Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
bfbdbbbdd668a2f7f16c28a4732397a7_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bfbdbbbdd668a2f7f16c28a4732397a7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bfbdbbbdd668a2f7f16c28a4732397a7_JaffaCakes118.html
-
Size
170KB
-
MD5
bfbdbbbdd668a2f7f16c28a4732397a7
-
SHA1
32c7886b16e8d2ec078c1e80475887274b8e24c4
-
SHA256
0cbaf63e5e147369669cc49a944efabf450652bf84aaa012427899a85e15b467
-
SHA512
3ba98cce6cf0970426529cc0567b8366ec577f154eea1d6be404c8d4bc5f6cd7a21609fbe3eb0661d0739db9c6561618615fc4cea483daf394cea6feb3373b91
-
SSDEEP
3072:5CcHloyBFBpNe1GXLgMHGOP+jxjCMKGTypVIhFB2a7g03yfkMY+BES09JXAnyrZ0:5JloyBFBpNe1GXLgMHGOP+jxjCMKGTy5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1EB58991-6278-11EF-B231-72E661693B4A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430707220" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b08795f384f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000f61da18b11c8942a179ea0d2462a17cba250f9f183ce25eb47fbdac79f026e0c000000000e8000000002000020000000dd822ccb068909d1a89fc10a80cef928a3f23b647969ddc783ec4de690b8a6be20000000be6548ed41749a87bff0ba3b7f4130023af36c9e711bf02dcbf6a1a615475721400000002e66102a57ac4c7c853eb99971e015b0b321ddece848c6d5e07f34aef589531f4efb53f5d9a297ed803f9042a7f1b0c4ff3f7c0796caf48c411bee9ef732ad3b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1344 iexplore.exe 1344 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1344 wrote to memory of 2524 1344 iexplore.exe 29 PID 1344 wrote to memory of 2524 1344 iexplore.exe 29 PID 1344 wrote to memory of 2524 1344 iexplore.exe 29 PID 1344 wrote to memory of 2524 1344 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bfbdbbbdd668a2f7f16c28a4732397a7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1344 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beeabe74da2052028766f037e381ff10
SHA11583cc5b259a7e2ffba301ca09e47fd1af509e4d
SHA256122bca761a596d5fb45311a83c5fb9978d8f5182841407dd349193dc925e7d4f
SHA512036d0a3d2e3d146aca4a442f52f7385eb325ba516db5309da3ba04061b37a1c917d23e6feb14f4a67a0e4583f5cbaa49395c08237ec290f2039f9484efc10c7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519a3a4c5344cc052cc5f81cdd714fbaa
SHA1b4138319df787ea0a8b43498dc049a85287e1f7f
SHA256785628ac5e18c4310ca8054def87156ae2167d920673f4be9fb0c547c30bfb1c
SHA5127c0120a442ed1c71ad724e81f01e06519508bebf027b2900eb252e5af9b0a6b75a9db37e98be58d11456490adaf0f9e04c450a7ab54c399b3f8ed42e0772341b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5086af68515498d97e3ffc5f009cb1336
SHA12405ee20c5bc76322463b3847096a61b900f515f
SHA25629f15a09031c2313ce3887ba6e9eac3650d81f00e0b8ff3824f4996537b77208
SHA512b21defcf4d0429606761dcf4d021f32fee372b256e4a01f6c0346e830e2761dbafd518e8530ff45b1fb823910cbd0f3527dceaa57dd55a02d72d9c6f1d4b195b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567b115e9e67b8cb6412321e5173bc1e8
SHA12ecbbe36966c63e6b35faeec534b799d8fd7be2f
SHA256a7400b0027503a49c13c23b5d27877ad15261d5f7d586845952981b1d2ff601d
SHA512d474d534d34b23dd08bbb063ca83158bbeeb27495e2dddf7fb3b9aadab8f2a4682fbe8f9495b4107c4089b9b7158619e8f51055de3a91aa0a138a2989de3c196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5776006249427728f90ee392d4cd2eb63
SHA1c72259e946dc353a63292a81571492f3ad3c3f34
SHA256f59cc7bb6282a9074146088792452ddec24ad691e348aae32e05e2c38a7fe89a
SHA51294586b616967414d8315456f49aa780c67d49a659d0451efb0442c3908eada63fd2fcd04eb9d6cdd56a172e79b822fc4072a00095f002926a8ef5f93d03a1268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598412ec39ee682ad8b9e91ca129198c8
SHA159d020453aae617e536ac5d94b2a2e2e07333a24
SHA256894b6d5b71ff30c85cd16f865ace82ddb09ffe9e81871d6974da3932b1ffa201
SHA512540f5672bad3874ddbf9357eb263c166ef63de26a0c2091e70877af4141209fb1f0a734b4e7202fd0068973e1f4c0e71f1c7922632c8df4b984a67dbee3e1492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c4c266ae684a3d7cbfe270f7798bcfc
SHA13e942f276f0652e0f430eb993d697c30603dbb37
SHA256a3a4a6c5a4af42631ea81082a0d6583d3d080997e1f518a1521f2576ecd7fd28
SHA512cc3b4987f3a86b9b9db5b5c1f5784ef1b4e4f75faa2212eb55633841ca8c821e71b409385840a467f122b9549a850c5f1a953ad528592500279d3d294844acea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50123f130954c6740511448707bb53614
SHA19ba4f8f302acc4cffb12a32140d5763902caa29d
SHA2561e65e9638d7d2360d05f2d51d1e06156be0d54f6ec70dfc49a55a6a4c79a42a6
SHA5128597760309419e2e2fe3d392452914984a0be75ebe428246162ffa6d729afa113e9825c0a98363a079ff395a51426927e27e4df216238206e1e14403316cc5cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5834940a5b43495d3ba824755234cdb51
SHA1633a9677cec19f35165602d63d8abcb7a3ff8cf1
SHA2560fa18bb36bb4328ebb19e8904e9977f47e85e20b55de911da59117514812dce7
SHA5120b4bddbd021387d49f207f66dc329436c1ce0c2e72ca455b2f9a3f3d5f4b22b89e044449cfac6ca63c710364392436c1e6435ca94b2889533fd6524f69eba0e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598e3a34ab7ca404d11323d5c9631db04
SHA1418cb645192a29a38f0860acb425605d6e8bc38f
SHA256f58f878b696ffd3216f11025857e20f460cf6a3b27c5cf054e53f51423bd7a11
SHA51239099f123e0c3da720262d4ce9dba65405dd33b30a28463e94dbf73e6836d5ce1446058e45b755bc44623e557dbdbee2b4dbce3b4f1f704076aa40b3eb8f29bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5232b4b786f1fb653f49de93978c8f8
SHA18d46b38324df7080cd27dc527419a3b29041d75b
SHA256e9c854ee5fefdd5c1eaf41ed8f98f0a2723ebeadf6738b425e70c44faae6b395
SHA512bd331a7ba41db3a48c1b5ff122fca78e187ac090422bef208c866229fc0fa61bdf8e4f3332ca9d52054beb41c375ba75eae4c851a473162fc8ab4b371bda9dfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf138754ccc584fe594278a57a8ddd09
SHA1e9a72cc356c5ec57631c35a5e997da3855263b9d
SHA256305e39d54d395313eea6280ba0276b68dd4aa780b53fb89a6dfbc336b6da974f
SHA512b5adf303db315859fde8a9f768823a460774c74092cd0435b24a4418d47f2b42b2a7c1d8dd03d950da081d9919e27869c41897416febf7badf82030b0a323cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5140c2a3c1cffcdee294f95dba3fe1b18
SHA1afc4b12fd3d583e6b7c782e4745fcbdaef0d1d49
SHA256bc185a8f42f097a999f70010de0093e8724ceb9f6d4f965f95cdd31f2b436c41
SHA51280b23513e3fc1844ebe3dc9eab26a7a5abb20c6cc4475abefad0d382bffde96aea3b6cc67e265e24515ffcc253332989a7734f0406c7173d6206b08d09284df0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e7ea0e42ad1137b35879e58febc5e37
SHA16e4286baa16b28b6b3f43e34ee84ed9702452074
SHA2566800590ef373953bb7f58b7d4d693c80430421a0f2beeb78cbb75c4f985becd4
SHA51228ffb457cb0ec16e579f942b013263590fbbdabc077c6ef3ce81b25da2aa6066555e588f2419894c7c0a6a7ae87deaddf9dd6ad2de390eadf5ecf568e7d76421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a8c0e12da939b15f2050e7442608a9f
SHA1e2940059e136b21c648056915fbde027fd017350
SHA2562baeadad39f52b6ce26cf8e039947ac0d69622dde8c4627acf96645e63bbc7f7
SHA512c2096da7bff32fec83ead7f0a5cb2df9d81c1175b74b81892edc1b73f0839979a45a43b0113f0a0b297986f28e5ccbffc43fd537543a133d1b79b2ac5ca4a436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5571f4294d15c1edd7f4b3a090d9ababe
SHA1a85285592f291f5215b5eff85498e870fbba7853
SHA2568140bad7b2d3f4477bda32b52b597f401ee6b1d1cd1ab4f3d746d3c7448eff6c
SHA512235a904918d0b4ef7800e7c592f5bac0160d609306cfc9c4ba43b1f2511115da684d1da926b95e58ccf5feb1865ec190884edf1c976fa2b7b89e5ce107b36cf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c56ba02c237ac26c9fb9a43df13bd034
SHA14df43d209beb7dc490bf2a39905a0189ec93a1ee
SHA25651538e0e8392c6585a67a81d9ccf0df1a30456e46504d5ce6b22890bd489a01b
SHA512d364ecde70b7568e9d0a1df4e24cb1676945998bc313c26090ad167eb329dd50c6b0dfa74147ba9c04f4f2c4cafc24b2beebd8e03f9e8daa1e223fa6e31bdc50
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b