Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 21:40
Static task
static1
Behavioral task
behavioral1
Sample
8c130f57e16603c3dca20335502100bb_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8c130f57e16603c3dca20335502100bb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8c130f57e16603c3dca20335502100bb_JaffaCakes118.html
-
Size
6KB
-
MD5
8c130f57e16603c3dca20335502100bb
-
SHA1
e410b89e90725e0c6f9f7cc590813672225e00ef
-
SHA256
be6ec29d4c9faf88fa184b8fc3791ebb3b9e7e80d0cf3f4db6165e2fb7c07cd9
-
SHA512
7d922238f4599c79c618ba940963ee79e5671c256df913f64497b59c3ccceb83f2bd46cb9270f4a4bcab9604175636821c695ae9b29ad0e83faf13fa857be472
-
SSDEEP
96:uzVs+ux7dMfLLY1k9o84d12ef7CSTUOZcEZ7ru7f:csz7dMfAYS/xb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000c2da6ec0d4a79d45d914622a5fa716f7eab09710e628444267ccdc80dc45ef7e000000000e8000000002000020000000515a2b9a58166019ebcfc791eaaa5fc050ffffcf1a87990f0a3343537419e9d8200000007ee65fadf98aa3782342e69348bfe1136a33f99670498bf8065215a8192635cd400000006acb04b1f0ac14f6c754ca2f3e09bb9a636a809aa56549132a9cfa50ce4fe81a17ffdea28b20db0b81e78fcd3918c37aaa6562c1537be4fa33fea979b75e8552 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429574269" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6066761837ecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{434AE051-582A-11EF-A432-EE88FE214989} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1752 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1752 iexplore.exe 1752 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1752 wrote to memory of 3048 1752 iexplore.exe 29 PID 1752 wrote to memory of 3048 1752 iexplore.exe 29 PID 1752 wrote to memory of 3048 1752 iexplore.exe 29 PID 1752 wrote to memory of 3048 1752 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8c130f57e16603c3dca20335502100bb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6e809a3befbc69930035a7ed1aca422
SHA14b6b1e66f9204196c798db667cc8deb27db66710
SHA256d5ec7f45e067b0dc3b110943a0b825591fd4bad9ed9aa0982a64db0892dd59b8
SHA512f4b8ed40b1695241dd2f14507bd95617e8c20dc551357dd9cd11c3969c83be152b1a47cf7475e233b1afb75e7d682ef834a8a249ba9551ffc5534adfe006e2e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba0ccadac31c675e37a8b101666c2242
SHA19346ab76a2781e7f149cc5d4f132de1620977a8a
SHA2563f1e74c9e7e0e79728fed49fd1ca962ed676aa0e3d5106c5a4570c581ae7de12
SHA512cb147ba9a46d7bd11b045cebaf27595f574a97fd125abb802332775265f02f80b69bb30278177f965b3803153073dc48eea004dcc46987a6850d3fdf5b3b2b24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f0eb247c6ce6f1711ef70d04849465a
SHA158fdbdfad4f6f767da1fd5b1711069d767ab2d27
SHA256ce030533e8fc319a27afa55ed2e2d964007266657d861e5142b4c504bf6223e0
SHA5123480b6a4c6a96b1fa3c399ab502d9416c322942cfea58481a69ad4eafa351756f4ba6c093cf3fe54d85db48fb6648782be240f07060f6411a42a5f8dd5db0d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e88045d97280484eb4b25d515357c3ec
SHA14694d1dad61ea4b7c529645b44a17a7de4de5213
SHA25686382d60b303d8d8312ee87f049f167ba53f4d819f13c01eae532b090e309140
SHA512f3812c6537eeb21fdf34b12c77641710ec78df22dd9a30fa651024629a7fdd3b46f4cab47f970509a3096423bb2f36abc33355588fb8e42434f34f1cd2d22ac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e1f6372fa1f8f26162bf05a11fd3477
SHA1531ca5446c8a675dc95e8ed163e103ed3731775c
SHA25656eefcd8fc03018ee93edee0f0cc2ed0cef6ad61b76302c2d1cd79ce0cd55f5f
SHA5126be32a8cf0ed4c7c8221378be72d3e82fa42614f81703b1697ded727d35730dd1fb77ad3e6581b0149b4bc5c5d5051c3a04f5b33d82cb92ac08fe47aa05b47cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564050bb285022cbf21c9ea5f04c1be04
SHA1f58ff0c0aa7f8c496e146e7e753cd0cc117f2898
SHA2567e31d922c1f17bbfbfc72825023c176cb2bf798d62168c42a0086f03cfeb2aef
SHA51292879f2e94e665f73b2f73ab97c413c7ec8241fb16789f5b6fabe2c29746728d78c90cbfa756cb64c4924ba96d1b52e83c40baf8d8cbbed36994403e85002557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c4745ff20ec742888d9971a6aed2c1
SHA12ee5cf10405d1c11d695e6c902148a3467813712
SHA256a5a662dd2d4434564bdc2fdc5905bdd8548ff540b314ea185c901b1ab51c058c
SHA512956ac42ff1764f08ee5d09004cc7901645b45e2b197f5fe93c1b93e7ceb5ace3dab963782b6ded70ed0edaa4d68bce22be482c03309cc9295fd187bdf80b11b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577bb2949d1c16a2da2f880c7477dfc40
SHA19c4be89347c344c491816218ea698bd241032eda
SHA256bda5bfb0c4801ac0a114f55bd0d8eb6b9e5a68f8407ee92d9b1d5faa1644ee31
SHA512387f1a544740307dc4b5e72357d19da8a2655a638a88aae84b3f789f844445ba07e8c821052ec59270bf508f80bb77d07324c1ec591ffb5c2931a9fa0be76a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccf68e459a75f6ae04772ed6862a8c1c
SHA1bdc0e6e466a4e6894880aa014c164ac77853c9ed
SHA2561939b1c968cbb6718d566ab643b9efc19203a1bc9aee18ea68df3919a1205ea8
SHA512155a1513885719a718773dbed7d80dac64020248ea060623eebc8e41c068e5690ad8bdae39870c759a78d042bd0dc00e4e9a7f3ff92408ff7ae22e40c53ae894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560e5819bfa22c0837ffb7ddb07863039
SHA1a747c4a1935a7162b6d4289e28daad3f9a7e079f
SHA2562cc6712b557685c1d5adf1328f5b1bd18cf3aefaa3880a359d79d6dce2daef50
SHA512fa95d458b459a69278572309de50d170e4a9aa613830c2e78ae0b9f5034b48e9a47f7bfff70d45fe1fbc290ff849f3c08ae6c5b1f0cdcaea991b113a64afef86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581aaf156927b0efc98fad83fb59bc40f
SHA1223bc0f60495c0223273ad585da05694b857261f
SHA256b29954339615e8d7596415e93e83c29888b3f7e9597b869fe890d5d996990ce0
SHA512b50a9f9319a132389b2525d5c99f748d4dc528e4968031174cb39a4df58a0900cbbeb2bf9f7516d495b3109a6e2f9b20f0e829ac5191d66ab87cdafee4855699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573d708ac2b0b6443249b823e6e55d40e
SHA1be83d13f0f231314d7cfaa9cef58307476b567c8
SHA25697934c1188a3e30d1e27b61fdd031bf988193ae861809f69bb4c2ddb5c2ab6a5
SHA5127ac6364b2d4901dad0feb693bdecb1424eb381047fa586ddd2445cc51979344bc2b79b5d917e2ab2cb6b058586a99cec368aa6723f988546f43591e09bf67c04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571eaf770696a2909b112b9101373ce32
SHA14e716cad48ff4ab8283bb4aab70e67837b1f490a
SHA2566f41865f03f67142e7af5f8d34fa790cab8b4ce2bef139281f8e5c0bd8e2c131
SHA512f0df8d201cc8b71afe4e126f060c476f9340244b617bf730b847e096ece2db4134280b34118251366637f9ee49061adea5bbb58df763db03182f44916ad22cf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb9498b91d546fa9041bdfce6d64f37e
SHA1042e26d9783768846ee3f610d7ac47503fcd8ec5
SHA256e950880d5483c630092dabf0c26f123d67121623f4a71634a2b6699c8cd12a78
SHA512925d701dd6b5e7484451d1312768fafc2cb74aced2af398f78ddf2a0f9fba7cbedf337c0a41cd0db19a3c0224ae58f67bfe168cc874f849a452c7beb22c5b1da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510e8f7d14f0c1128a9a022af4e81b70f
SHA1022929ac1c41bd07835400066be95813566c5002
SHA256b378b4cd4f7c1a221c86c89e7ce9459279d2c88b57ff2045b05c7e2c9c77a1c5
SHA512d0ea25bf62446551c44dfa69c85e86fcf2fc40a2d231228acb5eb80a0688a9e051cf16350f06d7a4b0d4a25814a1d923324758630d436e4a2a5ae88516ec6768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f16235fb89f93e05449236417af9df56
SHA15ea8c23a2bc92d6503013b7d3e5cdc26cc826a6b
SHA2565101d1719f00782c19ac1a4bb4eaea6c3db5a327b32c77920621709d2aa64713
SHA5124c73ffc5bc8e7e864aa6a5e4ff6e4638a195c4fa7abd472b92c756595f30f08d800cce32a07c3c88e9b2ea3d9fee9918ab2380e4b715b9ec166e39b91a67cc51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57282bd14dcd218bd18c3dce2befad905
SHA1ed910344a89871b5618714207f2265e16eb55db4
SHA256eb11904d71f1e8ea7616e43dfdacf2aeb7dea6795ce00adaded304918a732808
SHA5128bc163a500bc7102fc7aafa1af878096cc709c83728c9443b564f5273bf73d2f02917f5311f945561d4a2ec504df76ae62a02324abaad23c34a3abc481723167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ac3cf618b1956732326fd40229004e1
SHA1b7ff63ecbc86262bfd240a14a8442a45afdb663b
SHA256c3194f3dfdea70872969e84f733fb8628cac38b3d6ae69cad8869bfde93e1265
SHA51273101440f4796759a7b9b8ec5e87b28ce391a109d2388e6a6f3672cfc1fc9a34ad79056e7c55e22edada1f825d37aa10cd639eb6709a371be95205eadcf30fec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd03dce7285e5f8b34b1108c29b48e0
SHA1c2472e18c8f004852747c87f15f699dca1238d60
SHA256f376cad80769e5cb1f177e9ff8c9ff64f5109b22edb75be19b6ec87951fe1953
SHA512b277245ddde47201074dfd6ab8d8e923b5b970c30b43d3b60e4a54270aefba32f043737c0f90939c59625702fb7246c38a5f74bef7808b0fb1a449ea3199ee0a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b