Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
c170876f1178c69a6a3ce3dd97d1ae6b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c170876f1178c69a6a3ce3dd97d1ae6b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c170876f1178c69a6a3ce3dd97d1ae6b_JaffaCakes118.html
-
Size
139KB
-
MD5
c170876f1178c69a6a3ce3dd97d1ae6b
-
SHA1
486f39167b2fea17b354e57c0b3bdf2f937346a4
-
SHA256
052d087c133c0c9fff246d708d238839a87d2f69443bf33729df008018abce78
-
SHA512
50dfdb844654d9c40819b5d6f167fdfa2b7be0e6d918f0952e4886c22924b599e3dcbc97816f614c6c766f8bca8c958ec323c41af0f1e788217e323cc100422c
-
SSDEEP
1536:S6NrkVSUl8ByLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:S63jByfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{12841BD1-631A-11EF-A24E-4E15D54E5731} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00c178ee26f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000904ef7667ed7ec02f95109d522d96adbec3c1cac5e1ba63c1e1f3c3edaf744c6000000000e8000000002000020000000d64bbf3d6a70121f4ae0b9fff4be8e32c8df7d90851d5f8da96ffb441e41806c200000006a75174c75f50c99a9b093ab84920a4dcd4d7409283a9bc03835b88ddb84d05f40000000518ad055f2079d79c07ce31cd972fcd70f8c7fa59382d10814602d0785f86a71beca952c43be1e79d5a1699037a45b92363f9ead103604d7690ace5290667bed iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430776780" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2404 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2028 iexplore.exe 2028 iexplore.exe 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2404 2028 iexplore.exe 28 PID 2028 wrote to memory of 2404 2028 iexplore.exe 28 PID 2028 wrote to memory of 2404 2028 iexplore.exe 28 PID 2028 wrote to memory of 2404 2028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c170876f1178c69a6a3ce3dd97d1ae6b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59303dd44ea5338a297a463cf4b4bdbfa
SHA12a2ff91c0a394d9adc178614d9224c29febafad6
SHA25676821dceaec3a4399d645270427e498fb82cc6850c079f0cfb73f5b506f50750
SHA51272831000ec52d9297eae5832f6d9b7d402b9a5bcb5890e95889f68d711838f698355f145896a65608c1cc7a6d6a7b44b87b157bb0bc560f000a5824eb78539c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a75ebf11d235174897bbd0856af44408
SHA182b7f674af8c5a878318fae9d8b31212fe4a17cc
SHA2569cff5795631b166e58f8381055a40aaebb415d2cae67660759351e3b3cc9d5e1
SHA5123667b7e40c3f286b8e5d471be2ad3f480e9ca9e6f0e514d3754bf613993ccfbc14e0c809015daa671194effe6fe7cfb05ff7017b515399e8444dad20da343f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c1de929d52630762c4e20b831547cbf8
SHA15e8bcf09a682cbb874815691e39575077207bacd
SHA256616da76c10c4f3817ba0eb73d657ac7c51fb24af73a40c546347dfa8d0a0c311
SHA512d538acaa0fb1622bdef447d461abfcdb94093561a1fb1d0ebf02dccc9ebeb21480d55ed8444b778293e5a1b2942294b5c9333de02034eba1019767e0a4b16700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5297db2ba44e79b7f7449c08dc10deeea
SHA1ff5b7e73752b583ebb7099872a9d391d22aef9ae
SHA2566249cd0d8033ed5c6bb52d908ebff52fd5cfdd4dbb68a9427feb04625f006085
SHA512b4cb0b6f778ee15aadd5edad877d5c2dec95c4a16e803ee13bad9fbb29ba0a4e343bfe1dedeee9124124a95ab8492d95df542d34d59978eea67432d5a209ae27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD565f0ad486fe1d32a55319afbc8efdecc
SHA17389c498551247fd16664523153ae668b97e5e3f
SHA2567cda9b3f539b15a28b9baeb85ed87f057264d58371d272edcfe2de1dd8428c07
SHA512e07df40dad85496bdbd850cc5019f197de95b69724dc83d2f82a66751ebe4f4b902ea2925b0a89be36810cd7cc1afeb020bbf9274be4a82245574b2411859e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD566c57304ff920358b936d6d30a196cb6
SHA104661c932b8c40ac7429077126a8eedf0896c9c4
SHA256e8a2030db81aa3fd9b2acbfdf716c7f33fc7574ddb8956d60c31a06bf742cf87
SHA512cd5acf5079ffb99c60ab11210fe16bf2ee0ffa073038a0d7c99e8ec2b2e70d905c7e33cfaab3ae5e3dd736ff0114d2a508dcb7238a333520b059aa420b8bbaaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c3065879b17e4e23617a4f2e6c857994
SHA1d49094fba05326d718b88abc7188265f0bd50ba4
SHA25694e138782ca67431553281c82ba0bc640eadb6027b7acc7d247acf653f449fdf
SHA51268cc3b13859d7d35b747414c2fdb9dcedab0d432a54721b6204b151dbfd2a432754592b972fee45bf8d655facb25bfd276d14549d4561dc381452e9e0478c024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56baba72e490a1d1ce4319180d65bf94b
SHA1978d1b3a14fd931786a9875c414cf0661a805cdc
SHA25669cc53fbd74b27f7c3a462aaf4d3f3eacc926181eb9dc88770df179744ea262d
SHA51284d892a3b5065ec62509905ad94cab6fb64e79adb4741f84f0bfb1f63cdfad5406c465271de80244b75407e5757824344003119f4c89f25e4b9f1859a821bc9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD598c8a24a4ea895dd13013664a1534e1e
SHA14d7fdd5bd501b8c458442abadaa20fe53cff9747
SHA2566493ddbde0b8ea4013838aeee7abeb94487d7ba5393432d809db14c8af81d0be
SHA512d307102e224050a825488fbd547eb48f034b023aee2648ab212530a957beede1553b3ee518584282ce278c1273a7595ca9947a47524e5c6401dba6103f315766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD543909adb0db8325f2752811e66b669ff
SHA14ce570a0f30fb36fd31d481fd795e9a7e32fa561
SHA256f984253023e14f326e464d500c80956f55cbd179c8645e9afae4a5e8b49d8ff1
SHA512b10cceb391f307e6dd3c7a9d2250dd973788e0247fefcb9826ba1db689fcfc430e75c40029435e6ac00e564a6fab00656a41dbd5665e178b0024424e12e1799b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5226df73858ff456e909531b5bd57ad67
SHA1113d850bcb9bef7035bd75ddadeeb0716bc03b6a
SHA2562021e7d1e8f99bf3634d188b26bfd589dbedc4fdf7f7bcd63414854ed03191b5
SHA512568f55d2021d5e975367c86ab9489478d891785f65386c18fae09b515ffcb321c90a80240e7bcdfd7e8baf3af71abf632275a99df6a25f6b8863d41dff992a02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c39fc1fd5a652e7d1648ee8267762097
SHA183867b9ce9a0fa6ced0ed07e11ff69e13775df65
SHA256b43da39549972a93b7891628647629991390a17d66c3bee9d93efd8e82a3fd54
SHA512af32300d804906609e4b40e03d6ebb2a28991b95aff87339d25d3c1b7c3d96b975492b5aa507d395ce35967256493ea6751f2ee537790a40948a54343951f89d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b