Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
c8e66697ca7e9ae1a5f5ec8916c1b3ee_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c8e66697ca7e9ae1a5f5ec8916c1b3ee_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c8e66697ca7e9ae1a5f5ec8916c1b3ee_JaffaCakes118.html
-
Size
53KB
-
MD5
c8e66697ca7e9ae1a5f5ec8916c1b3ee
-
SHA1
c6d7d549cab8eacdef30629625a093ba6d16f4c1
-
SHA256
58e063125886dd71a5d28a2d2819da6bf61659a1494f971e07648de56d2a9aee
-
SHA512
a6cc44a5ca4fad883b1fe513b2dfa279a2cff63841d7319519dcd6e689486ffe11c72cd2d0b00b20ded48a8731eb2e992330bdce557ff4ee9cba192cd45e2758
-
SSDEEP
1536:CkgUiIakTqGivi+PyUorunlY+63Nj+q5Vy0R0w2AzTICbb9ob/t9M/dNwIUTDmD5:CkgUiIakTqGivi+PyUorunlY+63Nj+qt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80c730b816fada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431099673" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DEF454E1-6609-11EF-ACC7-DA2B18D38280} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000006656f8ec98c673a046fe2e0ca9e05b4552fb513ddb2e7c96c1cb0807e5154484000000000e8000000002000020000000c47775b2cb159de0c3046380971902feb0153c521bcaef9dee7d77dd5d184bfb200000002b414a964f1081248c87067213f020549b449e4613d0630c3ff6f8c2d14d40c440000000cf0316cc7af4667ee35622e508af5d7efe688426c670092a6530fe6a2cd549aa2eae0cfc06ffe44bfc4feffd5e5384b6c1aeb23012b3eb5d62ea611b98028732 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1512 iexplore.exe 1512 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2052 1512 iexplore.exe 30 PID 1512 wrote to memory of 2052 1512 iexplore.exe 30 PID 1512 wrote to memory of 2052 1512 iexplore.exe 30 PID 1512 wrote to memory of 2052 1512 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c8e66697ca7e9ae1a5f5ec8916c1b3ee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5291a91d927e342e5f70a8cd7c0bc5847
SHA117c02bfcc0b97d042435f72b9284cbe016b71218
SHA256b8921ce0212bcd6e8752b4be740ba85b6dc3caa8ba9e411adff5617db37500df
SHA512712c334984c1b96d02af59ce3a8d7df9635dca3f34e613d21171893368b41f105f04b5f1bf30dfff925a48b765513697891d1c0d9cf0d6a4a8e58232cc6048eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dffcc7fc4ba6bf608c362a9741d61e64
SHA19195def0cddeeca6869a3ff88417b26ed0c3bf50
SHA256c8beb64b035c029a44bea0d0888ffe19f78f23445c76028ccf1510d8cd546a43
SHA5126ccfb5f986e9115f00fbadbc24429d4e264ba748a623565e97afc341bb0fd8659fa598fa9a1d0345a5af8a750db1b23ce3e6cb9541f508b6383af2a113ce446c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551e7cc85c2f242a15f573b781039194d
SHA1c35f1ddacb5a8f4ec16cf5906de10c3d8071833a
SHA25685ce40600e7e60b845613b6b6ce601c0a4ea1d75e64a3da1eb437ba7f9b0f685
SHA512aea77cc508dfafc54852d31eb12afda022f8dfa049df88c1878d193688b7bdd6606f057a576f322800facf198ed3bd18d022d045cd9dfbf884252c245fb734fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2623f5deb210d8371a1eddddbc2a391
SHA1295e16a2126fb2b2db29ee51883b3d5f68fe5549
SHA256752fe53b28a2b2e18be54d5cc6c598b78177ed0dcda0b20233cb77a362750255
SHA512d0e2178d13bc3f61848bae27477054f2d7f7955064f2c76ca582fb12c58b645105153061c2cbd1ebbb74ab4270c3c0411a736ff604c4bc7a03e17bb65432acb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51781c5d347a371e0316ad2d06526e131
SHA1d0686b4b245791443186979a30457bc2254e90fb
SHA256f65333fc51e5ef6b3063c013035b50fd1869fe97b8caf94e203f4fc516a5067d
SHA5129f541ffa8e439051cd7b9a3f60d24a3de8d53554f3b9331ee1184a0a7d4eb25b1d327889609f244a2d083600746c5f8ea23c16753fae01a2ab6e348aa89471e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c67d835aeba3c2ffbbcf7dc430604ae
SHA18434d1383f52589fdaf0bd9907ddea04470b790a
SHA256193bf1f210ed1f00365019b0d37e5f2c6920e197edf7e4c72626769bcada1dda
SHA512ffc02c9538ac61b24f95b51218e7dfe985967d80ae77e37059efb27a07f6605f02428e0983a12dbab15d51921f4398884c717babd0250ac3afae2afd14c59458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564037e46c26ef1649263263d84e1f444
SHA15a872b7af79bc5ee967223e6dfb9d10f15e7edbe
SHA25683736dae5bfef2529e10f59ff1e17e5393616c235fcbecabb095e3a3a31fc62b
SHA51266c935afdd3fc61f142b5fd01ac3d4c99ca2ad401a1db776e96df00d00a4c2e5508258b6ca96fd1d11f98d126fb3afbf5ac794ae34fe52dea1bb36f20d8142da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5179d0e3335d5b052991c8d4be9858f50
SHA1b6e5914f6704c6b3c07580a149e5c03e40b9b66b
SHA25655a24d6f03d55982046c377d280521f701cafa5e233a0eded98efa448498b671
SHA512ba46be20a487a55daf2f806c528eff9374027848e15f9dd77eccb3de40fadb642fda0c2d00b58c1e3e720ad460438283003936ef58dbfe145c56f9db8b65ad1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5921198e51cbd3889bef176916c5dc47c
SHA1847ee50586daa6f83e44dc9de1971ecaf5ae1433
SHA2564152fd9a0ae251b7489374f5baa558d34fee00f5b06944bd7dce63578e300a58
SHA51273808d2d49a38c9d50d292973989586c8a8ff5f420e75600673415c532ca361e51209e87c346d23e2f65a5ad96fd71b83473f4313fba0d5073f967ede5f7499e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WNZH54VQ\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b