Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 05:11
Static task
static1
Behavioral task
behavioral1
Sample
891efa8195f5d642f3b50a7a5f76dc9c_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
891efa8195f5d642f3b50a7a5f76dc9c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
891efa8195f5d642f3b50a7a5f76dc9c_JaffaCakes118.html
-
Size
58KB
-
MD5
891efa8195f5d642f3b50a7a5f76dc9c
-
SHA1
8d71af74cfec86994b9aba67dd501a972b8504a4
-
SHA256
49333d32908e4c0a5ebcf60e41afb3bbb1333c4e43c9adeca09ee9a8770b645a
-
SHA512
3fbfe96bec4503b510d32f43e3d3dcd5e9ef7b2a9fa931d4d2a77ec0177318b9e39b71dff78ef4b959ba62e4d79ac08a4cc05ec6cb81105b86f36270df87879b
-
SSDEEP
1536:gQZBCCOdE0IxCviSlfdf6fTfvfwf6fhfcf9fgfRfqfYfyfifBfyf3fbfIfLfufD+:gk2u0IxcFSLnYC5k1YpyA66pKPDAjGL+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2BD044E1-57A0-11EF-914F-526E148F5AD5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000009681e7a2c36b4d6171c93938ab3d570558027a3b24e1f470f3dbea59156f752d000000000e80000000020000200000009efab2e367291756c8d154492ebf7f2f92893d3700378cefb2bcfb1a4e61f87d20000000a7fa9e093c478bee6cb5945f20979cfdabf990ea90731d1865a2cf1bdcb7aa6740000000dc356002bc02a57b8e896a913ead8266e7d1b2ebadf73969ea52fa95ea0b0b823f0fd799565d168e112f950f70b0a00984dd512270721827ba9192e50cc791cb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40212301adebda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429514964" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2696 2692 iexplore.exe 30 PID 2692 wrote to memory of 2696 2692 iexplore.exe 30 PID 2692 wrote to memory of 2696 2692 iexplore.exe 30 PID 2692 wrote to memory of 2696 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\891efa8195f5d642f3b50a7a5f76dc9c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54a6c5ff996091ec71badcd41f9fb5361
SHA19b603cd25feac7a778e0967a6c0fc31cd17a98ae
SHA256cacf3c91ef17a2bb7f2e0f0f9d8e763784b9abcfff392ac77ca36fc6dbc18396
SHA5124badd9fe59e6604f7557f07ebcd9b40e3796b872d92321d8b874e7e12a637c0b4ea0e3605911fcba22acf82f74f89c575efe88e61dd9835374de04d16319ac8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536aa863ddbea12f24d8cb67cbb4bb677
SHA196ce55aad603169d340dbb56f1dd2854c515c02d
SHA25610281ab18eef7453d2211ad8544e9062d55cf0785d5e377bfccbb1dcecc9037e
SHA512c44bd2409d779d31624e6ded3ad3262c3c96a16199249f2fc169f20be2b809029bd1caf28383d86c557dd36bb59b4a3711f8db54400e8c4ce0edfc36f8ec9570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd5a68403c3f519c81704583d992ac73
SHA1a675c699f43d27a40b77577cf3edda5677b679ca
SHA256dfbf14904cecd790e699c14456d0c0e89319d3d23d0dab80b1c3df67b7561434
SHA5125cc876f1d96b566ba2fd20ad2c7ab1054afc925683ac967726e107bfc4c90ef1e5c61436d22467d199d7fd558e0bdf65a5f0e35bcc2b555437272c32365825b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f057d5fdcf40203c052c2ae0df780529
SHA1bfe142c4499a4d64fd3a38c95aa9de003c93d0a0
SHA25622ca274f1f549ae2bcad201396d29bbc99246daf1bd8f220a493e0bb1ea796ba
SHA512b4189f2e31bf52627b436052ebf7aa7ccc3c3aa54394c8812e1eade454285ccc1e458429e16dba8591c7b984a27588fa0eb126eea73ee31c791a1f40e4825cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e30bfe893376d828bf1c61c5f6b62b1
SHA1429249f9bef14cda3ca8c780957e0317b50d9c5f
SHA256af02ea89c5465a495c937b59e7ca9077c9793f6e9cf1e3ae51f32aaa1d094d0b
SHA51271c1eef2cd4959510b53af73f56bfca803eddc3ec796cfa156a5cd40a646d27d0af909a2e727c2d8872eb67929dd374a22e418b487d2bbf416c06c6e8293f759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556ec8a05895450dd47ad8d2aeff4dadc
SHA175c245da53949003e69c72d0190d31bcc1b06bb2
SHA256f5d82e5b38261450599e4c9171a9d6642644662f703675e7a4f0bcc61fbc8d05
SHA5122418d193a300bc0a2c858b4cb7dabbff21107fd037ece54e7651610bf03c9bbdde316825cbaeec4444da7f2bad345a4a2ad01a8e90ea5145b432ef745bce510f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fd3efa1dd2a4d0dc721f6a1d4cc7f15
SHA171a1d52768b86de19bf0195e0ff25bb763bc4315
SHA2562063ebefc4427b866cf5e23fcbf16bdc84627ec658c9d7754d5832a19eba0b1d
SHA512e69cf4e5c768398e6cfc0aa9b407a7020e8a5a9e97e2453efd985d4b2a8c64fe62244ea233077d68793b7663e38163f85841e7b7aaa257a28c3bb08b9a648696
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd243442b0cdbd864fe30edf7c02ee6a
SHA1587910eb2fc81c0535fffdf039438f29fc3a2ecc
SHA256a531fc51062ce3fdaca8dfdc338a5f1fe1b049d68fb2491cfb1f875f4e680dd2
SHA512b105b2dd4c8b1b23011c77b6913edf58a17c10bb38537dc20a595ef03d06f1bdeae447096a95b249ec5d6289b6d577226520fce7ee93a3edc1a18a3ea204350e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db6fc943d815f2c1dbc0edc33e98d966
SHA1d322773823e275c565f4cedb13f627b58d1a9f22
SHA2569a85a8d2f863b0247ea89d8b23493f3524f45c7000fba1063c9dd3ee9a6a8232
SHA51270013ae30cd4e15f88d1731e49c561df863185b0fb9b27d0089f10dbebb21677f6ad86081cbba4567f38c25093b425f7d5c5819df4bb071aafdc5ddda2b6132b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ba33401804412a383ec6ee07c927f4b
SHA17d083b2c36029d34304adb1ead8af668780a540a
SHA2563e2b2e0fe9e3b710ea98446c597c09c2d08818dcd073f70034bd4fdd03fe63a8
SHA512bcf8a3f84b5ed38788d716d8c8a9dfb0ca0728b1b99c221b405650cb116fbf4083ccce61e95b1cd6a5bde821eb9282b49ec7307a249857594356498b67fd3b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c95affd4b1e2150bf65707aa7f9d070
SHA16995d83f3ad8ea691ec78b3d338437f78e4fa01c
SHA25679f52abd6b235c97be6c063db57891bd2de8be69107fd0f247e423afdd625048
SHA512a1881d84b0c7359699c8213b11a0b2fed91c4abfcce378c2f8623c61c9c3f9c9ac9a66361bcc274b83b5ae4820f9c80e3152ff0efc004bf1ac76bf3d86025f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58742ba33c0696d26d25e0f6e09649d32
SHA15ee9b5b63c89f5e85414fe96a630a4b0efdd9f75
SHA2562d97802029ece2f37491ed49c238eb7beca744c627897efac169f17073aee199
SHA5127fa79e60372866f210d6acb296bc810d2ff5f3144933c6973aeeb5ec6fba2ff5e2273516e7667fd5791f10f4fe34116ae1c77ac915f19b31c45d7a9ea23cdd11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b493fbf685d4b959f76c06041a9a6617
SHA19dfc6ce7c5e27e004fc6b05929895c06058b9863
SHA256b5981bc2bb9b95fc37f96d7e73f4fdd55fadf45a7f3a6bbfea2a624c81ec097c
SHA512317c2eff61b50c0e362bd2f23e5d411b76957627b6690420d60e18246c9ba2b261aadbdd4eea3d7080391ace9a1d9422d15a6920b6fabf6170c6400fc9c8a91b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514200a13af956361ff5377ecb5535898
SHA1757bc3ec1227de7ea6a1729322e32f8b2ddf4963
SHA25677040d879f5d21a55aae99c6eed619c15175d1714643eb2ee64c58b5164117e1
SHA512f3b28f9586c0472e3e6e513a841457a57ba1f8ed23c7d98982b861b1e0751bafc5282e6cb352a735e66445ccde35637e0d6f16f0f6716b56ebd099092219ffea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506879e19f5e8a40f32c6c6d1572b55d4
SHA1ae210f24b86871246311ae6e851d339cfed3f6f6
SHA2564ab0d4b546e7bfa933af4fc3e5b82095c484e32f40105ea3279048b4b244cd5e
SHA51271ae43eadd86bc2100bb7a52843d723e6c2c07a1ef25e90899246e1db0550cec576d4ee98cd3b57b136883011935d5ff21f8c196a8cdee932a540fa03da925b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a671abc7d66e9e9f6d57f83b4f1bff52
SHA1080e472f68806c11935f826250deeccd89ade134
SHA256a77f2ed9c7f533d5b33eff24857f4017a5fd5ddd4a48360e26c3d2e427fe65bf
SHA5127ebfb7f80c68625638003d82e93ac1815b86ca8335c6369f080d48b16d7c84b270cea68db8084ad2b918a93fb40cfe4088bab57c273e6462fc7379e32ccadbcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5809117e66577bc4423efc28d71b32681
SHA1883f9a98d0fa0a97fce786c9d1b98ef30113cca5
SHA256a05d99f743765a7016d7a83245b1f0d75e8ea4c3f75151964653bcf3dcd0b60c
SHA5128b167854d10eddf57d5bbeb78c97f69a4805d0160815ada77e0509c25f25c78b2ac3b747e66aa9dccbfa4728b2f8c68c0cd2b9b77279769fef502e99ead58639
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b