Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 15:00
Static task
static1
Behavioral task
behavioral1
Sample
93949c6b4dac748b542887c35f2fab36_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
93949c6b4dac748b542887c35f2fab36_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
93949c6b4dac748b542887c35f2fab36_JaffaCakes118.html
-
Size
1KB
-
MD5
93949c6b4dac748b542887c35f2fab36
-
SHA1
1af920a9c83a48ab4b6c5fc98d404797b8f13b5c
-
SHA256
6adef17674662fe5c8f63d8580aed19e0c5cc0723aa83052b94809fa68c7af75
-
SHA512
6a68cfd6cbeb25bb4a91a4a9da4697a5b3fd91241af99f5fbc29b45a84f685ef19167a16a907dd856ccc3f2246d669944bfbd066e2c02881bb525157c61529ab
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D9044EA1-5984-11EF-B5D6-E21FB89EE600} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000002bea229151a9aff4e6aa022182ce240ca481a18703f7931f4d5ee5d282aa8da8000000000e80000000020000200000005f2a2ba8ef6af601d467cc53a01d6c2590753c50407ff66a15d06b847d73113f2000000053ab572d441f63726533ea03ddedde50558e8790bfbd02e91bb6aa8d8a68858b40000000939c14854c6ccc205dffd3316ce9463f3159ad3c09f8cfb5ffd74d1f3dded1e67e01123f4c24a4f2605d884fea47f9830078cc19f21b06737825e95704cb60b5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20129abe91edda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429723126" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2704 iexplore.exe 2704 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2556 2704 iexplore.exe 30 PID 2704 wrote to memory of 2556 2704 iexplore.exe 30 PID 2704 wrote to memory of 2556 2704 iexplore.exe 30 PID 2704 wrote to memory of 2556 2704 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\93949c6b4dac748b542887c35f2fab36_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2704 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53783dad969ad718a839e47805b25753b
SHA124059123387f306285ebed0a08b367a191d16b16
SHA256fa057c19d56d1f75c7129ed9d8e445535a7ee9e6f359d596bb5b471aa50c2457
SHA512843b963a990bb1b7b5f9163ebda47842e88bc1fff87c9de07174a7e7405134cc9482880c2dc5a5fcc32c7d01bc5fce5c9769dbf2e2a46b2c9c9f1e60c8f06f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df5f77cacb036f0e3f000ffd570f08a8
SHA1d9a70162c9b16aaf45fffd5f81c351819906591b
SHA25698330d2135d63d209fa21daa4dac7fd5a6f5ff70a5ace5ce64127a180b3e819c
SHA5128b187a259a1fb5434537c3365662082c3eb11babaeebda6fa9d764873b67d317c2eab58a51ea894fbd68f8d76c05e6485c1724dbf03292cc78c8628f06917ad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518b87b440eb94a5278498a1709507a92
SHA144bf7c41e979138a7d635d7f13791f76cf2a855b
SHA256bf114adce332b4e89c74a91aecc6350ec90273858aed11eb21d1743ff4ef9fde
SHA512f9d059b4818dd684d29c976c2c5d4ca56903667a7fa76e4cb1d526fb8994865d49f0bb2bcf4f4abfbc81453d2c1bcabaeaa0686fcef427e63b4f3b43561e8a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548bc53f210a52250fdf6a21e80c92ccb
SHA186b3b5969d44de772e149d85ac04fa7c92f71e40
SHA256115f59e8a0385640df81801f6f10bd8bac5f75d0c63a4b918bfc39c4c92e184e
SHA51229024601387f8fa8c9308cce61b49e6f71891ca33c48cd8b15da5412c806722e25aaca01e108e8e0a029e26763a7720766c59fcb7bd28724e687e1e7482d9f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584a99d3848299fc9575387b152ebc128
SHA1e4238a82f8f006e783907ee5f65e7432b8199da1
SHA256465faf7d0b72dd1b068cff6bc5c6ad1799151a39d5ba641b1101c67872cb597f
SHA5121d32939dbb5ba591860cf58150c4abcbd3efe3d320e13bc42f49aced38ad6fc01745a702b8fb2667475182f889d7aec22405b3445a2f5b7007c4c107a0d39442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf06531b23ff354b62afb3b697bbc681
SHA11c1cb79023e3da0b764c37809d569e26f9df6b72
SHA2565832206855c5f5ccb768e01d29f90b3120db98ee92dfe7b414e6e02ddd31b05f
SHA51289e5148b21dd65da3dbc7889a8352ab89a38f43b21519594091403c44af8b73823854e9ab268fdec269863c46794a0fb2cde97b691be09125fc6642ddb19c82e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a83b76e6596f431a0d29d6654b9b3c0
SHA14fa800801f6accc84fac5f109197b840a2449f83
SHA256593f5cf68c5164ee674f6ee95b0a985ce2f9b2888073d0d232ab8c27f60b3b31
SHA5121083faf2a6344efa0cf26afd81e336ca9344d1a595632eca83f86f9337a8056f6f948cd98b33d2ba3560a7fc6380bc7be327ccad861f9057fe01dc8215fc5f93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1f5e561fe89b151c89d9284294d0386
SHA1f9fe7fde16efd8b78f1f95e09daad19b5fe796c4
SHA25650531d0ef5ded381907cc0eeba562f822c43a1b4599718aef693145ce00e701b
SHA512bddf9fa1dbd3058ec4e4e91a2efc808e2ced6163b9c4d0e93286ca1735a67e10b6286249a42aea33aefd356a04ed3d686fb32eec10ef53fa23cad018785476da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507f112f09c218f87adf906ef85b64466
SHA18ddeafbdadd81e23756bf8dac0cf3bb7ced5b12c
SHA25673fbca5e91098827fad78fbf590592ee89500082140810ff4da47e04d635fe75
SHA512e805686f9174055cadfb262d6c59cc3e4e809aa16c4bd595ce34eac2f2fb4839b7758096dcf4680b0d87c0c832be5d563d24d30fd232c9f2c0fb5cff7e9950d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587c1036039da743326254b3cd96537d9
SHA12875112e025c95c6ca887ab096d00b09b5ba9469
SHA2565afd6cf9ea685ffa7e6e221ec147775af2611d82722289e26ab3eb13ed353e1b
SHA51299b85f234fe5c4d6ee3616140c301a3e82a0efa0959096a5e80b10f179822b741a8bea74707b9cb96035d1782cfaeb5749deb2bc834f233fb54c4bd113e4ab9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ea881ffe372d0ad625ff9f5d0ab064b
SHA175f3837f87ba22df76964378c7575011781d2b4a
SHA2564dae9d46164eb1bd57ee2fa871e6d7bb8cf005d35e2191cc317f784b8eeff1fa
SHA512d8488c73783501e7b02f517d1b4e6dce4308000148212f5134ef0304650ff6890cd972848a81cd78f58d8a0064d164ff31e799102833c13c531412100568bf68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4cb0edad5079317923d132232acd69b
SHA142f5db79c5b95f249d59da407188035e48921e84
SHA256c9f6d197e06364aecbc7f62d6c93c03e6123fc3d2e198de9c08b6d95f19f521a
SHA512cbdb947e0a79750822acedbb3eeb2d8b6da2fa595c700bdcfb263e92d3a585b9d5291818c8fc6e85ca29e5da44d28ef67c69874d763927b0182a35f2f039b9a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541d184c7adef628615ab75e94d6cb8ca
SHA1476db244b0b16ecbc480c7e4e333e2a595d70d08
SHA25652e3bc16a93e8c804f97cc113655d2b1a3088cf371815d8c5a0a61e78bcbef96
SHA512961053b1daebc062b331d10c07bd42bfbb518459d9e81316955b8dc74fc62c200dcfeb51e8c360a2ed4e769688b5af10ac639cce393e6117f7ad75282d00c97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592846213979686f26c59e0519a23594d
SHA1947b67478403aa91000d2cc53afa6bf51795865d
SHA256abdeb7365768966afac77da37f92ba896e754e9e7195bcdc4f91412c8a09fefc
SHA512f9555e034d9d9d20b7458440885bc32225d60206f249b950947c45ca1667bc4c1b53f87cfb68d4ed5626c5a921e102e96dff6ede9774e902ed022698d92d07be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d3e97e14107720ab87c20abf677653e
SHA1e352ec610b212dcaf6f9aedf1b72bc25b59f1714
SHA256b5f72d1af4a3de8adc0ee05e4f07753d4560340c7042ebc99b1832a29a2e0c45
SHA5120f197fbe78e7304c2df5ee4e4372f5383f5ff42499cf08ecce39f63e385f9e86c90261243d1300a5851b48602d665b390f0966741c3aac86ae0339b421eade47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5078652b31deddd7f3af12ffeba6eb088
SHA16ce853386235f14dff97ac16be5d734d18f1e360
SHA256054852f0613875010f495dd19e6ce86c76ddc24b0a00c8115531c5161ac19902
SHA512e392341fea45cdb49b6dd81c4e1cd6dae68055ef6c3ff768a88eb65f6836c818ad3be8f3fc10c969e34bfdc92a56c5b79bebcd9beb1886e7b3b0c9b5d2a716f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d927bfdd9a104ef36943698fe92b8bdf
SHA1ea246e5f8b8aa365e2449f92ccdc0fe013d81efb
SHA256d3705679f2b2351dbd77c74426fa88306fe08e741017fb383cac004f4530ad2d
SHA5128969a89aa8f4b1f7646067ddf6d9591daf918b094a0f84174eb1df414c8acd4cc7e814546f266e7f0549be7eab1e63925d5076edb4327dee2bf5c014b8fbf4e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f13bdd7bd3ff25beef7caece57e41102
SHA1578b7db2f0ccc49f47f3e8fb7a76cd51f12192ba
SHA256241196f53b0176245abe31f7b7f8f8aa9a4a20c25cc52bf62409d5ed7e5cf526
SHA5122ccd8c9e16f77ddf0870ec9f05958c317c915745489dcd6a5294fde5f81546c82cf3447b06fec3fe25363f52daa2c8ab8ab3b7579bcb13ebd92596813940418a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502d1b8d371f1de92f9010f5f995d6af4
SHA1b4924897f91baaa13cd2d4cf4011466cab9b0fa1
SHA2567d653427da691a1d39d5b46b958bbd42f8b8d3868a963f66badc20390d80edea
SHA512fcad9727018352c5d479876242ceba3f93a8e1fd9f290049952d3b07a5d64d1ae1f6586dcb384250534750ac3b37c88a9813d434b0b5bca416a5bed358fd6e1b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b