Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 03:09
Static task
static1
Behavioral task
behavioral1
Sample
8d1441949aa8ae4754c3d665fef94cf5_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8d1441949aa8ae4754c3d665fef94cf5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8d1441949aa8ae4754c3d665fef94cf5_JaffaCakes118.html
-
Size
3KB
-
MD5
8d1441949aa8ae4754c3d665fef94cf5
-
SHA1
d82b4a4db29928da198936cbab584d63bada5f93
-
SHA256
fb1815bd2765c86fd1b44f11c06c5e63ae6c33f97a31512e6fd8ee26545aad96
-
SHA512
9f5e71c2a020109608e841f65f29e4ffe227a523ac22b7fad1c61d05738603be5a3a0bebb6c215907a9bafa39a07ae9b96847c1ada8d595fce67410a73c09a1f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5548CF01-5858-11EF-8328-EE88FE214989} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b052e91765ecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000868a544ab50c72af253a4767b9da832eb4ffafdb5437a2c4e6ee5eaf6026af75000000000e80000000020000200000003c8fc6b5928310aafb60e8f56816359dc587e07d3f7a082694847b111a82fcfa20000000cf00afc8c1443bd29d346a4e365f6983044bfba5ed5128a7de3dca236a522c724000000017a3754b826b46404db340120981ec874b4ba844e7fc5b05ef077148692bf266331c3b4ad4db05e6da5ae5851747dd149536c2cd350ac099840afbf0725218b9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429594056" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2780 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2780 iexplore.exe 2780 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2140 2780 iexplore.exe 30 PID 2780 wrote to memory of 2140 2780 iexplore.exe 30 PID 2780 wrote to memory of 2140 2780 iexplore.exe 30 PID 2780 wrote to memory of 2140 2780 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8d1441949aa8ae4754c3d665fef94cf5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2780 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9632534e85d6015561afc42f6cd19bf
SHA12ce61ab608b8e279feb6f162f70b8987e6d2eb66
SHA25623edc13fb90cdd1cc43f50725de08bf64a676c51d50ed96b180f9c8f038544a3
SHA5122b34e1f7356e6a25bb7bfa27dec71873c38216e48841d5137ce49d7add83e79603c958974e56be0f3bb2ace7fd6c0a163130f81291d9ceeede6b0b691a0e2678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d8f7f4e722487bb141c9dab21f2cd66
SHA15f4ff5dbe72badf9f708dab100e751268114c505
SHA25689583e70a40550b4a98a9a62d53092e0878052160f85e5da5a6754c6b72503d4
SHA512ef0b10a8d41c52468dd2e2dc83b2f1e51c4952591c49ac416bdbcc70481ff06105daac1f361ffb130b9d1df19e306ca05664c22573fb0e08f8dd3c8575842cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555525534105a668181ab3e501bbe89b7
SHA1974fbf49da6f7af394f57c9880a0e8cf3a8bf764
SHA2566e6bfcedf149687b6bfeff273d45f94a19267732c67197456a53e9d0a978bc07
SHA51219c65b07a281cdb33152ec1e8d69ce7537111942a1130772317046b5eb1ac9edd960c691ac3f1d2a973277fff8c6b432c42ecfa77698c6d6bf7b35e4e960abfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d54f80975eb4ac70c16383fe0930881
SHA186a734e605ce9f6025cc44b9e2f7a29391744ccd
SHA2561d5250a31d248caa32c1e8d3c475a0c6a11abeaabad2d33e93011ff98cf386c4
SHA512cfb2035ac2510711210da008a1730e3812a795b5a60d7b7c66ffee05ba31e63401c99f11fcf612b97059550511506ec90d3d62d16219af4135e552ffc9dbc945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1d6004c27e2bfeea8579fa21e5c8f93
SHA19567863c3c75c1880f69767ad22ee35a55a9b194
SHA2563ad0a35b16572a048e235cc9cb92bb851645c7b312b8b7fade13c93bb0554343
SHA51237e362987950f2a33b30d0be71261b79f9a49b2c0365d4d47d3b28e56064cfafdde178a182ba4a2dacf1892d234b3e8300ee052af9612b4263b40110b46948b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5546c92bd82e29f661b1ad9470eacc765
SHA168d46fb53b90b7ead5eeb76f03e903adf98a8dd1
SHA2567325be80e3bbb61366595e6a7fd07fbb2054505d3e5fc0bf03967bc92cb0be53
SHA51272e241beb729a8575b3f62a1266aa61b0d90bbd5f6b6bc99a81d5726a00c9e21a376c05cfc4976a8545d9ac78a8b6793303acfa9986f4b72cf80544a7cd39bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c83532cf940747c72ceeafa1cbd4cb26
SHA199a7852d9e02baa2e325e70f57e56dbc1f7511f3
SHA2564a46f9fd4fecf5266bb8a5d243fd6655b6ceba50186239e6a4ea82a5c7e3114b
SHA512f65b66409665292aa96feb0b29f2e459fd3d194ee4fe87e0e6508496239e215980a064ff9ddf54949f2ac8098679bbb274127c7ae7c3b13eb79da3d7b9655d13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa1f513770c104514dfedf06c14b15f2
SHA14170c830749d0657070059064a30388e1e2d0b3f
SHA256254d23d4794db56be9f3e07a0b82cc13a785f6974c9cbdb4181ff36a0a95dfec
SHA5124e00da89c2585f946008a2062c105ba433adf345b344377962ae98ef5cfbf916c2465f89f5e4b29f1be3e7a014933ab965b795eee8cb710abb94d3bdf2ea12e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4a38e7ecbd03f1996fad022ef29c8c3
SHA1c0aac37ee0fa6b10ac6721ab68a34bc4a30b26cb
SHA256d9abad323ca9c8e5ded8d1123799bc4db1141088e6b32cc2f74b6c513404c608
SHA512180a54f01dbd7aa4b79a5455f4eedd717b082799204af47d6afa4b1e62d5fca85005f1139a0d6307d813834c7ae8cb20df2fa431ac1a1d8d85371fe5751fd861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5973ca5ce7b41ab1f5c2761576789c6af
SHA18853fdf9aee13e5bde7020f8c24e98fc74c35b23
SHA256dfe9416046e52f20bec694e45f0686b6b9bf18fb4b0b79214d0b3565d7246a1d
SHA51255e8575bc0781a87d38bc2e924972c74800e55d332996109eb91eca842cddfb03c14feb90035c6d8cab5ec005d03d16b4886f49dc2bdaeb3e3bb90af3c04daec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5808af6cfb5afcd408aa6a34112b52fdd
SHA1782caef4a4a08777be2db17f5221d3c61003bb51
SHA256ce7fb8e2df86f8ad88eff91ea7dc7663517986006bfe6158940a5b7e5e2e5db2
SHA512c856e7be67941839c7b4b0529e13902dcafbe288e230f93139df24e0f6ed9587b74b4bff19d30875bffbda9987975aa410efd295892cfa853d003294e11f6f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586deff1d97de417b1425a8e790a061ce
SHA1be72165e0752c716a81db18fe12f1709120c0575
SHA256882cd060bf73b39ad957a2d0f2f53afad738955fef9b6115069487d6e032834a
SHA51208bf18c1525fc7653ef9c26ab13b0680f5f664f0c70feae0f150601ebb8a5c076a7b2372b79d9ad575e7f3ce46a0695288961e324f74dfbcef0fdf0f5cfd7e32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588e6e444c10e01928704e7df983ffedd
SHA19ee811f7c186e9c3649b928c5c7b33e1a15bed19
SHA2560c39ba8dbe382b66a5230886dc39d7b37ad1a989d6c8bb38ba3d75837b549ca1
SHA512c7b1056a05996c6d24f4787974b666834a138c979ae58f9ca7683ef9c841ceec7d25d4dc87304767ce583c5a87b14293c85355e3f622eb02488af56018154b69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3b7a029a9bd1e46eaf71dee60449139
SHA1540cdce8572e8b6bc2eefdf855bdc0683d242462
SHA25690bb84483591173d9b06c629404a922fc9e1b06b5584abaac80de074eb3eceb4
SHA512ec460d4fe14a9d88523a5dbf01e2b770d8ebe6c165e5b99ca73959c1e64e323be1ef53350bfe4cb34b91d1928adb2ceeb6ef70a5c5897a72ab172596d3913ef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e234a4e87a6225a1ea16ea3444a22cde
SHA1a36fde91d849b8dded7b3f00cba42f5bcbcacc7a
SHA256e80ca731dfb3d4e7d1aa5ffa255d875519b52a1ab922882eba23ccf8afed42bb
SHA512d8ff7b60091715fbb8f6692026d83ed208e1ec9a667ed269eab15b0d8d68dd0f56fff80e1e90304ec3c51960f8886bd300179331ec1fb4c778cda987f138524e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5262060a042439e0eef12ea1f41194f60
SHA1cec6c35c110caa6d610987c79a4ffc6e356ec630
SHA25644f06585a48cf55baafc15c8c6ee4643f532d6ca49ad0c35f94ed854fc7ec2d5
SHA5126955797e720acc1e4447a1ecf4783fb5b4f2fbd049d6ae6bac6be24010534a2cbc2f1fc36d56116be72220ccbc8f4679b7efb043ab913b2b36a7db10ca4ac1f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf56c84f8f785fa33be872e61ae6fceb
SHA1c335d8a34a1bae0317832d4d999e4a88247108ee
SHA2560e0e10e0c365d8bb9bdc6c5ef12f2afde05b64a05811e24e99b948f527447412
SHA51269e24a0cf736e6f7b2c4a93a8fc4423fc678d197851fc760b3f30de03274b9a78ec8fad6e0b7d3f6aac2b8f4dd6aab1eaf23c1871f741b7ec1349155b0d0a74c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae4168b6d81d78a7a9b360978a690059
SHA1679b1b7aa953e7d2138cb0cdbf4df4412d5e4357
SHA2566477f4e4ac6aaea71936186afeeedc9d7a10d4589c56e907ffa7e8aef87a65d6
SHA51209b5bc67dfc0358c7baa62f1bb970c2c28f8b4fe9b5ecfe1e095a2eef2f3d1477731032ae38240bcf227df5adb2a711a8c4a1b33def1dce46ce16f610d1a727d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6a6a90ad76c764b13f054c8f4aa606f
SHA1e5e652a6ac6ce72b86d4d16fa88dc9e10f610af3
SHA2567f969249fe386e67af294cfd4403f0aef85d0873e6eb740c803b66cee056e308
SHA512c11fa07f150ec64c4c848ba9dcdc96fcfcb469de1384e43d473fac8f29c444845dd044a693a3ca78148b50417d80ad9e41aa4a443bbbae534a59aae766e73434
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b