Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 03:41
Static task
static1
Behavioral task
behavioral1
Sample
bfeeeec3ec31429d00cf0fe48f2d9d21_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bfeeeec3ec31429d00cf0fe48f2d9d21_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bfeeeec3ec31429d00cf0fe48f2d9d21_JaffaCakes118.html
-
Size
77KB
-
MD5
bfeeeec3ec31429d00cf0fe48f2d9d21
-
SHA1
5bed7e9abf1e04d8740dc088ab78943ee0a4b4d7
-
SHA256
13bd0b934016c5edeeb0f654694c5de4a2c3b423c2f3fb91000026d1e03b3be9
-
SHA512
cbde76cfe2e19700aa46f468d3040a2d8d1feb62ec1f4a75817dccf6edf8d5d3aa0dd1687fba620f2010f37d1c4ee4edff80b986cb7afd2f68def6cefc727f96
-
SSDEEP
1536:s0uDX2qXVUjXsOXWrXoeXOeXL0XTNXYoZXvo:sdvKj3YbhYRZ/o
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430719141" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E031C781-6293-11EF-8732-52723B22090D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000eb058438ae46eb780b98cbf3deea3f2fa465bbe361c1182a52f365cdeee779c3000000000e800000000200002000000069493ba32d48bface5f0b1a574e3dec1e94c4e200846bcc66e8f48cea107281120000000b8f0454573c1a1352fa6219ffecbd079e4021cbab81996e3eab671cefec9f7da40000000b57399d6a9eca3b416e80e28f37d7b473673eb53e4b7f7a2922a6bb5c1aea13e48b48ab7d00aed1366b522cf5546294fb22b051d2f00c00a2769167e95ae69c4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f06a7cb9a0f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2880 iexplore.exe 2880 iexplore.exe 1780 IEXPLORE.EXE 1780 IEXPLORE.EXE 1780 IEXPLORE.EXE 1780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2880 wrote to memory of 1780 2880 iexplore.exe 30 PID 2880 wrote to memory of 1780 2880 iexplore.exe 30 PID 2880 wrote to memory of 1780 2880 iexplore.exe 30 PID 2880 wrote to memory of 1780 2880 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bfeeeec3ec31429d00cf0fe48f2d9d21_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5448ca68aeb8062c1cfe34fc4d01c42a3
SHA1c36020f2df2191389b683975fd9136fb1aa262ac
SHA256445ed858efd13dfa163bc0a0430023e37b2e62f1deedafaa5a7a1026fc9edc13
SHA5122534796dd6ec6651394d10df7997511b074cd166605f2aa2bf998e766c710abeea13307936b498afe21267185c158e806068fcc93ac2dd5f612076dde963cb5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544302f1d76bebce334c3525419adb1c6
SHA17130cc1af9ce669d7f355152d177426adfeb53ea
SHA2560131d562be6f47e076e75545d9c49c218d8bb4d264250f763668a7d11b9313a0
SHA512abef1c6dd2187e01fe1a14642e956994705019472d5e37ec30bf2241d1417a15499db54d4bc2cef263363f8a0fb6dab96b6ef85ab89c4e522644c3e0eac2319a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbc714b77be6a7f2fbfb92823be13e67
SHA1451a3b2d96103fc5d1c75badc669662127ecef8e
SHA256d6909e3f95624eb860a10b33139c2dea1c4114021cbdf736cdaced01bb2ac7c2
SHA512ca6b6aa6c36e1e0a3a74ef403a0093c3571cdb6f0ace534797da6239a234e40ae907801278cf3e6b1e86434277341c05f2da7f97a98b7624ad0948dcd2a1db53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508eda9657e4d33cc96a7292649a9aade
SHA1630877a43c21c8b63355c0464f63d0382c4dacb6
SHA256fbdd40590b9f30ef4209022c6aeacbc2409e8fefd8fea4e4d3ac3fd801e4f83c
SHA512b13379d0bc6b05b92e3ccbc51ce132ee698e3c716cf50c06d9cf405b4336f0908259916155069cc4d2f885fa39fb20694027fae37cee7b433bad4b924b39d3cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1cf8fdce7037296b7cfdfe6f8a903ee
SHA11713ff3b4040c45c270ef196a024adf2c965efe4
SHA25649b4bb2012eee229c12a822233f55fa51f9ad6cd85f180e4cdf2d2c278ccdce4
SHA512fbac45e2cfa5483588ff3b67ccf793b59b7622ed9da8ed395e6c4926fe0e8c5c933e8502d25c3d1c9b3e4de578d8ea87c4d8348ff8305be19613f4ece3062e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bde74cc4fe0b85fece35c6c56957c209
SHA104a357b203000817613ca736f096036960f53db8
SHA25682a0250ca7c17dd4bd07512689369c3a8cf592388a3fe8d1d4e0f593b894d158
SHA512e5bc4379fb88e88b12c707d957b92e78a92091cf0f1c00e1ac646028913e8e44102ded82b476526638aa730c9af39d873f118ffcf8406e7f92aa45f6f6dfba54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd243458820114eaa76bf26fce29f550
SHA1bb3682a5c7a0d0f2a1afc3ee21a5bd6477b4dd5a
SHA25666b74eb1ba270e5f338d969a5fc06b3d9172aaa3891f8684eb432b7c0ce15044
SHA51245bc53408b17afd7b606bd3458db5685088d9cf4d5ccb13ed0c47d710dacb5898f87feacfe135f48b6e5249182ea8ba416fbc73011e6c38d2ecc9430f387beb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54926e2215463d57d958f543381fc2646
SHA1b492f9c73facce36c89bf2649a4e694c9f4e12c8
SHA2561821a5b82909c852b9160891c8489f9015b7ce05c4b40c0a514850fa34e3cbd2
SHA512e739a212fc15d5189a996ef147c590ae16c7dcf81f2ce63d584950ef99717d9adb5cc0cef5f6d9ccc44fe0b467244fd769dfd772468052a87d2da4d1c7d2c383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552ca1cfab3c5c0aa75c5a75fa57eb2e8
SHA123c2d741a29fbff825cd3db138102e39f02864fe
SHA256bbb1b3ea42fe23f3074a631cbe54a13dbf509ba48bea948fcbc9faf8a0e8dee9
SHA5120013e65cbfa1156e605298e2d89529dcb21cad3801f446f7061bda6e86552c34e6f9d84906ea062a61427fc0be4f1aada93e721787bb1e7d280ad50067b4da4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a2290957676fb81d7e562c0a5e8eb04
SHA1d724de0c367d58207785a00fddfe17799b4579a5
SHA2563ba239e1e01c3b8172d7e6b7c749937028b59b08a2e76cd782f618e1c77fa81b
SHA512e775a423f01bd5dce7a70a05a0c98646fb31a5a3326af4075e6f5a22c2acbccb2c5c399fc18d09dd513a461f5a5683ee32f0e015686598d5512d8c30b26a4d71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c890c7fd4fc2c8f6fc81f91755970be6
SHA1dfc839b6361e7c4f4f1b438828759165c31f0b0d
SHA2565f7a0e3d6f311a153f13a9a34c2fb73eaaf1b353c0d24f7c2edc7fe1222830e9
SHA51211f71d3297c9188541abe5a6d8197792a853d6d3ffc74009e36787d6edd233c84624bdb1c2d713f72899db74b0aae7085ceef6187699aa5b96bb4ad32a6a4a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a198a3597f049f4aac2cc282858d201e
SHA1fe2cb71c84ddb46f470681d0c09f345d23f3e581
SHA2560e3c776b284ac1e31171b3febebb89be3c46c09fd354e3095f009cc497847cdb
SHA5120e4956cffa643acbb61a4800c0814201677a3847b76ab1ce52c038161b6a05c449c2851b167cbe15afebd0f3c868146105cb7ef1bde9681d98d9e19c2b63adc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f65ea79b9582d1352b2b6d6627d3316
SHA172d37664915f4523970ac3cd18d0d14ee5054e94
SHA2560320d1ba2b32e3439bc23e5ed191c6d0dbf403a0f44524a958f2fa5f32d13e0c
SHA5128a19af87ae3b65ebb5ab6b20c560bdc5f1ae944b7c6e71afb22ba08e3587bcbeeae0aa07a0e3026a8f810580c805978b1cc2c1668c3ab2f336dd113b3c5cdd65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6df090f85e5a3fececeebf8bae881ce
SHA1ed3bd8aa4313dfbf54516e77a217e01d755e2cbc
SHA256f19b94892d79d13a97abb33c2401a716d72d7eaa92be95800706e3d1928bd3bf
SHA5120cac1b78ea2d16ecd08388393fbb8adb454fd082be284ff60e87ad355e445f9787b35007f9030c48bf9614574a3e238b24000d55ca668ea4a0b891416bf82118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56ea1c750effab231518d8d66cdc0a777
SHA138c86f2adc2d317351d61ee2a52d39e53a38b2bb
SHA256f6dfadeca33997bfc7e411d0ec0096e12160e66c7f112eeea165444a5cfe5d16
SHA512e9803976654ff1a9e2dbff4343c7bf5b4c4583653c88df892435384528aa10c5553ac5a9a5241fa36f1f67097af0165cabf7a3418cb468a65e1f91540d76e406
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z2D3H3V6\logo[1].htm
Filesize95B
MD59c8e0593ba342152a39c1a6d38740218
SHA16241b5ac27502551df70ec59281a04cef5c91492
SHA25623bc66f1fedb8acf4e318dee0fde6eccede3c3bdf834f4e3b36d3da4041d7c81
SHA5128ad14a0e02d6601926e8c46cc9d102244a0e306ec90da5dc7b9d40bc1a30fc28f93afe3f1b57801ecd8e48ee7e5619dff89f8633990ed056294811d9186e513d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b