Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 02:05
Static task
static1
Behavioral task
behavioral1
Sample
88931cbc1b222cab14aed52a19363bb3_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
88931cbc1b222cab14aed52a19363bb3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
88931cbc1b222cab14aed52a19363bb3_JaffaCakes118.html
-
Size
8KB
-
MD5
88931cbc1b222cab14aed52a19363bb3
-
SHA1
b2704108c86816b9ec341ab94c25bd177ed7937d
-
SHA256
58eec816821ab404edfb35ba9298028f9cd5c694bd6e491a27d6dad1977b9db0
-
SHA512
e0b362c91425d5022070065fe979c88ef4a25699dcbd73060c5dad10e207905aba234f1891c05621f0ae38ee1cea1789ec7c9f51d06780f6371707c97b59f106
-
SSDEEP
192:F8rwMUfdj63p99kO0I/nU5gt6eZ49IX6/yts:FHRdjy/9j0Wt6eZ4Xyts
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000c0060f0b1f4f7ed073c0227f00da553827c25853f8e4dac97efd631a94fa9d4b000000000e8000000002000020000000b7822c049183a1d2517262974f21e8dc41a7e5a15baef53eba0bd06c17864455200000004fffd612a0949d89219c8986ee8544f8adb9d06936c73725bc1629638cfab9244000000010a3a46e472bcdbbfbe2061c961871178ba10db3a9a2caf5c8bb5ba2815dabe786d214cc145c49f593c78e4258802d993ff680f9a13561f6dce58de3e4b95a0e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e097a0f092ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429503790" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2B246B81-5786-11EF-BC1B-C6FE053A976A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2016 2516 iexplore.exe 30 PID 2516 wrote to memory of 2016 2516 iexplore.exe 30 PID 2516 wrote to memory of 2016 2516 iexplore.exe 30 PID 2516 wrote to memory of 2016 2516 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\88931cbc1b222cab14aed52a19363bb3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5081dc9cabac559373a4f653a7b89afc8
SHA130391cb7c8ec97d4d86e153587e801e6362e756a
SHA256d6d4d78a03baccda82be52c46e81aa30474d9402bd2b4be5c5e53c0afab71584
SHA5120ba00bfc9627e56479c3eca1a81eaa46040c41b5620265546e2c0f35238ca2316b922e7856889da8c69620d55bee88fcf03820f6afd11881dfff109191ea1d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9c5455a1785ae58f911ae31d6f3efca
SHA14b073efbbaa8539d6b023ace1905058b9da9e122
SHA256826b31eb0b6ea472e5fd8dbdce5cdb5a3992b475175fcd5937a3492f1a67114c
SHA5126e32c4337efaf4deb2dd67b8b59ed49628688e16f21df4525f26c763bc6e0751987f9a4057efd3f50dbb17b0130e880e21bc9ba5a513326461b59a526a1a2cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cf3f68187c81748584a93c86404fdf5
SHA1de36a853c515c59d2862b06ad04e1405625a18de
SHA256c4819c8c22a42dab9c167e487f0951adea4074fd9402f6911d9632b3a16e88dc
SHA512f3daffb4b15f456d3530b232aa269ee39081515159acd704c861c098def9afc0b9501146ece20f3e3638575bbbb9498be598d810ae86dcb3042628d315c8a93c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a201241542c5249bd96e5dca757fea5
SHA1d9e5e5e21b656903b22c7aa8634fac92fd0bef6f
SHA256b403faa5121661edfce4e6e21d4db1862ea7afeeead9223d3032f91166cd78e0
SHA5129f148b099245d81ccfcc57645f91c38be9fc06409277f5f645a7cf5c10d8f8404a94cc27395046125677f58798664e9d4a6ffcf3403ac4b1a6708326936a484f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581a939d9e5f46f76ae621b2ff93d755c
SHA1bc210c83a56ec7f5550799675dcd2f6434bd669b
SHA256b400557173128bdab280dfaad68df8b384c7c73bf2e24e98c6c439d955551507
SHA512948d44c5ae1182bf859ccf45aae84ca7b18c44111d0a761ea2fe6a1ac2a3aac467f2014099f1b9a1fbe0dd0ad206811a3c24787f0e77e543ae9b945f6b07aa7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc10205808e14257a5d73d9ab6924368
SHA1cf5449e726e27536f6976e9a606c31e31a0a9f63
SHA256c26f310d5e04558a5778d561dbfc9ab2c4bfc40b5461fc1d751548edbc49be1c
SHA512b67754a3e0334b3ca21e06674cffc388bbda0696301252fea14a0ffc424bb68d95f09fae2acc544e409c34191d1c8c746409d693ad1f5547566e1e2a7a2e2d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557415dfd8781bda440adf4d16d8ed2b0
SHA1762deb1cb76c98d8dd099cd034e1afd246cbd393
SHA25665d273de741d5880152277f6f7aaef7b0047e8ea7c7da476316644fa41b7f2d6
SHA512a8457a63e26d7d7c9120b1a08ba97910caf2995b0158d8ac7efeb11f560772a516e6f65e5ef3284ffdc61753844f01cc225cfa77bf83ab9b4cc5b59a41ede646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae1b11c27fa10d864320f371f4d35823
SHA16dd5135a1843b826cc7aca114ca417b8f980bc31
SHA2569eb995db13588382395e65176765a0b56e374d84a09cc2415252fac8ea77cbad
SHA5129a6b23d368d4d09653f00c2bc1ce317aac62875dd3626d2d1746f5c0c5b7905ef2e45c64bcaeb6fc490e4e16c17d2c760aa365e0980234cc3f37fd995ac27426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c6dfae691c5c35a30730f2d596e67eb
SHA13ce603f5bd3d4e062b6eef91c827970042054154
SHA256219a606ced09bc540ea54d39a6e132b7dced19f03eb4f4bd37070f9ae2862308
SHA5124ea93617c449d4c18d7e08a36b087484ddf9b9305d194e7b255064289e8f839925d1d940ed925c8af60bafb5ae373504bc4c8554340f390b6613637305c7ecf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbe2c92a60f243048494104f2bc523d1
SHA19d5720931947a4b46b216c92f4cb64dcef5f6d07
SHA25642eac6b8af5219d126b48a173dd2d2680df6191d2f50b0e7177fe689342126b6
SHA512d7e2c02ecc6d41c0ed3a29cfd631df85ddb8ce83a927fc7ef8ef821a4177535b55d8b0926f594c378dbe02e4ca35331af5bbd3d362e71369a0b11dc47d9cb8be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeda22e98c82bfa2b76a36eac2c81092
SHA14e963265be598da9d9017010f20a1274ebd4fce0
SHA256a2244efcdaa0f966ec19f5415b2b78abfe63ced987bf8978f2bf965a832e2ab9
SHA5128077371b1f19249d4e9ddbd19ecbb5f412f40e6393332fa6c570e64e068781ac8b5d77f4da2adfc8b43c3448bd90fb0459d8c070c37dfcbf7b792b9b87caef51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565fb485ffebca3e882ade4909e3dbcf0
SHA1f77a53b3f518cba894585ed32a43ea48d99b9c46
SHA2569e44fedc9f749d8202ffc5c57b256750310f8d5c5f23f7ad91c007eec5d78b88
SHA512be90fde3af4af6927a2bdda54f18f983fdacd9a5ede3f0514de187676e8abdcf57b532b7b6e053fdba71c29c1015cff5b0364b50a278b3c6e0482802d258ca6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5758cb073bbb8c083c34159655d58216c
SHA13c134d39591c17a98f12b6436243e5ee029fb2e7
SHA256a672b78586951ebeb409202638a31d2d46d143de6910ab9d6712d03255f6fafd
SHA512537bb4f4f784db03dc7ca41d9dcbbda552727dc9f67566631b45a98208cda9ad1393b4a2bb5b801aea6bce9cee8b53437f477d074d2d784e1761be83d59ba653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566721aed90123aedadda0119472a9e1e
SHA14aae607e9e3992527939f6fbade99b310c0aa7cd
SHA2568dcd3a0729c40c20e9c175dbc14f574d996d857f15e4078d8aa9ea5cf70e82db
SHA512e53f7fcebd9575c78d386575704ae68b5d7122ff03e13f8ae42ed3447e1d11702bb3401a03e8e56068058b95061f7149033c613e33a1bbe798746cca38beb798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b8deac7aa2751a55a523b44fe3e8776
SHA19566b8b776d32b1d4b5a4bf8e4fece6190cab2bf
SHA25666e20dd6f5f08b131ecd868c4c5dcaf35bda42f465fc030cdfd9e6ba9073bc80
SHA512fd379d55c455ab8ecb5d75f97d4de7d14184119075fb3e91d8665a09c5707ee1172d10134a5745c2fe41ee302abe6d9b43143a3d6a981796091897b6103ef944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc2139cc7172afe56f864d2c557087a2
SHA124a3f6cbfded2a20e0f3922803f20f807c0656ae
SHA2566fe6f5d37291ad0a638252bdbd70d26ac60801d5402d16e988b00f9b2d582197
SHA5127419527f089822620c997d918a9c151192d87abdf64500464e84085ba0850e5182deb1a5e42ede2d2a8ebdb870a285c58b358ce4b3dc92ec36cf1cddae8063f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57936bc4e25aa75fc0332a72fcce6ceaa
SHA137c41225652b5e541b5175c823aea5342472fd27
SHA2565db4b16ea225928a334d8aec2c258c513356eb0b5a4d0161bbbb4006abb3bc8b
SHA51244dde1e82c458a69a12f24c158ce272e73411729c89b8f42210ee69b611de5b99669c473dee03068ff1c9b60f5135c696a8764fad0620f17e237384ae9f54267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2237f4baa7db4b2f9395152aaf56a2b
SHA180413614c41d42c126143dc4a2327571aef42f1d
SHA25682004050edb7b7cbb04dff6839005d44a83eab65eb28d7bd99782053902d98a8
SHA5120c34d7f09a4176d7b5ad9cd4a91b3993dc0cac277ab7c302ff06d6e07bdc15d06441aa457e370da253fa5a3aff971b7be32de5febf9a4bc9a8817dde8140da8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575dc515a5460d0882137151e7833a548
SHA1a0fcb18baa76b270a0668ceeefcc06ee26fc0b1a
SHA2566c1cf33591e3c59c6ecf76985a069c2ed555f11bd3013fcb7e3e27a5f171e713
SHA5127f3ee051855ef0861a4e2e2dd4d0ea2e36d15333b59e22e51888d2a170ef3a89a83124016e2f2fef9dccf29ce21e89a23489a9b3a8b734af2248e2bc873b7833
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b