Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 20:17 UTC
Static task
static1
Behavioral task
behavioral1
Sample
8bd08e11d6ae2d0b22272c07d9c7d946_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8bd08e11d6ae2d0b22272c07d9c7d946_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8bd08e11d6ae2d0b22272c07d9c7d946_JaffaCakes118.html
-
Size
1KB
-
MD5
8bd08e11d6ae2d0b22272c07d9c7d946
-
SHA1
fd65adc67839902b922f15f2b0f51748410332b2
-
SHA256
0512c0177cd6b3fb66aa9a67196e92b1a98b1d19853de31363c9f6c822d215b8
-
SHA512
a7ee3981b0121bd7d3bd17bf54964d45797530da7d180f264e18df895ab0aa02ee15a69339391625e624bf5fafe3397ea950d4d3734729515d8d5f1104517e09
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000085eec50d11a565e97cd84e66c3576df220c47a9cea2b72305f059d53dc17e0ee000000000e80000000020000200000002912d2f4736d5b334b7e59c3a520f1ba5712c81843f45edc7effce91b7ab64222000000047adc38fb20a30a8465571e295cc00da27542ec655791238fa724a12c0fc835440000000cb0d22095dca22e6474518097be249904fc0c3178c622eabdfc7a9644e331c5c370f6ac60f7b3420785a1310ca4ef816370bbd9886a550e94dd972a1536181b0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30395ba12becda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429569346" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CCF98331-581E-11EF-9BF6-6AE4CEDF004B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1064 2080 iexplore.exe 30 PID 2080 wrote to memory of 1064 2080 iexplore.exe 30 PID 2080 wrote to memory of 1064 2080 iexplore.exe 30 PID 2080 wrote to memory of 1064 2080 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8bd08e11d6ae2d0b22272c07d9c7d946_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5644438c2795d1e49a91637b7fe85af0e
SHA16579721df820c3182c2420ca2282ff7cae264f64
SHA256ab92073999db376717e1c4434bb7a25d79429a8a6909f2c7105a15be6207dd61
SHA512dc2495292fe16c883872f501a2beb752420f63e78a68c7f6a4048735c9e3746a6934b47c036e156a4ba8b7e83e9d837a44ee6cd7f9d152810415e31b468788a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce91a0c191caab8220a7592512ecab31
SHA1959abc43c4ff64b64c7eb301ccb6026f374ad7f2
SHA256bb14f314d44f6eb634dfbdc21236577d4c84ea3719872e3e78c93628d8624ffe
SHA512f605dc4da5a46d71c64f9a515a9b858c21623fa86e6b66e892150b4b0b964f1ee272e297a241b14406660f278f61e5d52b123cc98c36e59f139861c75c0faac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59086a6ee847bdb31bc0b13126d9a6c44
SHA132e5d4caf589a0b1af54885ed2e0405d28c26b10
SHA25678b478261c1cce9a7fc5354446bc5d115cead257bcb6f4564ae761e34215e224
SHA512cf40d7fc7654336365261a9e95fe6a07a914d9da8a0c3c695baa5d49caab13df99a0bd5749b590ecd081340c0031f696aa1f6e473534ebb3d793171285ffb158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508dc6dab4c9a0d687965c9e6db635f41
SHA1841bb4b55fd90e7230f5a8f3f4ffba633097bd29
SHA256bb1894fceb22351999ad0bc358ffc259e2076109c645ab83dc56f152f3603b4b
SHA51255348e7e77909b606062e9bc7122b2c650ec9fe99f00ccec6f9bde714cbcf1464d7485420ddbf62b357cefec8dd02fa0551128c5859e0fcb48f9a6940089c402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8fe20b021f9f96ab5584a47aceff67e
SHA17642813cb0ea978dba338e8d6858842ce55427d2
SHA2567df9668588af004d8259865f2c82ef2adc22ac70e12f9ec30f65ea9b6f878331
SHA51242da777c1e503f8e447c135a952126ea56fd7b64669021da1bf3d52a8f4a81c5c23c58d3ebd2130174e963f36c56f82ae88456678e39cf2cde73b5df5a440536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea04509135a6101efd7cdd9ff7ee104
SHA13858c3cdca8d7c310bde85525bc4fe1150b2b3ad
SHA2568179db7cae4b865fa798239303c2087f5a8d80fd226351da66bcfdbe433a9d0b
SHA512559e5d6fddb597c31867ae2542e432a5faddc541000c6c8e47b7500eff61aa7eb46446e655846bd3856f5962729fcb1329e0238d43aae3d408f34f4da0168d5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7a87ba901490869713221b95d079e7d
SHA182ca8c72822bd7d982e33813a817110ed7d1f865
SHA256b47c9d17d25b644bd636de5751e63cbc60738bda92fa6bcb8eeab3019a8bdfba
SHA51260512e725b6681cc7f95ae7ea2e1117ba1c46886421198161d921a7a219448f8cca47ecf257d451c4105e64ce5b15fca5ac53dfac897e64c8a9bdc1e5873a87e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a815f509884a2aaa988804c166f02fa
SHA186de10e6d6c13ecf54df6715c48c8fd03e6e36e8
SHA256991445cfb48665314d0b0bfbe9214751d5e925c2bb814179d0e35810992d0c57
SHA512d1fff6b091bca5cdeb9da8b161694319308e1c354b884bbd0b3b48a9be3690b67da1a233cd9dfc35d551b68fffd88ca01b8cc7740e16d31d23cfec9fd04231e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a95940e19d6d7e884aa1796818e164c1
SHA19af056197a9af8b502f5433aa70cf69798fc3d65
SHA25631ef97e255de51d124af91bb92e1ed07b1b4cf5c8238bc0e47d1bb0f6f4c6ccc
SHA512e56f45d6ce33ef61e0a1ffb8fe7ad0c31f1a6d978b19872a81a2c5b7564a890bfc9051e76de43d690e462d4255918dbb8090667a64acef7a2e20fc1c4f4da73d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50815f586b5f00bd2cbe7c78a48f55944
SHA150211c6c1550558fa0e6f05be4afeb34d21bdf2a
SHA2565511ab1e3770d2dbd5b12ef65446167176ce115a07a62bd2dc07e7fd65a39746
SHA51239215728678ffe1d6f577fee3adf9a54f457d05279123955f660c8e3caa501a83ddf7893f8e899f93e0d77bb27fda21c02103561e12085b5c6a3da180996b5e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b533796665c365553c09fb1caf1e275d
SHA1be0d83334009b75b3df166aad77767052e946df1
SHA2569ba702aa6b0a16bb08d75d23812a209d6ac97c4c0add11530c0cd9b1a7ecbdb0
SHA5120b48a28f674ad0df5aee650522ce5310d81adcbcfbbbf4c0d19ef133bae0f0f4159097d72285e19d0009c8865443abd4e08fd31d74b33ecfab89b0a0e062aefb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab6092148961d6bcef9d3a64a6f6298b
SHA13c9e6dbc126ad973b2e4cf75672452377ab099f4
SHA25655d676691926f92cb85adc12ef10624cf3368d47863a8ba73c275e5a165b76ba
SHA512f36e162892fc8f2278813d8042b2812864194bdcd95ee4cc00795188901ea6b457c62a879acb0f5ab5c5e6e132f5620f88e645f351577cf359a9a913c6687026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554421e76f75463a4b91bcdb0143035cc
SHA1793d952e8d3f12c4a267cfa688c032400347a224
SHA256efb8053893a505b5194d164eb84b44b822206bb2b9ad60618471a51149365714
SHA512b5e9c8c588522e64a6101da041f1c674331f2203639a61bbc561ec6fb9b1f7df9cd5c7cb90555f405d26f2738fcc0b5b9b3312f2fc9ee3f92fd133497ec5cc36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b070ff7dcb95462f8976d73aeaa5aec
SHA18359fe497f62c75aec01ff3699c127b9fdd39159
SHA2563e2aaeb94a2c24032294dcfefc0d3f98020acc785cce25a2221bb319789730b2
SHA5125a1cac93518981a782fc1f421843b3e7e04e2d0d66b07cc69fd0a8e1327037ecce2949c48684220c602ee00a8f8193cfc25b2af3c9a888fe26e0378a78cc58a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f806920858d4241b8a9470cfda3d827f
SHA16b8049caa094d829aeba6d8669584fbae02f5367
SHA256a13eca76ad0a8b52ea78ced569f99653cc341f26237eee35c9e9572ac85156f7
SHA512be0ec8138b41399544eef5be8485fb8625b5c233e40708c8f4812fbf516f60971127326533583fd9038d16adb2ca802b51ce6c5b6eebb13139e1e2942c44df71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53be32519c34755693aa94f0e4417064d
SHA1d801e17dd8a1bff64e2c2bd569340b91f2811673
SHA2566108b58003a161bd3f865f010e8587ca23d8e1b220119a95b57a491b5b27f835
SHA512a68af81ba1cdc7086f746422b462ddfcf3599abbf5c32d63e8ac88237c9f149c8d1c4ef243e9c91f9af018a18fc73bb4f2d567fe695294351a593403de3a4582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecf466a3ad57678b2c30bf502a2fb82b
SHA107016e0b2b229578d3de0eff44cb9ab51ccd10c7
SHA256f5916cd3a221bf09679e45adae0a94cf1f39dd6ad5eab16e2241987677062e52
SHA512406affa44236901ab43deed6a2936a944b19cbf23e690cf55d887fb44544d897dd68e708f429018151aa315fae01186ae32ff34f99e5ca8d416c7ddfc88f1327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56120cb91233d0282fc91fc0a83308916
SHA1787bdfcde41ac14e64f5d6ae406a149206245683
SHA256b5f0aab097e7d393eb27834e591489f4c074898e7233850dafd623a81527653f
SHA512200adaa03ba023a34434fd6a6df744ecdf6de52ab146e74a8a15e5ab973b8abb7f36df4c859837124a2bf2d5e8c47b40721975134c5bec4461f8d874b7685e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04dc4f2582635e2ddf143c54e0a6f03
SHA1581feeaddf8db3b3621ebb569bf6e4d5f7ff4076
SHA25699a38c5a23b7d45f0b0402a3812f23ab75ecee4fc01550f377202d973c8b8852
SHA5121f2bd191666d58653a2bedd2b8b8b5f6e21fadb3c5a73e15999604750c90d5b6361cae790267edcbca0bfcb85383f8efa9f6c7d697b5f17dff173108d1bfd87d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b