Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 19:07
Static task
static1
Behavioral task
behavioral1
Sample
8b9e5268a794b8fcad4391360bd39f11_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8b9e5268a794b8fcad4391360bd39f11_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8b9e5268a794b8fcad4391360bd39f11_JaffaCakes118.html
-
Size
1012B
-
MD5
8b9e5268a794b8fcad4391360bd39f11
-
SHA1
181abb05033fb4fa22533c75099b56661a854f40
-
SHA256
f58841932f4fc1bee91914fec9b6baf6ffacf2b438c3d8c4c1d84ba3dcc3de2a
-
SHA512
cfaf941a9ce1034071b942af733b03ff6eaac295c0ba1b5425921224d4eba3c1ec426bc36f3a993caa91edbfc61c32abac2e857040cceddd7c6ead5859e1a9bd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429565136" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000e6a1f0f08094cea57c62d1395f77c73ea3a78b8886f9cc99e3c9e36efcc9fa2f000000000e800000000200002000000081f83e2f037503f8d61be5761d8a2a5398802b83852258205431018b265dec132000000034b51d87a6ff6ea6cc4664275bdeb3fd12e0873ff61e116ab6353c610f26eb1340000000ae09d58a67e140f85550737e1c2b5395d0ca26a800039a091631b3b6f218003ed0b05ab48d0b33f76fcda6e528bb2d9adb8e2529f27786d50ffd49742f7bf8d3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FFA5F071-5814-11EF-B9CC-DE81EF03C4D2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e04430d421ecda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2776 1760 iexplore.exe 30 PID 1760 wrote to memory of 2776 1760 iexplore.exe 30 PID 1760 wrote to memory of 2776 1760 iexplore.exe 30 PID 1760 wrote to memory of 2776 1760 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8b9e5268a794b8fcad4391360bd39f11_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5197fa25841281ae7455e99ed30531a80
SHA1dea33e170e175a007848739e18f0b3a2adc9588f
SHA2566116f8cda9b0f2753b800ec5f67799c3253eb1ba3f62f8c0715330a72fa66ad0
SHA512d411373eacb47651742874a060b0536fe20c7fbfa725aec78668d3888c994a1228052d6aba3914553dc8e70a2a7d2cb39aeac5f8d900a9ad52118df4a69f0a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b40c1fd780a7c9eaa7475456aea5293
SHA147e268356106efba368b5bbff8b1486535ae03be
SHA25633ae36cff87f19840dc519096ef8951ae43ef24d9fa0954d115a2c3a8e022809
SHA512675c211cf434c754c52e12ad8b410f6c0aca3d9d3d6df8589b35df0a2023b70379b5998b4a85ff83888fad93c27f3acbf5cde1f97627ae2fc783a833bb162373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0232414b125a28d9a873a99d80ca104
SHA1aa5a2a557b06f844e15120c925535da09f1c4c3f
SHA256c8637f1edc01af0b9c65845b73e3ed51094f89bfccc145bfae0808416a4ba7cb
SHA5125281fbb20b511feab6875e986958f30773061d1732c09170760f71e1009b7c70a7f07a7324192506ae03b78f34fa7879b5fbbfc7502bd2bbccdaf28284c3e8dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8c208af41d90e5af18e21904e014129
SHA179086bcfbae81ae0a7056cefe83450f9c5860d6a
SHA2569d2b8e1231772bd3afd15b56616ec945ab2b2379d33855517b82a4cf90a651c9
SHA5122165d11e06068ee486f708156f3f9ba1a9345d55d6e8cc3d1d2d65ab02f9996850aa7e9328521adb7920ed474d935c0ce77a6a9773daf5346413fa236693b1aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f424d2a2b511299fd35ab552fd22ca2
SHA14168d601b1cd5aba9ee745cbed148632b2877ead
SHA25663cca1b4ce779bf00b2cb8166e231d87d267473d2aa7ccc821f51486b5d26100
SHA512bdd3361fa66901dd1b99d94da4964665fbf6dd3e88df70618a8d9d49984aad0d75855fb8d4b529d0d54a7b507c5b60d53ddce25343f2288a46c9d2fef4135769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e0b09027ba7263b0b25f1d07ab452fb
SHA1e34ca2fb7311c8623ba85cec8e90e7e942c81b25
SHA25638a2ae7fe147e1d5c998550af6053f8203ae817529ae702781d99eb890048fe0
SHA5127e394352512c43e601849f3e63a75055823217098db485b7149afe4c5d05650c0016130e074f941049be4999af9232bef7991af95c2ba6fb7902ca23c8c878eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ecae10eddfec0074569a140fd38038
SHA1d8fd2019111e0daee6f5182ee4aa69c19428187a
SHA25685f73495b58bd49e7f8c63f6578ba0ff4223b59f853478657cfe60022dcd35ec
SHA512b9c15900b3ec6d653706e4d48ac203a73d532d1736db6eb7b7ff288634ddcf50e158d4f66405931f793baa75ceff6c6d4b88e741ceb2a83ba9937d6c992fb1eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b674a14507483cc72ac4c5c418054559
SHA143fa99f4e80cb838f367993527422c58f55aec9b
SHA256c0a43e8ccbc4ee70468be65687a7d8c31985c29535cdbbc55559b7e568af4196
SHA512c8bafdba93fc05e952555831490d8d130e79749111daa10c861ae1808558568ad69841fe4b082156dacaa232487b0d23db6ffc193f5348dcb117aef2b147f40d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bb2bfc42107207c07df33f6f9965dca
SHA10351bf86a6e5bf73eb80c521765ae129c90ed9ce
SHA25651dd5b46aeb05157873608e34f0842e82dd1378343945c9e3e4d27202f941c1c
SHA5121744a1bdd28a7ed44489946f99def368cd9f876d8ac8879786bc0e7ec9942e14a0ffd1f1c696e2cdda8362599c2cefd4b65d9d23e4bce8a940586f3bc1b220e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595594af11eb5e2ac15e7789590ea7e40
SHA1d6be3121b6a0db137ff2069afc215a024980ec2e
SHA256953af576eb863975a66d0e4d3e80bb6482184075492e56aba63592ac83178c50
SHA5124b4108825e3e459d8d055de602e6eb44a33a0fb3866ad77b63bc95fe0fd345a0027adca77fd5e7a6d7ccc69f99357fa6bfe410efa8f476b024bc805aab3d2f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2a987d3c7394f632b8e6a35e1e6d273
SHA1b7e42a7469a56c2a9e4de025efd1d53b140f0a15
SHA256d5fc17de1da68f95a83b3a67ab1d01a05adb8a75753d77fcde9ec8885b48075a
SHA51234be50afa40396bf4a802260a5638c80d637d35a56e9389d21aba998e3ef6c0309c286c007894d5b1af0879f800267c1ff96ac4c84edec1eec53896a5397795f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a037f7d5ffea5680e4db8c617a3dabc
SHA16b4c05c227e8b066daf430d5262cf7bdb87cf62e
SHA25677fa0d693ffe49bb3e8436954ca406ec643d1cf89ec67fb75c1c3c6642585ce9
SHA512ff078c13d52ff296569b662fe8360201281969a59e79e9276ff2e8c735d15f989172bd66b0690f3fc71d66bdc516c64399cbb736871125433ae07e4be4d7a83c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d4ed8d4e827d5e712803adac465bca5
SHA1b52f227a57ba3e78686d109b547620dfffd35a62
SHA256847c4da9ce0d5ccf712b97bb48c0e98944a4fdca9cbd84ace50efc296cab4e8f
SHA512977805e92c9ab59135ef80cd9c0d4db3984e290b866a84b70b39613faa9be48dd949f5e85d654920da8aa0040583e1f3b7c228e749aa5516457164e9007bd687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5311ba75340c39d4162bc1479578bfd0f
SHA155cc6efb08be9784a40f7cc03b109a75a4c7c5a5
SHA2568173eff0554bba2566beebdcfa8831945fcd6edc1e680964e245627184aaecc5
SHA512fc30efa058cda03585dab991a79713f1994bd0d6a37f5b91f432575dea6ade1913f4d8e4a425d9a140793220f04d9556031a04acdcb8c6271bd580743920b76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b342691cd5b32b69723b01de22390b
SHA12087bbe97a4f41242bca6341283a2be901b2497c
SHA256f74bb0479d22e6c175a84853d1b4a2649631f4aca3e4b1de55332369295093a5
SHA512d51a4e3b7c777025a14de83516e8645087375ca3be377827da10e022b5c232daf24672f695a65c086c68fe2942b5ca9c30b1447d955784f9312da1bff9b9f276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba0e2de6c17bea394adcae9a3b51eed6
SHA10c4ef344b40d21270cdfd41f2cee2fcc65692364
SHA256b7683262d7a6fecb7a319395a10a91939cf9b1e2793bee49bf7f3bf1cf14f3d2
SHA512507e56bc920266c8d03b9130eebf4569d8b244b3db5bd90001728b2d6744ae7ce7ab09bd97aa39f5ec58bfc79f5a4b2316806fdf5aefd7c83c88e20b7c7eaaae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f33d5c8ab862c6503901c29ffa4443f4
SHA18fae611fa6092101ae1e1add44c3dbe9dcd078b3
SHA2569d91a5f19bf8a53bbe5f45427da988bff31af50262d5bbf6c149422d46fa401c
SHA51231b4cf71da33a7dd84afdcd83178247fae922eed562e823239f103dc7b1958a36adb62094395acb932a9d16032eb8435dfedae17b18a8f0554d91968e9e61387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547a7291141778e32d9de3c60b6964f6f
SHA19ebc3ebfb24a16be39c70bf5515cf274750515d5
SHA2561408267b06991a7b2a886dcc249036d49c85010b05c78394cf55d849f31b1468
SHA51234db873cf02a7183e078ae4efde63d6eab82ace8915684e5606cc397383585f3c12663c6c8c4ec0dd8ef4c50052e4a688fe71d494f3f4359aa4bc64643efcfa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56768bbf3023afd33f1227c178a99d117
SHA18717380eb2b2a5489371e87b55896a1fe7fbdb50
SHA256abcbc7eea0c9d3426d563e130b73c308b7b14ef5b655ab4326bae4c6d431d8ec
SHA512ff34113c5cd624c8fcd75d51471828fc760be25227addfaae79af477d4a22e33ea1edc3f1e3c244855d2c91bd35ebb52877ae1a1bb5901142266e0d12de98dc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550cf2202cfb43bda0ecdb19041bc7db7
SHA1c7e7fcba48486c40f4897e6822bc941403511d54
SHA2561c21fac26873a0987cc2958f473c1185ca473bb13afb2d208d6162f7414c422b
SHA512999a74863b25b833499b9e4ad6b6887d98abbe839bdc86fe453b6949c840e7264c2461ea7db3649f5d32a984bebd63ce7dec0678cb18d791125592d63e178980
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b