Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
bf2afee3f3a3903625ba2177303f593b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bf2afee3f3a3903625ba2177303f593b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf2afee3f3a3903625ba2177303f593b_JaffaCakes118.html
-
Size
5KB
-
MD5
bf2afee3f3a3903625ba2177303f593b
-
SHA1
01c22be6a611f3d75e4a0f8d23d131d8e8725d43
-
SHA256
04ffabddf1311d3fbebf7d3a696418a65346bb205ba1ccbe38eced2e487e6cfe
-
SHA512
eab1b9bf8d9e6a82f7e8b70eccd570105acfc94dcc435450d10aa030187c42a8a59250d79fce8bdb1dce62aec486c768fca201ac6f309c239136dc35f7f5f98b
-
SSDEEP
96:i/MTmKPpzryOvStSngz6ScndtgdfCaMVWZaGJp:icmKPpny+oDinfVGZp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{27E03A41-6243-11EF-AC6D-CE9644F3BBBD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f25cfc4ff6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000071d290975272d2582b2c3ffa4da8670e466492f852bfd82038b44197c4aa6561000000000e8000000002000020000000476c80fac90ed2a4677b3d18f456a5664090e530c52d0dea88efe9fd3d14d2e520000000bb4d08783c3a863c801f3fc4880b9e0117ac2ee2ce837be3d5614266ef8c62944000000091bb7b698fa23a89f68752227e70336de53c4fab788831535adefa7987179494ab19a7fee21ead0ad73577eaaa2a9ae9504f5d8b2670a7a6aa20b5f1636419f8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430684471" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2500 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2500 iexplore.exe 2500 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2392 2500 iexplore.exe 30 PID 2500 wrote to memory of 2392 2500 iexplore.exe 30 PID 2500 wrote to memory of 2392 2500 iexplore.exe 30 PID 2500 wrote to memory of 2392 2500 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf2afee3f3a3903625ba2177303f593b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543284c2066dc2a37be617818d5072d02
SHA1b88043f48f169daf02e59620a60db1e790f9b9ab
SHA256a827dcb2ee2d38033be42d3dc7c1862e818b83650bc229f738efee3effa46458
SHA5123086c6c67ad547bdd288a7573e8bf24b688c19be1a30423563d3691693d6be878014cc3852a67154d20dbf12afa5d115874702036f51d9605428e4bce05f6f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a42af935558d414314c3d15ba08c425f
SHA1d77ea1597eb3a761a64a3c2cc59e2e9d1eb188fd
SHA256c0bae804f32ccf8e2b583524de4e906607acf82ce6712f0e4e6b24e826961a99
SHA512c59346e2eef1ddd0df3356bcd552456aa6766624b5d8fecdc2557842d7c57454fe1f2197f92c56b6ef593b83d313dc9461a65efdcab71211a386d2e7dcf41a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ea4295d65f08b6c448e7b21e37add87
SHA14eb1da9e1aacfd626c2b13b24136e288d0f10c6d
SHA2560380d2aeaef216b3fd67081cff412029f5314a66f7394a1056e84960233b3213
SHA51221c3ed44aab469e20e9ea9990eb6027a73376f1d0c601b83108301a14ede1fc342d7be26cc0f04ef56df0981716681d71541dd4b813b9fe4a9a0648c64dcec4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5debcbfbdb22b3e6b093ac6a4196f76c7
SHA12f765957d3f32daf33992104d809b06fc5104f82
SHA256edc17ff525e5560c28f341359bab107813f13d189f123ee163b1d115277355e6
SHA5124553e5409e9b4e37ed132e468feb9a820aaccb82ca9dc0c1896694c78bc636ac023ad316a9ad8b7e9e8387036c72b1167e9b03fa0b6f8f22ef1e1841047fe4a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562c4d7777772ea44aaa8e9249ff357eb
SHA129792fcb170ad48e7affefda980d7e5730ff4beb
SHA256f40bde0c4180d0b19d862d7955da863c53eff83776cd6892706625e9b9c04929
SHA51220782dac1e9c3da2c3faad60d5d2d89b4355cdac4d2b1e94e584c2c34124e70eed64d1468ec071a6e92dd395dc5f9d42616c6920388553432ad8cbc15957ba31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f4d258b51c7dd1b5a026c3912be27e3
SHA154acaee304fa505b95dfe49ed16de3d8e44aacc9
SHA2563e8edc2e0b75e69d1e45ddbf94bb5cea807742cceee66ce4afc7ae7826d01df1
SHA5121be96c98d8672030e75e65d29ebd49d3a89d28cb2e4d71369dd65ed599b0890f080846630144bb77f9f264c69e96b14f06249253366fdf731dc404d939b60129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5cf36a0d8ad6b738cd8abf1da4db5fc
SHA153ebb36090921013f8672792e032bf2ec14dc3d6
SHA2566717084ab8fb0a991af63e3b61b9ab379b09fc62195d8dd06b85810d706477e3
SHA51263a3102e4519dec61198c0fae67802cb33e4eba0aab7f030dfc6ac426a918f35acb58bd54322b6ddb1cdf65f9b8b64f38188943815ac60799245aff78e409ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520e59a8f9204b8f3b050d3ef410e1079
SHA11d2e91de7ba37ad6110896f84558e96cfd2a8526
SHA2568564d06d95c3f42442b57bf616d0e5629f888947e1844d3a77734189cf976948
SHA5128e86956233ae9a05a7170358e3db2eb248b8f5cd117b23fff1d96d201f2ab35868fbd6ab0e25ff6a61152c921c1fe3c64c2fcfdedd259e4828c284783b218bb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b64d89093db37ecaf529281be4b691c
SHA13e66b19ef1f266a2f4e0ddda1651dd7e3a8eccfe
SHA256c655027e19fcc3ea356aae986ba8adf0249f4e640022b1a94688daf9dcd17b05
SHA5122d88b9bd550d8c2589a3822060acf3b5afe17f525e296785a7e6c212182f30aa9dcebeaacc98ec02572d127dfbaf3d856947051d717d2a384afb9c2a2e0acb79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521736af8b5215cdc68613c31348961a9
SHA1fbee888c4e142763a194d6b5aa25ef6a2aa0be58
SHA25693792ca68922f79fe9544679446392ebd1c4ae68a08b57783e483da946292f71
SHA51267c617f855394b6ddf3dd14b38721474959d1b27ba9ba9296505a78ba64c8d7475a2dfe9f48942658bfc1c8a8b90b35630ea018ce436c8a9a2fbb5d2ffa356ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c54ec3b41cd52e5f28168e68939350c1
SHA1e86915251319c10d1df48c036480f7df47dd2989
SHA256e8ca98975fbda4acea03ab60c1d57657c745ca80c6163f9809ed988117aecd7f
SHA5120174992dc62bb9f1e1dccf5dfbf03be27db617f05e4315d8b8eb00a4575272b242ebdcd9bf6530f14a94791acc9724f9fa8342aadffba72ac0368610cb80b4f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0892ac575301f475856a6825e56b04b
SHA19c6a1ea8db314e440516907d04612c606e1b4c81
SHA256e2d05dcb5c1809e8157dcc2c759c43b073b822023eb9a362faee7ec8a2438c5e
SHA5126a080f7edec558826c96187a841e58107fe230fa85a506e9e152e0719deb9a3c606cca5dfc5b90140cd6f21acd67dd7141dcab6940ac050190aff1f70ef53f39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c112a7b7ab9523314de63cbf65daeca
SHA18e1720888cc993e7e6f70fba7d52b72659b0edf7
SHA25660c5ee14d67d9a97558e94037b48713ca405769c637b2b3a46ca20fca1e0fac0
SHA512cda791c1df634e73b814155b54a964348759397d3973a1bcaddba31b7c7b43f36bd08a6d101d0ae43c4dceecd79a8c890dec3d8b40021663da7370babb92b7e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e313949b865e1f0467e5d5e766d146a
SHA151cd00f32264b5b250b457b0972b4fc98ec14013
SHA2562d1e280cfd62472ce31edf418bab8288cd4642ec51e89b854c5a2290f9ef9d2d
SHA512ad5abdd6e0ee0684da78d88348830914e03f2226928066fb52a73eae9da782a9a3bba1d489c7fec736d21c380fdc5a308e1a4968f2050d85824f29756f5c18bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5077bb33674aa50236fdaee6b2434ba51
SHA1000b6b8e7c677563689361efa739ae114a990aee
SHA25609390b63500469e07590eacbaeaa3a7c45e6d85cafc6c07bbce4f19351068300
SHA512956138003678c17b6015d07e3ad225404d60e242a53570f27ed046f7527f66f4095c75a027c3a7ddbafc8b99acf8759f4efa1f134b51b225fd55683f5d4ee70f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575332488701edad4840e1b1d4867c438
SHA134af3366a7a444e1cc7708caf07780d6d847770f
SHA25660981d04dcd84fe2ff5d20ca18f9a62e6fddad43294ed0214cc92619e75c3272
SHA51272c47f8ac1f9f287461d76ab2fddc6f281d04c6efcab3fc3cea749948122aefd2be2f86c313338759feb7f41ed7bccedfcbcbbcb69632033ec045cb10ff865e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dad444d4a6166f79d2259da98af6b0c9
SHA1e38edd4b34cd9e4ad2034f5e78da79669f6b365e
SHA256213e315a8a40475c9760b2a54cac642fe978e014d60e556503af6f67338a2c6f
SHA5127f80313dd8cc7ced41458eb117ab667248140bd869691e3bc6fef9feef094e7ffb6882fc6a4572eec109bcf402c1bb2df7c19d169584df6a7c8c99247c4c8b62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580fc981ce155a2d32212f46bdfc05ed0
SHA1da68a2cfd097022cc8a68e7c8aed35e0e8629814
SHA256c03c15620c772337ffcf9edb2773a591500e4c1926abc56ed637adfee7f87f86
SHA5126aa13eb5706c7173bbd630bdff69a2e3908ddd7bcac6a88b53e2261ad6af4634c08211794b3fde14479f39b2ac6ae1fa26e61df69050853630e579e1ca49166a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efe33e0db285cd801549e711c8138d12
SHA1744b231eabd77de450d277fd302d32d69019641d
SHA256a10909f5df51fa727ff97a65ee6ecf6f66c7dd9386ae69d0ae3cd71c04b027c8
SHA512b97d0a68a2338f32a1f8ad4adf8798542b9ec009122500f22dc79307bf4cfc6110c3bce8fbfa31b449303a9bc2423ff3cff817c5b8900c878e2024fc6e46a1ae
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b