Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 21:17
Static task
static1
Behavioral task
behavioral1
Sample
bf6e2eba7c296cc243bd903015136daa_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bf6e2eba7c296cc243bd903015136daa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf6e2eba7c296cc243bd903015136daa_JaffaCakes118.html
-
Size
107KB
-
MD5
bf6e2eba7c296cc243bd903015136daa
-
SHA1
a7d2e190c7618ab6acebd486c663bef986e9c768
-
SHA256
082e2b2c3894ceeb6577351bcb2d9488d5e1b8ff7aee0f70b938cd1982b0308d
-
SHA512
a905b806f394f05764e9b60a04517d0991f5685680f0404c302fe31811dcfb0e964e8a5a8b4e661525c38df3acafd2ccf6a6154adddbb5a580042f61e8706396
-
SSDEEP
3072:HnLFLbnckaYJN3McZf+f9Zqn03+JKRvcjlGz06Nd:rFjsR
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 28 sites.google.com 23 sites.google.com 27 sites.google.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3980D8C1-625E-11EF-A207-6A2ECC9B5790} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000003e6745120564069776a02faa7c105750cfd20d767b3cdaad17be76e20e0ad09f000000000e8000000002000020000000eae33363f6b383f780e008b599f729b30e90df560e11fd0c0e5d66e98145778e20000000b252e91ea03ff783fcd275f3d3e3a2a7bd790f8f5ec40d539229f415577d032e40000000a9f46450bc752a31e198ef64e447d3f5ea578c7099e132a2e9b81985c8f152fb516666d28f0180a916254d229b1941ef6eef4b037fb26e2025c6a7401e037b2f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00cd7a1a6bf6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430696105" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2516 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2136 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2136 iexplore.exe 2136 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2516 2136 iexplore.exe 30 PID 2136 wrote to memory of 2516 2136 iexplore.exe 30 PID 2136 wrote to memory of 2516 2136 iexplore.exe 30 PID 2136 wrote to memory of 2516 2136 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf6e2eba7c296cc243bd903015136daa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD50388e32410094244af08c82060f2b120
SHA132410801b038aeec2231594dd37899c1faec0f48
SHA25689b8773cbf81d73582698bc393b18d1e1e977054e1c217d1c1d6b629671fee50
SHA512d02bf41d93a9411c3fc6bf0212aea00f51d3a7da286335593085e9436dcc2ccb59cfccefdffc2208ef1d45fa6b7d27c0feb95541cae1dadf03b5039724a92028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e37896faee77dd5291e81f434cf3fe4c
SHA18530f114164a52af2099abe13d7f63e2d041b854
SHA2566411c484dc267b9905516458a81316a6c0b53d5189a7edc698ec3406ba97401e
SHA5121536d7269642d9acbd48b878a91265700210bf187c8584b81d158286e1ede0f13b0cbca0267f6681a5a9bae5074ac9f53ad44b78a2b1f26e4e572da4c8d977b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f3af550aab12406acd0fbdc685ea6cf
SHA197752222d32633c3924dd94576697f8f3762ae1d
SHA256956e42556db81f71ebeb6549e62b528686be32de72c394bb9a3072e75410ba8c
SHA512b87cb3a6835d15c124068913f29458c19ff37d7f4ab27624ebf50a82bab51282e941e5aea8aee6fb3011e2e73c8b8ec47a4734eee871684f60df802ab266c4f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c439320464befa5fac07880486dee817
SHA125034a0dedc974d5f6e5e7853e824e2d05f328d0
SHA256d1c6a10d6921469ead62034ebaef9c5c76301e03cebe4ba9415ab4aee71e5df1
SHA512463610f4445e34391e15eda3c6920abcefec7fa1c95e0efa8e25674ef99b45056e6ebc52eef69aecc6da580b57f465edbd297ae36ceba133bc3dfa1b8a5506e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eb2e40746ffdeb65905ee8f10779779
SHA1dab20ee53623fa11a9653ffe5041cd7e5414547a
SHA256a0a356682435ec02110adb4d3cd3a012f401cc5fecaea0d91a519846352fc29e
SHA512cdf11a5d789451e7826886ea9929c755acb28dc12c38000d0c844a90e2bc85ccfe998377e5f3855c1a86ce47bb4c038b16882542894b605cd9f55c4e17c46a58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526335e302ca6654ab539fdedbdb122ac
SHA1f7030032da3c4dbe8b8650bcf2545e709911d806
SHA256be2c0df0b6d535885b3187357c305e4d46e774eaab8ded2fd3e88c3aac8cc7fc
SHA512cc9147e4a4e40790263409c200c2acb789b128468f9b3b70987e48aa9762af3a8594f415bc8b192a4d8777706258bf160977ea7a32915f832e47156277042cad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550ad4510e18431f42442742b5d2d86e1
SHA160f28118abd2ed13071dc84309fb0edc94eba973
SHA256d5574ff2562c82243ee86d094618424152004034888053c2425e4042d84f999b
SHA5125289e2b009c662480713c725d079211a6e8399160dc2cfa66ce0549f3d1e47d3bf016337074ca3a74fba1ad33e2e7e82d3080fdc0fc22563ebd110747c58689f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5234649b25ca85efb01dac448713ca555
SHA1d8322972668944290f8dd0ca1dec5e8f3f7aeb71
SHA25656abb9aa6d2211b7a6ce82abd9f4cef90858b25d0de6e0073f041fc685cb0a20
SHA512009c34fdcbcec8589380c4a079c4b5a25594c7a3c3d92a468babf48ad1d7a75c663a4f7d52a721fe685f71466579b01c2fab0991b125eaad4bbadd0d2fe0064f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7077a81842a279c9c5419612f1f3869
SHA1a1c5c60379f8fc8fb5deddb45b76170c7cd1e49a
SHA256f140f2e46608a45ff4263510ffd2b77df77654f8bcbbc5e234284ed5edb8fab2
SHA5122182d3fdb0dabb2d6d4a8f01cd31ffbcd23cb0a609fac48c11c33dd35129fc03301bb1cc04785e0b0a6352d8ccd5252f083ff2815eedcf1b0818d58339b2f402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3c6fbffea3ed5668ec6885efc5dd73b
SHA169549fbc8630aca48f03e14e420e6d8ae0ca6286
SHA25619ad31cc1e810ce92c87a7ed7e4bc0aa36a08dbb00bd514f72c2a104dfd0e37b
SHA5123dd79c7fcab4b7f4ee109c2fc852a50607a21066ed7ccac6c0148cef7f15704f0f155fe0e073ace29a144faf637cbaae8f681f8aea04201e1efed062b15a975f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5c606d51a556eb94088caf52fd00e26
SHA1c7a6431ae896d8d08284ea8555599a4ebb49b926
SHA2562af4b202afcebc28ce82ad5409a0687992a2401fb2276004cfae146f21ab9c96
SHA512358bd211ca14fa44038961532bfd1971d0fffdc16552a6e6189814f49e8b98af07813940f0196119f35b6386723ac1bce721e98931fdb26b1fa017d71619f129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cddb0fc34bc7b60bf72ea970a3fdb7ca
SHA17e22a1e3ed129d20ac71cf4a5d1bfbee2c14f711
SHA2564dae47e5761b667dee829be9d5b3e373b8b30de8b17cbd7969ee4e48e03590f6
SHA512c14bbaaf2eeb987d77c694b032591b7fac0b97bff1f7c2e7928050e5b48bbdeb5505b062ba011ab3c9daf07d485f64687fcba8c1ab45bb63e3beedba3357b45f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512434e191f62c1c7a729da126c93ea36
SHA16a7ce49032fec021bcac281f59269883ccd9fa0c
SHA2561839795ed2b4295d24d53a3381f9eb283531c1a729b8a2eb815e019a74812712
SHA512ebb11c76368916e68326ba721fa7d9850df6792a3af6c7d65df14c30f15927a4c6631eaace72a1aada0c505a878b88004d9f05d6c439998657da2b81fdea16bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543f534b496c4b3fe1c0484347ed7730d
SHA118c4d2c9ee7e57481937a670668419791e5444c7
SHA25674f5bd0d9d85116904bc3bd307e787f8e8507c87cc6080d2ac517e6a6775e0dd
SHA51205191f3eca6a53faa71458b9ae8fd2bc436916809da23f1cd592c5cdb30356492941b578874b5e90d663312b4c87e191393f2f1b273d828255d842b1915b64f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55baebe312416319551fc291e5ee21e90
SHA11638127607782d02c1f98403fe2e8eee2812272f
SHA2568c2480311323947cfba603056158e69dd094e7a308916ce668c9e5e464ec746b
SHA512e93a44f11652e1bb3f95c269748c586da83e281b233710ceb1463aaaca6eeafc4c8ccc9469ee6dfe572e5e6f8ec9e266053113765f6608f0ef595e2561b09e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ac766f07a46b998cf584f8663fe0097
SHA1ee680f270243159daf4c2e41013b9fb30f1b34b8
SHA25603b48f965e8cc9b3efe298568a2d68f8de2c5b39f5ecc1ef26d0b837a1586628
SHA512959069d254a058150feb50162938f0264700e4a97b0264cc8b063cc0f231f1c9f1d7c022b31e29d94d636aef2f0971db7acf4fd515451e1f4ca58638dce7d10b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f369b21ed72738bfe94bdecd75b7d0f3
SHA130fd4dbb87a5a0c1785678873c75f76cb047ae8b
SHA256e38fec31de0a7ca5c9aeaa4dba11aa894238ccd46a971f3b402cf6142d7c5359
SHA5122fe2ccd889dbab9b6f82308ed0a9f858a78d43bd478c0ef767d9fb2f57531ff72d8690c007494784cf877a863a71b09fdb3a9e7ead818470caebb7571a1a3f34
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b