Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
7547a53e64957f5a0a121bb4f7d95c7f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7547a53e64957f5a0a121bb4f7d95c7f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7547a53e64957f5a0a121bb4f7d95c7f_JaffaCakes118.html
-
Size
2KB
-
MD5
7547a53e64957f5a0a121bb4f7d95c7f
-
SHA1
677e603bb2b191e16825461bbdd57170be8a71be
-
SHA256
24e1a3590ccdf592441807dad8b8986a823debc32ca6c658d99fe0909259b0cf
-
SHA512
fbe65f8e84d7516ae768955c812aee3a950badf557c7368c73eddc3c59852b0d770258d7080d4e6b6e24dd0b1cf08d4925e47bb1ca6902eb20b79da59c89ba66
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000004fe56b95799c8f7ffa9c672128df0f3ea8b535f8f31f4e3916400f6f84fe501000000000e800000000200002000000056a5a5bf2cf115641018f82c9fb8c8ac1005b776166ac137e32f4c050bae1a3520000000b28b408dbafcd5647a933b4739f46594d3682d2bf3cd67c889977fb12579e1e74000000009d6a96dc6af71c36a527bd3ad70a2858a9df342ae9015170b62dbe6b2388e353e1687d151a9ffdf0770a2d82d0abcba575f61d16cee6a63f69f511259480096 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428197152" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E9A19D11-4BA3-11EF-B2FE-72D30ED4C808} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0b5ffc1b0dfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2104 3000 iexplore.exe 30 PID 3000 wrote to memory of 2104 3000 iexplore.exe 30 PID 3000 wrote to memory of 2104 3000 iexplore.exe 30 PID 3000 wrote to memory of 2104 3000 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7547a53e64957f5a0a121bb4f7d95c7f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52d75320f0cb023780ae8e23a9f4177c2
SHA193f800a909fb9fe07c57a793b15cb7b5f17635c5
SHA256b07caa73c96228029a346b6956e6561842178a4a04e9dd8399323c1f87a04b6f
SHA512d21eca2511053f2b6c8e19fb6d333712a52b488d856a1f29232df03df1f9813c2da7be3d981c909eea9e16ac5bce88a13de0d735a8d5ede932de209b3d7d6640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5206d411faf315cde61b3c453731d3c34
SHA1b2e6239bb15b03c473e359648676c0cc8adea009
SHA256797e1332e409f53f2f07d784bfc98aef05dadfe6c76f1e2756d677cf59335d10
SHA512efadf8c230e9bb61341991d44f8dafe016bd13cc292c7044f6156f4a48c73a050881a7404c27f4f3c6c05c21b367ef50c759a2617807a8d7826f8a6791487af0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a085a93ab820ed58526a1ece309525f9
SHA1095c4c61ac685f55824747771395a320ea6d66c1
SHA256616bab90872413c356dc9b9710d18fb266638cb601d91874d5c26cb06c1a4cdd
SHA51222ec748da43df0d55c6ed1fa457e5a9fecdd34e51557070ceebae067095f5a6f726f87d1e94922fd9b8aca2d9b9fb4347a26aacfacbe4830e2d7be0ad8993cd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5034e5019a898299712473d471fe9b907
SHA17e4601d03f09c1ff635f7f62d144804a5b2b3d72
SHA2565aa0b344baabc41f3ede9f08ad5d42c519ea66ba8a86cebc94a6fbb34cdb00ab
SHA51212d2ee0a577dae7b01e848c88ec77697449aa1a9f4c64e33769d0a389aca0a12f9ae3221c310decc139d1d30702eea4a24d91db02f2fce6a8785861509e93488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54c3172b5ed38a274cac55190627458c9
SHA119233af1877bf47603c30fc2584a196a50212dc7
SHA256ff2f0f8f5e6907a321acecb07d7a9616a2c5ea0018218f12d82fdddcef17a003
SHA51298911cd0ff8f799cb24ffaafb6191c7c829e132a019bfb658b28f2aaac413e2774471bb553a08bf02f3d565a4519803ffeab3b2e0667e641f9fb203a4e42dc63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5df41e316dc77f1382f420b65602f38ae
SHA1044303e98d58b12749fa45d6148da20b8d4b4e42
SHA256d2c071e94f7c891447fe84ea62845c717981f709646aeeb2a9611db7d39042f8
SHA512debe7bdb0ad047db7375581649f6c137bdb6cd2e0cbc742982afa5987214b1e3787d8147ebafd8593b8dfc5d5cc8a1cce933468b1dab70cac1569d9ea2e72773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c42463f85a251aace480d11cd5f43efe
SHA1af30e59d53345b90f7602a0ed90f4ffdf70ee525
SHA256443688f9112ff7e15fa84fc8e0f7a3cc2ccfff4772a4851e4100d6840f43ba2d
SHA512362843f290da207336ab77892c52c7a0869900cbefde519bc6ccf8c6faf5b8336684894a6b4682c3dddf3a80924601016156e843a8c65abb311b915da7e03358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5eb5a40400ae6bf31c1bf1c3e163d2cc8
SHA1034a7f63ed3838d79319a8e2263d23dfa3b95493
SHA25611e9b94502827dc183efd01b1b5f47c2f99eb0c8b2d895f31e53b5096ceac9be
SHA51206a3b92d5f8c158c22a307bff82ec84f75ae03bd0e894da33b2fb1e0beee7f321df265319d796974b5c4a27c1ef3e1841a4360d4ba3901ab878a070fbf0c5e6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fb8c2244c9c4b0a956f06608e3778207
SHA1200fe89600ada7939a8d348f26acdba5d2ecf8df
SHA256f736a4309f8fb0c11b88c5695822639f4b44d090d4002d62defa44e416309613
SHA51274b98cf8b422c7c637e2f40f8c120a0aa009daa7e8590c59d730325854f3a2bb10c84f0822dbe76917da6d6a1170c19b600f04fdeb0b5a6689aefe3b4cba2550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56b3922fd9d00d7b6d2250af64993e6f0
SHA104546b3f21c42311e8bb8569c5ac361d2ec727f4
SHA25693b95a90b9e801e017224396a323db943a690dbf6fdb58ce2af0bbf74871611d
SHA5123ef458c992828910e4a8c9f352df17093c72dc2118ec4aea46a74ba83fb18143b3fec4c9c34575f5d0088912680476d5a738f0a27e24675d8bbe70bff4fa01c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD573bf18804e506275b6ef003b6162eb94
SHA10cc27f07097532260587240233164c6cb2c60429
SHA25654e03f8ab34d0bb40606f83b8dfc3ed8695881fd375edd44fea97b9b5d7cfd3a
SHA512c70c143f94f4b3f8db0ebc01716c8759b4d7b1c969ecd593ab0412febe6ad9bf9e9f23f3c326e6fae35adf5150bf6d8c4eb69f5bf11141906f1f7b10a33f4495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD543901237690d07fbe86305e793ccde0d
SHA1055416a1f68524bbb38815d8a5a4e76b6fa8ae47
SHA256cfc63fff57a0d7f71dd1cc96cd8920ae56752b4bef27ac7647bd719c5e8b2846
SHA51264a245a2895c47d19dfa8e11122f67dcc89278561d5c49e37614084f058377207eb0ad678b834e5e94e8f8b1a4a206b20cb4b154a7191ffe48b0a6645a876923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5031fc13b4aeaebb1749a5af8d986108f
SHA15de02b3aa4bef2dc05a5182b8ddf0b4aa69025ea
SHA256a56c73be43b443d7ffed948351bd169959727cff3730a708542dfbcb3441be09
SHA512fe41a374d85088ff0a5315f6286bd7c0a1179f2ba4932023fd73b322d73e5a9f70c73442110819c2f4b7e65f6b5799c11b0b4b347d9fe372e92775259dbfa313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD545129e8144cab638add815953fa7f59b
SHA1daa5b1eed4cbca018c6b1f2e41f32e4e02125a37
SHA2561428259578e386fb18b1cb95fa34348f77606e7d7cf3513bbabd2fd031c53b06
SHA51269f068f162e503ca9012b435cb8c7372cfb7a72c48dccee52f2cd9a39aca1a976cd3cd7c3863c29412f0b6c9a4afbed8a46600e423b10639889f8382a5d93636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD538f1f665ae4e1e01d6bc197f0d44965a
SHA17dd2abb6a9e965ba1ae0347fb8cd2f0e24f3876d
SHA256bbe85c1ca1054f9bc71c302ded460f2c51da6129b64c0f8214bedb0b5c8dc11a
SHA512c436e94c57b828b3ade9d35790eb5ffbbd25dd7d6c508735b663d8424cda4ffa6321d99fd55a886702e848978972d0a89ca9a4c1266365712fc1ec61de1ef970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a8e41d4fbc6bc4c92236fa1b741d7336
SHA11928c82f2dacd7401b72d0eb933653c416c33ca5
SHA2561868beb35c231a5c3baeca93e3f3bd2b35750cf986daf264744b6eb18c76e402
SHA51213dacf2ce17fb55d507523eb823f1d6f3dd2b63d8bc5fc505fae73bea6bcb23c6a742b25b525e21679b315cdb2ffdd9ee4eaaf3409a85c42f335618b4a85fe01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d2ddceedcc1a009134c42cb8d8e0fa9d
SHA1924c0de90edc1d41844cbcfc2cd10a4c80a50961
SHA25616bdaf252f5fa0c5268c65463393d562960e4f4930ee6088f8f79ecb9a798cdb
SHA512381e430f9010707386065b0f7dd5d0c656860ae33dafc49267e230a7a59476a48ca283bb1fe29ac76a5b29c951177202d841501d1e5db6062231dcc9dd96d7db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5374a6dc35f35492a688eba5b5b8967f4
SHA11b94a31a3b4c9baef4d1db3fdf3d4c81bbc2b1e8
SHA25632021346c099aab0910a97a7d44088e869b9e5d89a887711ce3c176af3d129f4
SHA512de77d42ffc6227842f5afbcd31fd78bd9394265bb3dc97e853fd79499a00f6f85a8281a6ddd280929b964dfdc5aadb2edd448afd4f7a3668299c3d82e7ac4c01
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b