c56e5e7f
SHA19f63bde2b459edee7bea0e20a6e5683cb40040fb
SHA256616ca849614dbcdc43d9bb3c85d08b03a152c55645bc96301b53069e53cf54a6
SHA51212b4b8e01baa14330c2649c9065b6cda9dbcf673d140da11238c6667ab8c013758b1339c68b9dcee679f8abc3a9b2f43e7b6e67b5cdcbbbe89da9aaed40da382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d20877a970f49311b8c025e6ab260bbe
SHA15e5b37660c9864e28343adb9902233c116dbf13d
SHA2567397900a4d477dbd53f5f95432d25ae9f3b0bf8edee54f369c040fd58c6ecbcb
SHA51216c4bdb3993d6c0940121968f06cf1dc4119ea2d1a0fe763b96323a372bc8a2e91a76defb29be4dd6f894d9ee5d054d21e07438e6b821a978918628bc1b0b5c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3393a56d809720d55f8968a7a129136
SHA16c7623ed4c0cfdb44383cee0dada9720c3f82d9f
SHA256c8ae318d5fcc499b81eb4586f5d0e2011faea9c27c5a79601a299432f31a6605
SHA5125d20fc3f815fcee02195e420346f478e71bed2af825134912cca8f675da1f7ab50edc6a6d941c897e492613d2b18b23d989521c46516f2b5bfc799c8d08eab19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acc9324fda9902c048eaaf501bbb399c
SHA1cf92a21d277f3ec98af657dc34458b692e082f03
SHA25671dc5efb3b3740ca061155b6c90dac0343f8aa9a66ebb1d58bc937fca7c8967e
SHA512bdf30a11bfffab64d85fcc4b33a55a21fd31226193ae25861e2e4ee98a3be2d88aa82600bcd4536469fab9257dc110198aff1af9edaf8ba3f427b4e718ccdf76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f2c35c71c4002208ce09b3e4eb7d4af
SHA17b33520097cbb0ef63ddf4e7330a342eec657b1b
SHA256acd6010a59c72078927268c8d787c6bef2955dd42a8190b5b9e6869074d8b24e
SHA512f517ef912b513f4eb11bc2e68d4190f4dd126a54ccbc47fd182280a418e4a53994f5118cb1aa3961df0374ff77505ca7d5d93734a08db09f8900af649f9bb086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c78ab89aaab8c1caec0bbda744bf6c4e
SHA1ce20331ee80faf2a67a49818241878a890915263
SHA25625957955c493e407b1643b39d7e2db3093a68d94fe9e7dfac90db45ef55c92e9
SHA5121ac569163b20b55c73ff8711e7043be9a15a76327b1ebfffc20c599c9aadce427cda39373d83b6807715535c12dea8d529843420f60c0c91937557de32f46b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e1a3ed6d52886b9d83aa4554ce4c806
SHA191666dc58b75f75b9a03d5e173156df8be74d35f
SHA2560062e14ed7dbcb0f09dea3919eb4344281ba72ba2bf5edff6c9aac97403271f3
SHA5121c576d6bf3e9af6de0f645ed8fdce43c35758ee10fd92dd4bb394686bfcc356271ed0b77ea5e50958791929daa995b9c10507fe784d8823207837cdb61e7ed0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519518dbd36ec52726c5dbaa0ff99115c
SHA1c3b668bf9e5d332842ce99a36e07e807dc980b79
SHA256f9241ee28779eeadd9006a3fb2a2f33a875201bbf0e977b67b7e764cec74a686
SHA512c0ff316423841b6c0555595c1020110280d5f585c073e215d2e6efffad66cf74fb213587bcb83aa926e461b7b4197ca4051d7e968ae4c197929db21838ce4475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5890de184c0995592a19d25bf041773be
SHA1f45541bf7f7096fb638a8f82d511f3189648f727
SHA256938e2608a68c0ed4e32467f7f5eab286e483448068f8a8ceccb7c1a15eb2ac6c
SHA51241017780d158bda32d7e58ef5322899c411207ceaf403109d6c8564fdda3c9f4b7c0db3fc641c38690ae5f588e1b9f71b5c86f031493d56c77e5b9e9054d5667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5111cfcf12a21d02926615f321fc321be
SHA1263ba89e63904ae7907dbb57de6c90b6f43def70
SHA256249fd29649b2ff0fa04f585fb9936f85142ba444e032c517339bfa4fa2b6e5f8
SHA5121d4d1bddde41d4da4b0dc6ea8f42805f4bff25ed0804decb114b16a9c7dcb26e5cdfed89f02616ce10f795bb93ca91b56560288185d87cadfa7c1ebc11e0373a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559a1fcaa83bf8e48994c6c736ac84189
SHA1eb84740ae3d7a4b5043795b255863ca82c41d48d
SHA256e494fa87938ab23defdcfd78dd9832fddbbc9e469d089adfb257a7fed3e7a39b
SHA5129722888722727fecf51e446d63b282259d72b92c3dc6ad788f39b40fbe20d3d574fb645400c5cc9be07399e2db595361224ce93bdba4d2e6cebb7a01127628e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534e69ef121dd6684ed5696f7b1250713
SHA1d2b7d667a3482c986578b87bd401539b7b8141a0
SHA2565b0a53f99ee0a865822039bfa49f3a9a405e92ad11ea701423557de1313ea686
SHA512889ee71ed0331a356a2f555c7610e08498d5aeb4078d78c2476c075dc2527cfa1a4b22e444de93294e4958a20e660e803dd1cfa8bcbabfb54609dae6d4600818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509c393623df9d3380f7a47c91b97fcb9
SHA11d0b604a7e524b6c97fadf6f8979fdbaaa5bb4e1
SHA2562e742c9b05ea239ed184f12e5e19664406a8020c2c471cd87bb020bb150515bc
SHA512ce9ab0354886e42efdde79dd980770c3f3ee526de43baf9bb37786d8918c30958b14a2e0c035c686188596231d2cec87e3592230ba4ad72825e6510dac2d9710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525c49dd975d7570b51e2a168e36bb7cd
SHA10bf7d617f53bfea17ce82ef2b8612ebdeff74923
SHA2562718740de428bc1f91323f0e0e82f4535e6bdcf5d8dc98771e82da49b476175a
SHA5126d03ef8b21525f9350e416b099d6b1ed31c22236aa52018b5f389b4508d68e2dcad9988804f8cff2d84296e795433b6d3de034e1433c3d584a55b7e2b1d22372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3c9407f31e32358fac431d2c80c4284
SHA182378fb19db82b04140b466e59a3cf7618cdc614
SHA25644d6c6ab1364c55455cf30db953d1fa02174017b3c8a554659a00d7850d3e3ff
SHA512df9c53f4b4873eda5e76635d15ddc21801acf41f874f0188693aabed3ae68a7d1fb3583b37847bcc53660b8d06f6199b3494a0ccea58174adfadb6817dd488d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dc842bad047e17c9169fa2679c82f86
SHA198873c8375bcfcef0d14c625d545f9e60699affe
SHA25625f6d11a3b1e343ba9784a37706a00fbcb71559c5ea27ff5f8543a92e934ece4
SHA512726ca32af27410347487c2df0720d5358abce3d8ff1589008e9bccf57140233229315f27c015e762bb8b708d0debb0b771f5bc8f89492b7e8de851a15374c90e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af1acad1427054cf9a978f6c7a638f30
SHA11831de987f512074f58a520a7ea9d1b905cb1550
SHA2567e7a7e1fa6b58da6474f77e7088f0350f13e97d758c7b099ba382aed5047efad
SHA512fe95b69292283d8d5bfaa97f68530915374d5114616a59ce3dcd2432c6e5ceeeb95a47b953a4b955c328fb6fa010358f8f6bda5f45704f42b5c647bb0b83b844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd779602060024d0d69ea722a9e835a8
SHA12fcefa01b38ce4038f735585ed00a7f12f6b57a8
SHA256e9177b726aead6178cc90c97e0764df74e54c90a61a5ef727e4d73258a3896f4
SHA5121a83a3de19e49fdcef4428c678a4dfd53b6a606ad495a52f951f1abc683b73de9311c1f6d4a16e6d923030bf04d1c50cde1d50ebe0ea53db4ea643af90eadc68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa86d6d009ab3255ab1f951bcc7eebd
SHA1e03d9331d756ee034f4227afbaef1738548dce41
SHA256276d83796118fe064ebb2c5e77b6ed7670a6e19e4bf5d5df9ffa2be06005a402
SHA51276b4c2f5d2859691a28c8a918130fcbbf0853734be8ca40178f2dbb25d50fa1f39b753a5bf8cdb00041c8c89faf16affa1ed7f9e9200259ea333e68364b7ee44
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b