Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
8ef48f7ede30661431d4518e93786bf2_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8ef48f7ede30661431d4518e93786bf2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8ef48f7ede30661431d4518e93786bf2_JaffaCakes118.html
-
Size
70KB
-
MD5
8ef48f7ede30661431d4518e93786bf2
-
SHA1
a9984b4e1fe39e64e7e0f1cf2f8274b391db908d
-
SHA256
915afd30b3f1e89730f7a8a54c99c81d72675a1913af89a9b6dd96c2e9de962d
-
SHA512
30c35706c1c83a2c2d92756db7c35f53d5641a5e0c75f701fc01d21e1978212daf5ef9d4dbb43a8bb258e1a54bf7f5d3d5d8350371f237bb7a4284f37344d60f
-
SSDEEP
1536:gQZBCCOdL0IxC5BJAjXQjNAFqIp0wRY9jl4YaJ0uEwh3+/y3Sl+IfL0zd3B3cTaH:gk250IxSAjXQjNAFqIp0wRY9jl4YaJ0O
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429632182" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d09057f2bdecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000f2ee75a42aad424471e051061fe10237c12674f80df77bab2726455bbf89b52e000000000e8000000002000020000000205f021ad6d44ce520866b33889f603ff6646f3f7bf0b3ed0314ee4fec1c874b20000000548393971f99869339c2b79a8b5ad1be0b64acdfc13ef605d56d48a1ff28869c40000000bff08791a948bf95def8468893fb699ee279d6413355f7d3843ecada5d3f4124aeff25674faf7a97daed3c4c52a8c89db5b087cdf6c9fc4b00a8fb347192b93e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1AB9BAD1-58B1-11EF-88E0-C2CBA339777F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 3004 2088 iexplore.exe 30 PID 2088 wrote to memory of 3004 2088 iexplore.exe 30 PID 2088 wrote to memory of 3004 2088 iexplore.exe 30 PID 2088 wrote to memory of 3004 2088 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8ef48f7ede30661431d4518e93786bf2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2d55d76fe2248f9f7ba2e06c61ffab0
SHA161b3ed8f766a85caec2ac7cffa6b6edd545af471
SHA2569f70da91d69d93d34d4c9f578a19cd2ed4b8897db022c074e83152a31f3ca981
SHA5126d4c9c9f1c6ae08e3265724d2acc3d15a141822d8a69b030251ca6630a2693c19dac6e6dfb93ad5daf8f4803ab9779e35dc2db1db63d92479dcfcd16ff643523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5400972b946edb2fe255197348dfddf08
SHA193cf9cb245a7a9f93e20272c9bd509b863ce3df1
SHA2569b2bcaa878182f35c41f3d7018b86245412d75d969dea972d2cd09c6e15a1dab
SHA51220f251202f3b346add255349575f4a7a0d39eec237acf4f12334b6047f629e1d3af7f872c083a1b7ac095112196a24da671066dd53b6c01cd503d238fc853148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aab93522731c7be4e6b383a8fc6eb695
SHA1fecf39bd3ac6531e5653cefc218aa43855c1f301
SHA256cb831e147a14798328f74949f8048ee53a6ac26924cb42449053dab7fdd69916
SHA5121d4ad91e357904fa030de844eec1b07421372ceb5ca39acf0628f08ac0a654a7a6535405edbe1ef45ddef40fd659465c4010b8ae5915c3289d3acbfe8209ee0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eeff87dde55d262e2d8323aa1e79556
SHA15a3180fe0117801683812479584f6c60172b0fbf
SHA2565acb27b0f9190eef002350372e877445e762439ae6c41915c41bf814c37edcf2
SHA512bf186b9b442f049484933d6de151e8d6b0fb21ce036e7adf43c8751c72a75783889c27c49a82202e9b48ffe2b0f47d435787a485325fe654d178f3b42de7e9ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8d8641f2842bffdde82934ab6fd66d3
SHA1968fef7a5590a4fc0a88df4a3cd2f6e34fa10f7b
SHA256deec8cb0cabb4536613f3352834cc35e801e970fcb4056a111725a0fdc7cf158
SHA512f4b87afc23f534528140ecceca9d502a544a6cbff239afb686235d7bd1123594378d74c3ca5d69e3e968e6fb5d33c8c08964743b9cf3c41c4214c386cb208e31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59072a463ed5e9e534efc102118c06b33
SHA197aa050c51feb375f399621d6ca49b07b4b3e830
SHA25698ba710cad5471e99e6294d31523ad22039d12bcdf974dbb79adbdc85a5430cc
SHA512f98b04e8c2d2b5144b7c7b5af9e342e2d4dca645250cc87c3d5739cf2872a8cffb19831f4b55bc2669465d621ec3cc34a6d77375dcfed328b21d971174cf30ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5292c4bddfbaa9b767852c56447eff9c3
SHA13feade1ef0f975a064290fd12e9adceee2e01f3f
SHA2562873e5b0ea0a00bb73a1addcc06695cbce3dca37b0fdb3389ce21b033c5bffae
SHA5122f27e58fa1f8e16554efae4017b2d0ac433dc45166f939d4f9b448f1b69eb8ab944482223685d5184ef4527e7f85e492be770dd677df1942574fe54811b6af2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546931d01d8931a171d10b159be9b7d89
SHA1b3b1ff51ae2f8ad8825b990c4fd28f735f397ed0
SHA256ee00d8befe650d766343ce9d23a48d04d64dc83acc26210c98efc3082155e8a9
SHA51289943de5a92cff2882ea03eb8e69f9085aa563d331178fbee926801a62f82117d2f7768395832268ab343a04c85d0aec2e6350dc340be7f41b55b45898480cfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf465c11563a4411890411450cde682a
SHA1cc6db6eded0b6bb1b919448916d299e218d60e26
SHA256357130cb431573ed20f6e9cfb2f842d0097a86f7286a4489d481bbe60e10da1b
SHA5126887471469b4e9edc481f4175eb11568d40ea8a116ae496b804c93ccddcfce983e7035132fc87dede77ca378324de12b6764151859d8f3456a2032d60aef3f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d48865e37531d99a928edf751a063040
SHA19fdabb1e210de42a605c3367d3f0f96981adf70e
SHA2569f37c77d83cbf4dcbb961a436c0a6d6d33284f2c5ce33780cd9817d09de55c62
SHA512a397489ec7120c4e9cd277c29e9242aff22ce41f714cb1e54e5f4b5a88b72d24b251a9b0287bfbed5828457893a61226148362a5cefc6b1e4c79815d432eb308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f708c22c4df1d7e2cbcd14273c46b00e
SHA1d2a0caaa2eb84e8091294da661733b37a8d35cb0
SHA256b923845afdcb55940ba1099f9d1d1e8cafcfcc5b484f8e52b84fa2afa46a50cb
SHA512043bcca562c6d04d9eda93c14c2a9190944675f9161c071847024d4cc9522cc8a8c941acd6daaf27290edb85e644a9d79c2ba6d2fa240ef7974347e9ff1f0ea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53500c30aeacf8d9bbd933bded0e96d7e
SHA1873d8de26bbdf1b3a1014633e336ef5befbd8056
SHA256231485cf7b8864bdc4801a6f2110694e5e3d6f410788dd502493e5edbcb952bf
SHA5126332afd1e1a254f2ad59d579a241abb7b5504c88e2e0307244d20bcfbd0894bea259d0adaa9061a71a7b5525122bb21a66dd4f993e0d5e32a6ff3a3ec514a893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59af0709cc3eb76e1d4fbbea083f4fcb3
SHA1df419598aa6a2b190c861e26bed3e5ecd709e2ef
SHA25653c459eba2e3f4e362730f024ed5b06ceb136b0d4b6a77f125e49c89e5f297a9
SHA5120c9ad9d494a25b17a103f031dec51f42bbe55e517c7133504459b425b055b7c022e2abdcc0f565be52d9a2fdcdca2f1fbd23db2ef6bea42baac0d0ba1e8b3c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f54841429f3896f6311d794cbf214749
SHA17a615ed2d9a490fd423c6bef9963a9b9477861fc
SHA25655ce16880505ccdbe0479a45d3eff05fad1558a3e5a4215ca322333b8d952c66
SHA512bf2c476270a57e44111382cb7cd8b2760a2f6c1f4b2d51528851100859dc1300274729786f15ff16bc400945d5df8c0bf6ab9357cd8c51752789dd047fea48ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e989d2bec23f45a06bacddb9735a15c
SHA157f51ae49b26b6cdf81c3e1841718f64982baee6
SHA25655d001c28a214231aa9d8630ddb002350cfc22e1d8419093fdd8489a048a5a03
SHA512d58611b585e9ebc893882ff77f0cdd0450159e4a90544f437d53bf0425148661cfc817631abba67b2c65d47e169ee323a73aab5f804dc2fe3541477b2983f89d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5306050cd4505a1746f87601e1e1cfec8
SHA174261679342596e0c881b4c60a63dd27a0c10e15
SHA25644d89fa03930bb87b464666b1e9e30403ca88c7c7d3162066b5405660b5a9538
SHA512572312e15a26c58ee3e5003c1740b7eff825de400173b1bae16f949b553ae2e76e9c7aec3449f23c831c801320d7c05ff9506495ddcc9cb540098621c3059a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51929a6790402e3e9f7519460515a3d77
SHA14e16a9ee62bf728c5f514ef2cd31cf4b882a96e8
SHA2569a446ef26d1673ffd8815a46b621b4d8fdd9417b0c8a097b80d551998e0af774
SHA51232987198633e8a06222f976f1e264caebcc35ff4be7762e6d6a0ff0dd60df3fcfb86c8becde8f9d69895c20dfcf4699bf2075481319c89349a1a47fadf73222c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d1bc0f76244eea17e2e1f8b04a5cc3c
SHA1cd6eb27ac15964a1cc322442ed6a9ee709019214
SHA256cf6f0c07f6e8843a5f3b54f8d3b3fdf308da69559a3325580e8112f5e08d34a2
SHA512a3c9e1cf0f48f21c03ee2a8b1d20cb8516caba6b60ed66b2238d040fa78e67574824ede52a75f51d6eeba220dbfa5bd0ab8dd5e4f71778e33efb099e09887ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a5a4ddf3657ca04194c049c3c244300
SHA1a100f1598cdb2b4b2d0ab739eb0427f305af8d56
SHA2568b11af85e15e86504314529eebd8e3e821bfcc569c3ec4841c30978086a08075
SHA5126925505f40bfe6dd1f4b4f05db5aef4971baec907b89fcac23bfd91315574ed13c9541f251e4f392c9ea620693a9d314589a84b06aebbc5565a61b7ba89a915e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b