Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
8a748d48f8bad7fe558d9782f37f7848_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8a748d48f8bad7fe558d9782f37f7848_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8a748d48f8bad7fe558d9782f37f7848_JaffaCakes118.html
-
Size
8KB
-
MD5
8a748d48f8bad7fe558d9782f37f7848
-
SHA1
e6fbe50d97e60aed2032f80e986f314e00ffbd75
-
SHA256
9ca798cef8e473c4a898b86836d675786cf0a2b662f68af5fd0a664b4189658c
-
SHA512
b4c29642944ef4704261f1b8f95e520c59b09e209361983c80d2c0ffa893dc0cbca3a3b78f87786899dbd6bb63d7d5ccb59248ef0c460e3e73fc5d3b7ba45884
-
SSDEEP
192:VIEHRYIByG3OoJL3QdJ++uDd/GYirvfEATMLxSb:V1HR53OoJL/+3VUAC6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109e4955efebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429543448" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{80AD8E91-57E2-11EF-A3B5-DAEE53C76889} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000e9548f259fb7bbc8e15996dfcaae14e5b5444a05faa1b2fdea9efdd55f99c5e8000000000e800000000200002000000072fb97957c930ed354336b2df3e5b2cdbcf559e1d0deb4b0b48826bd4810df0c2000000023d4a38b7b23a0400b64f561eca621c68bebf212f5d1ba75d81c298f35c74f714000000004440407a3be580c0c340cac85a200a4475f2b5d77dd9b9ffdcdf1f8f09bdbfad0c61831f7bb474e6052e9386376bf73cd964c44e4d3f8c0de07750f54560c4c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2108 2756 iexplore.exe 30 PID 2756 wrote to memory of 2108 2756 iexplore.exe 30 PID 2756 wrote to memory of 2108 2756 iexplore.exe 30 PID 2756 wrote to memory of 2108 2756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8a748d48f8bad7fe558d9782f37f7848_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589093157d07ae3d823d1a8b5ee9c82f5
SHA1b14b43d54bb2413cd614a9f4e70604ced0067ba6
SHA2560b2bc3d652a26210d61f3417c41125ad1182146f8e53e66328fdbe6ef5963043
SHA51223cbb79514bf3f6734167fae96238a68beae4689a7697779d1bf33193ed13e072a624975e19c505661ba782729b4e069bf2e5793b8e841b85421db3cb3b4638a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad5649487d56abb8b4a0b4b1dd1db10f
SHA1e1aced1f490d85fc59cc70227860cbe3f5a202e9
SHA25636c653dd31bc1a297725f71ab800b0e078af7dd72d11d5a179fd348ae0fdcfba
SHA5127c566ecff8ab0fe7fbaea9d1a311da327251a885f11df158558977b2a697068b4cf017827216416d24e7cbcc2ed8a57391aa953bdf258090b98efaeb6860d515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524cd6669e1804888fae966e0c1305c30
SHA188ca0578117eda9f67c3ebcd040bccd0330f321c
SHA25607710065123393d25f056aff540ac46a8cea829dcf85f24248bc2aa3e4e0efa5
SHA51232c133d5419cee1f5e79a4caf37b5026ec3813e55a7e248e4dca3ff3ec7bd9695cf7acc9e7dcde7b731b3f1addad26ee04f7c51699a08f5d4de7ac8e4dc5f3f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593b310c4b2b6a6a672d98c39868a44f9
SHA1c93c9ac7c33dd1e5a3502275a88a055b532f1f31
SHA2565b46a7c78c5d59e6fcda3b581428cc36ca5c764caa4936664140e37db2b87433
SHA512a6c1b7769fae47e65eb99a9e22093154ccb7908ca6030d7e855c0c5b8f75b18314b7a7f599df1e9fa00198aab94172095b3a532ef39550c592f7a1cae72ebea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504e41a7a1548307558ec82a01c004fcd
SHA10e142535abc9c49bf8047c998cb621c044f9b8cc
SHA2562a94772af6e9e9a6850ee98a94c971e6c97ca0bf1c74d54d93072c4ddac2f920
SHA51250b89f8e615d55ded6604acd69933bbb10a485454cd00a746419b8e4e4cd11e8ab38e2528f36ce55555961826aa7ab8716ccb9338490fdc911970eddc786a37a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c63c2dedeaba25540f0352d59ccf0321
SHA1b6bf1589bb59a57d81a073529ca9545fc2c31866
SHA25664c720c499a59434024b9bb7fc8295a54fa2eee0cc72c80f1604ee724c02b675
SHA512a046fe3a8869130a6d8b316d7a502aa0a3c52ead2dd319ef7298a9f6d3ebf69185c3dac5b4af91448168771f075bd30a20bd9cd4ed76b04ffbe8370505635b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51afa5be9a3026648a0d86f07845591b5
SHA1a17984dca2b31d009d0b256d14a2b966aacf2b03
SHA256f2e57165a259832c3080e940e9dbd0ce3850d7f097da26177ac5d929e8685e37
SHA5127ba6aa917d23c4efad622b0435eef574dd4d11666e6b17a68a2e2a837895136e72855ec2f107ce963e10926f000ed6f77288d8cc0d1297030a5b8a02af3792cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7008c4f4a966e08393e29026ff4dd02
SHA18cc532643c783d976b6a40e0d3d0552c069021f4
SHA256f4602c3151b25e0d418a44a33bd13de7f21bf2690008ef50b24989f6c2064e3d
SHA512a81e2f65609e5e6201ddc4de2f9f1cbb30293a080c914208e406e2aa2e55ab8046a5392a8b2f423c1a181391991f17b8babc1c3f6fe29639fe784a39c428fda5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e7f4d1ac9595187b10ab697c9775c7c
SHA1979c20cb8cccdd6bb9aee14bc682fd9bdc600cb8
SHA25650fd286d6e3792d6e31a77ca575d9d43e3bf47efeb1b5b0db278fe70794b22cf
SHA5121280a656988d4c6cc3943502722283102ba9b4064b513a70e25788a4e39fb3ebfe7cbf6516e802a49fa0a82998daaa378e7c7a4f3e4ae460b2840bbab415c039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550787f3dde552c58e37f1d714d7f14b1
SHA1b25daa4a04ae18b12618094cc58a9a9479e62ba2
SHA256ff13bc7a50e9fce7e48cd987888e08722bbc2d422f3edd51e9e20f1b062a6d3d
SHA5125d8fa4ee209af1600d092db506bbe69cc6332913a2640012eed087ed9ef8213b636f113f28489cdeec8eeb4d1088e846b2a0f3076c7dab3bd72a39e4835e7077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffc6703aa3f3d1e613f7c0be7c20f83c
SHA1b3f16a7ed91d2367925ee76cef6d3f99bc4d76ad
SHA256de1cd67b9c290aee2f2e9989e0ab26bae7287eaa0ad0194fecda18b9dfa7ad5d
SHA512458984dadc912ebb91844839ba868c4d0f14e35b1effad3745de122c70c75aa8c5bfde39ef92bcc995f5fffbf34e557cbd9e338c3cdd097fc1759189c61b9ca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aaf4d029c24b399f7e82032603677c5
SHA129a1e3cd10bbb807156740faaef483a86f388de4
SHA2562ada5de7bcde22c74b311e7f695d8dc7903c7a68c0b58a7b60b739160c3b13e7
SHA512fa5eabda61d09d1de178161058326ce681c76c88a193e8cb12a91879d44f9b79f729587676b47cd3152af1089e316aebb06c75734bf9326190ad01dcc4b66074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec14de39ff973dad677f4d66da9e8b41
SHA1ceedb54468730ec1a6991fb9e849a791b86cf942
SHA256e1c1a3a29c54a3c1b1dc6af45c51c0e530491ccda1e5e312b55e1e183f02f5e7
SHA512f4c7878ea23b484ee1f8edc61a7071ca0fc9ab1102410bf7ddaf48a83169af561ef4aa3b0d83b46d1e429b9eabc6809eaf3508904599a12ea8e49de196daed31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509c6a010da613a513b48853329fd235b
SHA12b52c7fff0cea9e32906e8b0806fc7fde22dd8df
SHA25602d9b9ceabce7f2310dbf563fa17411b7951dd6bdd21051cf6ed21a6804fc2cd
SHA512e65ca7e4f1fb5055be7f52baac98528b0be10e0fa4196d064330fca256cad12c67e59481dfe126b4e31aa396c412bb833de208e6bcf709ab9dc26a97697646cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0f2467810a37f240d91652bc702906c
SHA132270b26ec7a9e26473156fc6b351ff590c84bac
SHA256c6bcc99348f9a714ceb80dccffef075d0748127cff1b5e10871755bc2a4b32e3
SHA5127f0f835247fefe3f2c3f1cfbb2e213e425fe125639202b787b134082db6f41d54d5f342e81dd96add4be66b19ae6be491088084bab405b90d3c4d59a7c08700a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a630d8f0ba53e321212e9acf8ce371e
SHA14e7c2fcf269943e79d60779e4e7bb6eb8cb29e46
SHA256ddbb8207bf5c9abb6e52878dfa165db7aa2fc66c78496e7643c05bb049d03822
SHA512c294da8b0614d29b7cc6d100994278ee69b91113a83e35b575ee1ddaf4be1c8e100110d4072ccb4f7b4f9e86189c453061dfbc89b16835d92c2731963b2770b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9dd17c679fb4d56f870cbd919d6f069
SHA1cec6deaa0cdc94859fc151aaa1241eb2747035d2
SHA256c31045d4d60bfbb78435a2a94aa45bcce315789302cf77f492e33b7397d7a0e7
SHA512b2771835ce4f3fb13c411b56eaebceb70a19f4f1d11096b70d30aa335c3c239d6089a8b31751d125b060d11399560615d94a10c7e23baed4543835deb76c5c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555899bdb63dc8ee0d878fdb1b03502aa
SHA12a9f5e813cbeacc94c9eba684963068abc9e6382
SHA256a028ed0e8b0e8c16823e7fee8105eb6ae00e753bd8c212fbf43801734f963fbb
SHA512e1a68b5ebefe9bafd40410f1e1d64e49903fd9dffae49d118f2447d8200c647ee80b267743f688f2b73c08636732b51a7e051312c0302796417a43c1fe522a10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b6cee911cc9addccf75771137e34bb4
SHA10c7566d662cdc82cabd1219bae3cb9ef1b2c0add
SHA256fd05e88ba4e63a7b63f6bd9ac1b713501a5ecaf65e14d2cc5f4b60543e9a5479
SHA5120cc4f05006096c8d804fc86c804b95bad0098f9b319ce1e3fd3a20c7a6618b465c3ce33a073f7f4abac1cde2cf4b7b1396f24b47fddc6adb7576b70adf82c477
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b