Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 04:10
Static task
static1
Behavioral task
behavioral1
Sample
8d431966268a31e0ddb8997cd8460325_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8d431966268a31e0ddb8997cd8460325_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8d431966268a31e0ddb8997cd8460325_JaffaCakes118.html
-
Size
43KB
-
MD5
8d431966268a31e0ddb8997cd8460325
-
SHA1
c9219b1765cbe6943b9933cabc85cdf0f09126fb
-
SHA256
59dd2188974ade832ee6bc7836250aceb2031a09ba2278ba93c1b43b0d36821a
-
SHA512
19b7b8b0d89d8a6cb5d72b137938f736f2889d240c699e9450cfb3b3a5b879855b48f0e3bc6783dcd06e9443c19538af2bae59588b054ffa53fd4c135d629249
-
SSDEEP
192:TxKj5OaYksBdjZEZUXi1Xc99kXvUgFvjZ8lsdl0LjUOlHy5nqCmUQLkCx890:uO/ltZEZy40a8gV8I0LjUOlhCm/n890
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C425B931-5860-11EF-95E0-F67F0CB12BFA} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000f7e430471bcae6179575af9ffd4d96802df8766f96dc1bf4e64d09575b5c20a4000000000e80000000020000200000007aee3d78680be636df773a63533eef2c12a1a405346dada2c22c9e48ffad5e852000000039fa50b1e66a893e9046db62ce76841ab4cc8bfb1762bec91f1e98d1ecd3442f4000000097b42218a830b6effbac4f0c640096dfda1f55656699e16fa79bb2365f4d0a0f6268f1b89e4418377946f6842d44d72a2b06076dc9b98844fe229521f6671bbf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429597683" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0abde9c6decda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2572 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2572 iexplore.exe 2572 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2108 2572 iexplore.exe 30 PID 2572 wrote to memory of 2108 2572 iexplore.exe 30 PID 2572 wrote to memory of 2108 2572 iexplore.exe 30 PID 2572 wrote to memory of 2108 2572 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8d431966268a31e0ddb8997cd8460325_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2572 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD559f00aa44c11eb66f9f8ffedc8ffae48
SHA1fef062ea736c1317b7b59b8b4b79e20290ef3e2f
SHA25680f29714f8ed84f8dacb141d71758bba3fba02b137212f584df35e5198384e2a
SHA512512ce0f8b70b05366c56fea9a40f9eff3859a2978ae23b884fbdc7d40547fa3db4b6d254e1f6e7fa8c5de744dfd1b956aba7697286a1c29530d29185139bd0e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53daf4b6d56a7e79a93705bb237a0c615
SHA1d412c0e46bb9219cc42a54461ed30876b0d3ee08
SHA256d3ec224a2ae09b50bb348223de0e7282c580e3d9620cbb657058413bfbae103a
SHA512a8d7356d86e63f1a984c894cc6c0df82c9f7c7c746d66afc2c112a15641fdaad6ded24cefe37ff24960474445e5e0a0b346d87a25b0b69ceab1bac212d5a1ed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f80644cf7c81237c2ea1c395654ebcba
SHA1f5f98f7a58ed4fce3313a310e2dd78c9fb396a74
SHA2567aeab94a0b986feffc3e4e67009cf52fde167ee63e731822af3277395ec2ccc1
SHA512905724a63536551c0feef63fdb08d8bf99f451ff19aabb7e82b10231f5c115eb2b79c4f80db7d3ebdfd18cdf8e59a2118d4029e4640aa754637a1f6ba83a7063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56979ddaae76edfcc7b6bf71a840fece3
SHA13ec72bacaa03f6b80dedabebe7005c4a778ee95d
SHA2562ff431ad6ec2fb6d2f8c0eaa0cd131e41c73e55b7ff0a3d141153dfd92457056
SHA5120db65c7776672e7723660293276d52d0fd4a1aaaef1967d07573de8859c3de8623d2e14c0b1b714680dc04395c7c4d91ebefd372938d078cbf30491a251ea9b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5939e58d98a601fd3ac9c60e3f51adfca
SHA1c1c531c9934be9b1e1067fe678ab2929e294552a
SHA256df77e915055090a452cefa519664c487f36fe51261aa6bac8576f9550019fe49
SHA5126b81546f5afa89f21cfa789f5fdc45537384ed3c67fbab291cce00b62886f1be7e53649475570c1da607b8b25f6f48a6a028ee907016dd211dc003c8a3f5cc68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c57d10018fe5717dd6fae62df2049f6a
SHA12b867c3c5c490d31fdb8e7731e3414360a21c460
SHA256d446493da0a0d55b7d1c3cf782a67511b0efc4f51f950614a11970c501d86abc
SHA512667459a79ad208fb832ac8bf2d908e33d87bc4411b4cc27e34499170e22a7242daa3d8119173b84b56d7510582eda580155c4e30b124a5409a2528a97d3b03f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d6d16b90e044732a6758e1c1af680dd
SHA1f7765989248f71e60af90e364fb13c7be5169fbd
SHA2560a2a0fda810fb9f9fe0dc1b27880a9f519c9674d5db69836256cd8e6ea108fe1
SHA51235dfda1c285bd2e33a487dfbaef74d722b8e9d9054a0915faf05e743b61d889d27ea566d3709fcb073a63fb76e677d446849f7df7adda8bfe6cb62d4b6155e0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ebe4b7348ef172a2a14c61c58668eed
SHA1e2181a926e96e4179b01c5607e52e1237db46685
SHA256bfa68a4c209b7330a0cfcf593018ed4e0e95befb4cbea300f0f9730068af3731
SHA512a64800d5fa789d963e53d9e62226b8224d3edafde664ca8da6174d18ad883ac20ab5abfcb2099b7128c92be4cd9683186d755641baec31800e99a6495f09dc3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b572edc94665d7dcd390fc74ad064fc4
SHA145cb3091c7176fd5c477d4f8433805f92e7da73f
SHA25654cf9a9a145fa0ba7b43d5d915418f4254ef0992cdd4582919827d7e8846ce65
SHA512d7b1bc71e0b6873be6fd0ca26d5ed4be8e5be540e536ac749a491d83e5ff45ac552a6e2d36fea20ba82ddc5942833916bfb2596793688b93606a05d5a3146a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5fcc07afd277534f58f8cbeea456f89
SHA13632216b1c83899272ba4c0d35f78c510141fd26
SHA2560e2e38da85a64cc2c3051176186ad22a61e3b3a898cfac7de8358b08bb04e859
SHA5125d5af8711f4466fafc48ed53915c9363d57285c3d5365f2b6d045284831a91047bed6b6d61d2153db779309b1bc5fbd80729aaeebfa0704ab870feeee84fa786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5602eb69c8c4cb454c8ccb9826cc59f2e
SHA13d6d901d4b0023539a8102a9cd5831a347180236
SHA25673466f28f545c7bfde7353f20e831747701b0ff07ea29f664422fd69761d0f28
SHA512593a99a8ed65c6a362ca7273cad4861fad2cde15456124758870e674f270d1ead3a0228eade0f2fb7eb39223e08c2897b5ff1372446db60ad03e777130dcbdad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ace6eb0dcac1fe4f1f72276f5194df7c
SHA109692ed3fd776248a9e826ea9dbf5050981a60e3
SHA25604650f5b8aff94d0be8a82a657d9d8753628e8813df5ea86521ba3a51ba7766d
SHA51219b04b196806779c095e48ecb75de0c56b5807a4cc6ce9a95b153e51339efbedb2c3acca23c2b2e9f7a3102e109d297b97b06afcf8ee6d4b6e3980032d4a25f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e632baec1cb4ff9ca794dcb11064e6d
SHA1444cccc06fd383bb9b909d4ab8462469b2b9f82e
SHA256c7ebf20a5389c93c99a82943ee2e12706f7533bb0d3c2e2be32521d019880fef
SHA512703888fb58e05fbe29601905dbba6b596de78545ef6472fe9573b124b0c992e27b87f723a5e85c676a2f1100a03a8c32d01ad5e344b12116342412f24f52b53e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532e1c4cc564bdceedf356019c4a87606
SHA17df2430d91142335d2ef94dfd13a7c97698700f0
SHA2560280281d17a21ff87f4383c3d32bab8ca8e8c24cbd1abdd8b89f4bb80dd47e53
SHA512c8eb6577e71fae853243a6f074f69744895a38f5e7a8e325c78855e5c4b5755b44c335b1084f327283a457395ffd7c6e259373d73170aca87b6869ccf2d5e5c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53666e447f737227d6e5580407834c8bc
SHA1e9eb7c58d0a7cd335cf12ff62c5e6be70c97bb32
SHA256f543f96eade0d305c64aa02cadaa144954cadf5e32039aa37b2c39044033b7b9
SHA512326fb773d8dcece23058520ea8c30b0c94954259f27eecd568eb5a04d0634e7390e136b08b6bbbf8531ed0a3b68f56c888b5fcc7fd7d185b172c48687bd79e16
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b