Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
889c5e19517bb4aea0174feffd606cdc_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
889c5e19517bb4aea0174feffd606cdc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
889c5e19517bb4aea0174feffd606cdc_JaffaCakes118.html
-
Size
2KB
-
MD5
889c5e19517bb4aea0174feffd606cdc
-
SHA1
aa37632ff8060b05fb37b3c8ee8d2d980facec76
-
SHA256
3e0adcfd142708e8656701941c49bdaff2a84ebbf687600aa5a2d9f434bc8664
-
SHA512
1197c65b0536588f632ad04f3e46aef38f969bf676cf57ea32d53723bebe63c44396b2981b6783a780a83b912476bed7c1e452584c4e83e4549d96ad00d6385f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429504527" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000b399c4d2b31048526d11d79af36f3139fc1f474f8c73077371550a1ea4107b65000000000e80000000020000200000003c3713caface0eca1d4890fc7a9afc91263988819de797e99f40c9445300f4ea200000000b5f26c678e19b96defc6faaabd3b7f57f9ac8eec1a2b2285214c791dc06d42040000000649626de4044163be4e6a94551a79f670ff0fd8800e37406754aef3871032b40fa0af68e145e8793a16f6dc8bc487c0b5ca1ed9c571ef8f2191669c464984b02 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E26A8D51-5787-11EF-A4C8-72E661693B4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c06544bb94ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1916 iexplore.exe 1916 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2392 1916 iexplore.exe 30 PID 1916 wrote to memory of 2392 1916 iexplore.exe 30 PID 1916 wrote to memory of 2392 1916 iexplore.exe 30 PID 1916 wrote to memory of 2392 1916 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\889c5e19517bb4aea0174feffd606cdc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5976a04ed62d9fd4714547ca5d1defc09
SHA1c56340ba9099c126380cafef6b72a3214f11de7e
SHA256c385d5da1ccd358403c31b1152a891c184e2bd691448415789884a2bc3c1ce03
SHA512ec6bd7d5df7a6bb6775d2e3aa085223baa97f0c9fad055664e71fd32f1d5ad36748d58814fdd5c95c0dc1d270148eb045d225cc9bce4507d5a80c912eaf6a82f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4647b54339df7a1975f2f4e12c1c0fb
SHA18ce00a47755b178c8a8eae63e1346e46499d0360
SHA256f3bcf6f3d6b011a72a1f53c2d07e7d2cc8fde9b0804cc3fe9cd17989fd153604
SHA512ca4a3fc8fe712522ed04cc90ba32a05fbe8aafc07880533b1232043638eb9b3256bb0a2e0b6fd5be00afbcfd5688df66096c198ed72cbf023f211cd520c2e47f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575f3c1f6dadefbf59b943b67da5e0490
SHA13de2ba5feddb6c24ac18303aa7d6f2b73b51fc50
SHA256f009f1ec162411eaa41e5b90dea4411c4540aa081ab48de7298dbdb0af4664be
SHA512e376476aae985e176dc71106aec50b76187f5ee8a3a9425d7e27ef1ffebf2a576a7d569fdbcabe72a9b561d8127082449ce24f75318bf2eb1740f7275716181c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e795abac4e6685a9794c238ff24ddba
SHA1448aa05c7d5351ff73f61c5e3d2f088ac6381097
SHA256578643e52b1f5d6c6421c39898bbd9c06a250ba87972c738b756bbb43ba91313
SHA512c3e41adc03dc280a2c1f4445cfd2fce5fc75a411cc2ef998afb282fda73a46dd591dace0bd78a91a4cb3a7fc2794a41dd25647dce80722145712f85d888d58d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d5e7309bf9335ca769e94a8c81d6af8
SHA13d5e720ad08463a698dd19353887d99080bc67cf
SHA2560ad8afdfa1ce523d9f42f5ea2ab13dd325016b80a68a2a587fa56bb05f6d0a76
SHA5123e49426c677700688c26f31567b8218d88241a8b2e4a95ad031882a7c7be1cffc35c0a35d7801384b432b3ae3166b502c1f013591b544ab995210b51b9d77a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec102c8136f1b1a1410af3e9a4859411
SHA1a5a98111e0c2e37d044e1c3939f9e500ec82ce02
SHA25661d471198cf791196784fa0e471fb568643628f6c0a30fceaa7c5531e3994a25
SHA512db6f4b3c6013535b11cdf8698f20fbde743896850ba13cbd5384a84d7f8ebdd1a5ed164e48b056dc0b740ab51dc148a7f1b4b778f960dcaf81a2a54dd9e432d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dbdd747ff5f5613faa76e640b39d8f8
SHA1765aebd40e5582c8bfc10eb60418574f80e3163d
SHA25682fac10a2487faab6b6134d1d5ff46ab3d8e01e6c0810a0ee0125391b1de1e82
SHA51286221c6f107676e1503f448849d6764df0dd96b03784d3710a339f73644669b00936ec9ea9f5e8bcc55914cb8d6004a9a1d2c68affd929604879ef737ca1b42c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8a264c88f8ce42baed42329c2c667e9
SHA1b6b21ffe0c444d4dbedf7d9c9fc492b6751ac650
SHA2564caede0ad82de7ad4e448a54e2d0a60df12d6dc0413ab6e107d228d3115f3747
SHA512f15d2e3ecd8adc1e769d3525be433199e0ee40be657957e5ff6ad50286546d2fe3bc272d3d5d23e38fd8f71ca8d6dba0f996d51a82348afdb2a7b033376ee1c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abebc80b7af9aa8ca6742445bc5a5cfa
SHA1f205802dde0cec99b5f5c8a04f86148eb489674c
SHA256aff80e20ac115a9c0eafc0f0aaecade301b4016556f2fe7e868da277a1ab3c1c
SHA512422c3f6a04c0b4913b7a65c03660e2d114b136a28b492f28e515b5c2b5c22e33edc0e729175e10b8e9126ed035f4ea3514a9f5b0867566d1b73fd5dfe243dc8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4a28f483aa676d9f0fba16088785b78
SHA1952250fd3b8572f9e4aef03537ec95d13d77e891
SHA256e697f669b29a9a151e9798e02399b432c70c115b0a2bee7f6a890ee2df4ba1a4
SHA51241b8c382cd8f15e0297efd23176ca29130670d408156fee12c15dd0ef3d0d21a126f799ff45da61c481ca9f962cf62245f9de213625bc54614bfcdacb30bd7f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee3e8dc5d78fab085ccc9afe46468c42
SHA15921e62f0ca1a82911326ab7505c733ed6c50cfe
SHA2564b5fd7aa6a6eba85090973fbb737362ab8c40adf6226400e8a5be0ba0eff3559
SHA512f8bd51dc7e3da0e368da1151ad596c362bdee87d60554fefe1ef539831d04fbddf89caad001b3984d4213b07d4b309ebac429fb2b805d49e4c8ccfa4230c6688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bb17f3383164d4e5913a31c70d27d0f
SHA15bef5a513315385fae7df517f32a7a2d74c0a1e1
SHA256f43a3b2790feb17382eb7531ee7441f9a6d4863c7474d3e9e43b9e5258c6b475
SHA512db8d297e0304ac6a7a817060565deadff8736e908fac1168977cefd596b63f424af4334534f015b5fef203ca7b57fca211545f8490ee3fe900dd3444ee231cc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556c73ae8014c0b0a8b3bdeb9cb07bc5c
SHA1492355cf77df018c19aa6594a81c8ddd4f5db50f
SHA2568aea6b45077dce80dbe152ac087b95e87135cb9247e3412b8d6317463476413e
SHA512e68b7ce0bbec888fdeeac6045753ac9a85f2aff0e856261e4c778aa23ab7cc4a5535c1415bf481ed40df5dd748b9ede4e49cf179fec9b60f79960e0c32e7ac79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4352f183c584f8e931953945854de5f
SHA155688035397accfdf03129d222582ea72951d797
SHA256d35466683e67dba5b1223c5fa40fee1cb84a77b07ee0aa9a32b61ea0b903a708
SHA512d4f0cff2f6b44349a60e7dfe2705d052e2223fd402ce318b333d59bc74d394f1d9f871eebb159b215019650de82b96b7e4b8d4aed1cd7de48f0ac0f1724194e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c39cb75f28eba980d5a79eafe276a60a
SHA1e4d0269c69c06a602a62c67c0848fdecf20a7954
SHA25674e6b7e7f0d0aebe3c1e9712a77c39a6b16c6c0aded2ae8193ee3546bbb0ebf7
SHA512dee545f68cb44a1ce11a9be9b55ff9dc13d88fad9e7a8152db880c901cb7a894bde68b52fb204e1b68b242cb2dec85125cecf7983138a207a24c4ce38beba0f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5290643ac37cfe93b929d9c485fda626c
SHA10d4720dcafbe78beb199b20299cca1da9999bddc
SHA256568c0e0abd43508abd89d7a93605e7a1c2a44535534f098ccce3ece66dba6290
SHA512e2e21c32202f056335657eecbe097d82480b0113237a9ca41f597f69fbaea5deeeb236bead9d8abeffbbfb8fdfa988c2b04fbaf929346e6a1a7ed19de5a21818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c83f3b893b540437757ae61bc6ec39f6
SHA1b6ec06f6664dd45ef52cfd1983137c865a5ba554
SHA2569039eb78e04b259b5e525f607002e4ca24832c45642d3e8a80116eb91ed40e9d
SHA5120c7885492963bd62e420d4a524e9c980111d296d8a1f55e30f0a521c75594725726543a218af519ff46f9006d7498243593396763d7d9fb28cb276b6b759179f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500b0185313ef02c685952072f0afc42e
SHA165ffb66a1033ac965cf4582b9692ff93adc6bde0
SHA2563e0f49adf9194912383a4f64798062f8f9c7a8df248b2bc72fe4b146a382061e
SHA512f0408cb372c2407d5404bbd5fce9bb69926473b76302496269eedb885e0fd00deef11aef12a1f0c72c49f4037905ed547cc90a4d8a518493e72a4ad797b4f664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0a1c5ca27e38e1a527b36f3e91ae554
SHA1c56375ab21a0056894a6fdd257d8281c8682ed05
SHA25620c7f6ffa4fe621dc0afc9e8902f772c61186d1fc1773903e1f17f95601a15c1
SHA512e7217254176546333ffdd729c0fa9ef2b5279c8ee07afea9c38fbd33f8ab01e7c94b0b1aa083e4f954300ad72b78fe63358f610ca78047a3876577ad568772e9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b