Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 11:38
Static task
static1
Behavioral task
behavioral1
Sample
8e97acd1a3db8ea982ef5d8f29531345_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8e97acd1a3db8ea982ef5d8f29531345_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8e97acd1a3db8ea982ef5d8f29531345_JaffaCakes118.html
-
Size
16KB
-
MD5
8e97acd1a3db8ea982ef5d8f29531345
-
SHA1
9621d576c99c70c842431d52bf99f9575f12e320
-
SHA256
1901de69b68279c6f2367be079301eb6cf82f2170feb9935ea1520bc7953adfa
-
SHA512
6401c1c16e9f6afc44758aca51ccfe252e75f04097c13b12c597628b3de8428e43a8b584c8af90748404af08b0fcd7737e48d5034c706e248c95736ff50adc3b
-
SSDEEP
384:x/EGUhXfylLct/Sg/CmcFRsvt/qHfItE9ceHlHYtvY:+GUhXucNCXTsvtSHT9cYlKY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429624564" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000a5e536265bfaaa5b7e97f054cb85e0c3b8593ac1f87935e3265cdf53421f8862000000000e80000000020000200000009dfcf634bc09efe725823ca3554499718b486ec848d4fee6a02e09d82650dcd720000000c102c41ff177f0c20199ce820bd55c867a3a6e7d733a29190d21220cba51189440000000699b54a02f52cf325f6732264b45bc8a35928802ae145df546c015b40fd7362eb2a9688895a00f0d654a4dbff9f694bcdf31ea89610c9bead653c5e51b792aa4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c1b832acecda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E0C56B1-589F-11EF-B7ED-52723B22090D} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2704 iexplore.exe 2704 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2704 wrote to memory of 3016 2704 iexplore.exe 31 PID 2704 wrote to memory of 3016 2704 iexplore.exe 31 PID 2704 wrote to memory of 3016 2704 iexplore.exe 31 PID 2704 wrote to memory of 3016 2704 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8e97acd1a3db8ea982ef5d8f29531345_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2704 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ca97ae45c8dcbbed530ff41cc2ac578
SHA149e410ae760ac5e7dd4ce558eb6ca0963757b7fb
SHA25669414bf7035c31f91938c2dc473dd890c0af594f42cad95fe037601bd0fe076d
SHA512aed66f930613c899e1c248c2e42fec24bccecd91bc4026cdfc04f0c3613405e32aac68208f921a7f09f70b6cc1dd39b8cc653dc220e810e6ff015e29ba992e9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5501ea24aa69ee3dba6dfd629886ff32d
SHA135b2893c72e87c3928b3869ca0b70c71b15bf427
SHA256db447b75e436e4363d52a12c777f4a7736e4307c3527f1faa91eed6cea4f5d55
SHA512c5852b2ecc771af6a52ede90f083cde23d1193870170e01bbdafb6959910b97d7de7d00ff8aea646a247533338ba53089abf4333db202615ffb0c7ea5476eb57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53251bc55389eba68ae6fd6fcde1e3238
SHA1c5c3dee1360dc4b8a589a5721301c990ac5016f9
SHA256eaab8c756e68a6942292cfe7b061e891c4261e7e49bc88bc7c1b55e572cd50ea
SHA512a184b68485cd4da651ae7d0180a909980afbd44bed874ba000dd84dcaab9604662ce91bf8264b1479385e734845a9f7aeb0c579d6b9a02fcf96f15309f4137cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556d7c6accd8a55cfd2240127f2829f44
SHA180d143d5cd082232344486fc0e96168b0088d166
SHA2565422b2c12a01d34deb46aac84669c09d19622ab0f8fc99ce79006576f0f6dc5e
SHA5129e81a987c6de2c025e08509320da6599f3eee1eae943e38538fdff5e45fac7ef593b3138a57135c76b959ca8752078d3cfcb6152711083743323001f0846f99d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57832657dfa2989e478dcca0b83444808
SHA1e6e5047da1f7dd41cb5a333c229e94d232a143d1
SHA25646fadf3d03c75357cd877e5634888fb53c6ad826363fb0bac4248b9fc765801e
SHA512f384224ca2d24f28a86d2ab49aa36fd5109de0926fb2bf22e0f2dc4c5334d70cd88281b8ad114b3bca6c52ccc1d498278c37fbca5c5026396b29ef0ae841cb19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb762e2184bb51a011c311a52c5fe860
SHA11386c96f4e21221d724f92fad6e7ccd416645c6d
SHA256defaf6033346a7c33bc36c3251a4347961a1210e95510ba1d425023214e135a3
SHA5126d243a0b6b2797910dd496ca42757929b63c19e9514edf7c2defa4fc678ad2dfb21658c9563ca3907dd29884a66f623c1b0f990fd465ff27a5a3aaeb71033f44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5928f5ee429af55f80e85c846f6852378
SHA1e713f059ca8d54331c98c6a1d58d0e9e6687fdbf
SHA25642e13b39c130882d223b36bed24b137aca14c42882858278661126261ff60850
SHA512b9439946e89d1eb036774904e44c1f7aab5063ce44921e552c79bd6ed68beef96c9d47f872510b8a612f88332d9b3ec8a0f20fbdd4d97137523333b461efc788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc8f6972d70296910b48f7a7a80b7770
SHA155608c918e8bbddb0760cb1a365c0fe5c4b940ec
SHA25624f4f2891a8ceda9faff84f48d1bf0ba88d1d83b3f4e7d8238bdfe1bc589397d
SHA5122fe89e789baeb4632d5eacdfef4f40847229bc1a4dba4ae0d8fcc8df5362c4a19ea22be9fdd0aa653d45fc0a8d12e9599481ea56369a871aae2f2c8ed221bbbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593cd7c2e69206d2b7b36cc285de824f3
SHA11d3087aafd2039fee6ec6435509a6e0ad6ed314e
SHA2564cd3200900e0b8f32538a57608bdfc6d209b5001f159dd42e524deb38564a5e7
SHA5126ffb35f388e532bddfed5fc40d9b13f47170735f0297113b7f388c02a1c020db3c083c93bf934325889823f0f468e8a33fb6d26890a4b4a1d23da7cbb6a8fbb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b98c9566f97b8266cf871884dc7b783f
SHA128ab09ab3c07c6f0b99443f0447ae4905fa60eb2
SHA2565f634f136c90916e685eebae9d8d177fb1f0d096b48170772dede85970a1eed7
SHA51211967e692c7fc2937ab35d5b90558f485a4248ee26b44e7a6014318eb157ead1a313f90a6514942975a46d006521d33a5f6c5008dc75ab8aa586f98a96f73d0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdb07b2f78454eda66c5de87133bcf0c
SHA1116f198a16fd0eb23252d432b2c75438e6abfe3a
SHA2568a2e61397d9bf087a6e354536dd4d6aeac53f9be79eb98d06f473b9b3599fee2
SHA51278a9e38596c56eb55b9343e9b7ca8a52b4adeeb9de5e4fd68a2927dce69a99943dff4574d66235884f17641950fb2dade46f918fb91ed0e4d322245ee813f07f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac887a31fc1d7657136b4916d90904bd
SHA1b56e2d662eff7a820524b9b46621039c45c8c5f8
SHA256477c5f05d73809b06c82c76abf4b8da27eef5a2248becb380ca1604b8ac29e4f
SHA512ff38fb0036033acb5ee6c334850e9d44fb8aa6ffa745a7158c93fba3507f084ae97616bf3f21c24f362c46b7b08ac1e58e4a007f421b72e4b42a17c0988ea05e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcb224f810b7614a892ffcd944d59690
SHA17afd1bc61d205d8ae606de8ded2582e07123e796
SHA256aea49acaf5cc1d4b4b6cdc370b70b72261205c821ba10bda404194dc2e12ef1d
SHA512f5b09aa7b93b484a2545550777164f7a2843fadbd282af0bb4bd0b5406f996ea515cdd0aae196c68dcf210f71203d131e0c7d3add219a41033ae6541b2bfedc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57775af140d06d02cdbb53bad72be2dc7
SHA1fa2c2e2f9462856d39a65a86a59cf62f06026667
SHA2568a0825c49b92dcdaff4926a6e4725fce7f2cbbe0bee545ce4054fc8a976c7b3b
SHA51228e734b1d00852da387254b007673bcaddc08b3ca654a073a5b1cfeeef1447723b4ab007bf9d9dcb44fc8659ae4d183201dd84159408855481e7880a7d3dcecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df5be76ffebca694178df566a874fa63
SHA10e35ca0c6df106073d7b9a6bf8e432bf62e31e3b
SHA2564a2379b2dad6f57600f8eba5bf1ec37a5e18f3aba837606feaf224a53cb412ae
SHA5128f43f67bee36747cb5fc7179ad2e9f958f67ae4f700de6d6f1289f948188e5ea243b05cd066319c23c9b653223ca03d18c49800f829f87079a6ee8de08778e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fa4f082c11f4a2cbdd079ec6591e243
SHA1708a92dcf63ef2ce0d3c6c44941def9a379c37fa
SHA256e3cf06ea2fbd7c5a63c7cc439e553fef3d3271a358ec3b6624d47956fbdad60f
SHA51247a6f0a7fa6d48590036b726105136a4c50b54dd1016ee0e54f61c37e6357118eb0ac3ab4ba7a464a36172506870e1a7667c50a84b01f645471082bb2620dac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586cf103c92891aa63bf570995bdb76f3
SHA163801368b8e119b1612584b746a1142a38742f0b
SHA25664bf91cde4311ae19d3d4b5572724cc533d87f57f17ab99312942491a9cf570a
SHA51246a9263b31992e43907bf29b6d69443763c5783e32be09f48bd7983e4612b4f244a56c5d41c5a4bcb025741f513a4f11c869651cdb80478e507bed48103d5d8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b92db605d276757c927c79990a768e4
SHA1128e65f5a18e39f751b88862e4d2a8d0dcdd4df3
SHA2569127eb374f097d70da399c80ac68b159f7e65c20b4964a46dcfd51aba8bf3dc6
SHA5120c31cfa5f0f3e47415d3d2e36bbf6266c212ac3310f9828ba48d52cdfa52bacf4042f1b3cbdaa489546f6f88dce3406d5bd6df8316496cf4ae5747436b8aaad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598c5dfdc1f8489c474f6baa84393b51f
SHA1678b22755caf93b860f5efb3be2f3e508706e843
SHA2563e55f2e7641b827b017f030ee21b36cb0a587604e5e36567be404c0a20afbbcd
SHA5129aa9c597e1a092b236a5347a5c2d67914c61694607f65aff0355c3eb8c6d90c4f94dc00a3cc6e6caa22f84560743d3fd33f9ecaa79dc9132e4215b0a07268317
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b