Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 17:15
Static task
static1
Behavioral task
behavioral1
Sample
96f2b84846b4b8832e1d240588569a00_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
96f2b84846b4b8832e1d240588569a00_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
96f2b84846b4b8832e1d240588569a00_JaffaCakes118.html
-
Size
1KB
-
MD5
96f2b84846b4b8832e1d240588569a00
-
SHA1
01621c2c807d2899dca9cc301e86e30e6665fdb1
-
SHA256
66eac25ca9376293f0f9c0d5365f38a26aa49c840f18844e468529d6bd69c690
-
SHA512
d2bcefa1a94890b521a59e3888a02f655d3d1995ddc4cdd43369f35aaf9a550eb2bc7a81b960d1395d996d5fb46b9ae1cfd382435276ba38ee15f04a3a99d620
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429817596" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000a68f34e84521e3a1658e556355a18d5736be84c387f49d0810590a899201ada0000000000e80000000020000200000001cc649937b835edecc6baa694fb4ed91152f8318b366d661fb21ef965354161b20000000b25e1c77699d315edddb986860757152fdf74d8cda9e49123ddaf9309f38543a40000000fcd43d8626fb4172b9699c69cee85d0a6670ee430e13de6212b2645e38eff06138705e1910bee324dee3589bdd24e674affe46b8f76193c7375a2bea00a595ae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0feffa36deeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CD7EC421-5A60-11EF-B5D6-4625F4E6DDF6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2392 2292 iexplore.exe 28 PID 2292 wrote to memory of 2392 2292 iexplore.exe 28 PID 2292 wrote to memory of 2392 2292 iexplore.exe 28 PID 2292 wrote to memory of 2392 2292 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\96f2b84846b4b8832e1d240588569a00_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5429ecc6fae19ce3450322c2d05de6bf5
SHA1eb03640bc18d5df346359525db78afcd0ecced96
SHA256685f2bb4f4cd07fff1715db7281cbce4e14f0f2ed1ad5aeadf888dfdf66b123b
SHA512f1cd96aebf856931a315f01325b18d4a16d5a42d89ae67f098d84c91f225868b60857c788f8970cb0f6c5ca69ff425bc757c83408dc9ba3a0e10f97684a3cf81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5471619fd5fc491e89b95e9e3dafb6cb1
SHA19afc65ec6c62e6c79018993f43efef866d371256
SHA25600b0701474f770b60db77cca67b005134e04a8681a2c2cc39a4e105926638b2a
SHA5129c3031b2ff21d37840bb0138e6b98121d8b58ef7aa1702e723ba07c71cb2cbcf18604b024428b6206779dcc0be9f1c0d5dc83c894f60fe5a7b460a1cc5085d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5121f199289761542440569fd7cf9e19d
SHA1fa5a162dbea90abc5a899defeaee89ea8b3fd2b7
SHA256f684ca825ed5e5f19e0f4f9c12bca20e7717f619f1ee0d5d10d89fc48f63dae7
SHA512baf4762b290145b4f7986846e2bd74165a91eefbef16ad9f2985c3c97dee0c9b849a90736646893891d43809b9e6433b68b8941aa28a161615753bb4de01a3b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5207790781e4246cfdce28c4afc5eb9e9
SHA18ef6fece52de9d731d7a5ababc0b778aa7f8c4e0
SHA256b608027bec9a3eab3501f53ae4201f64685dd79d81c2b30c6f0ae77c2df664ab
SHA512f6779b30816b3c68a3cd2ef17ca938e04017c1fa4567d3ba702799a1ad0d6cf1b2a9a18a9fd4cbc6751fb2b47bc93024c88201e10f41e6d8952eaf8422487375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550084b191ae0f71ed34f64a34b8a9743
SHA103eb880b013b6ff182caee62ead1d9a64816acee
SHA256188deeb90815a5a7cc0e3372e4a70b54b5e814aadb4042120afa905f9d4620ea
SHA512b5175cf675b10feb12df2f97a3d29e4cd497f081bc7449362dae7c70d13227532415787ee86a0d70002cf111482ea9869eb483ae77efb110ec4944c9739fea10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5805eb75135214ba0a42d28f02d16318c
SHA18cc623b638985973780756204bc5e7419f2b3edc
SHA256341126cb10fce064f146f44e9cae547cfee8d6402289290fa9c8411a03450808
SHA512861d5d0ab0245814675b7d7f0c0db5fd85cb75dd2378f787660df71c34c6fd9cfda9c984684a21eec1628c301f3bddd7650b52386cefccc391f13d42530e381b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cddfb241d68c8537cd31bfe876247b81
SHA1dae9c2fe212eafce69ba7c93dc273be7cc33ad0e
SHA2561ded264389657705d6af938bcadd0bc98d10cd43f8f1dcc60f3016f360f6e368
SHA512720f603b476c8f49d2994248be78421e464fe1a4681db04266423d731f19ddfc8340aaaa87b26c7ffa98c9a21ef7f8da3a1bfee5a47ea95625515f27fd5c161c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbf4684d46d55c36d3cc10d9688a565e
SHA1281e19fd371f28941e491df06df0b5e22f7f7ab0
SHA256056eb658194c8af883c1f708006ee6df31cb11ab877ed73a0000adc0f02e8924
SHA5124c03d7861df45d2b94a6f226efee3cc3b971f0513b1477716dcdf9d2e9b131aa160275072be11e936bc4e26e47c2c0a3f5d5f785a623d3fc58fb53ed7b68523e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af1bb04f69b57fccd58bb0c8985c441
SHA14c506224022d37842f865f8738692c9a3f1a9227
SHA25655798743c5dec253bd88936e8abe7096ee5bc3b434cadd901db05a1739a94404
SHA512d8aab3c1dad2dfb88cca85ceca477704e327691a3e55a0b89bbd60b0b3e191fd89c4462cda902209d135690e209c14b9216d66d236a1240e4ace76a9fecd83c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e145addd63b8619be1a11f5d81355cc7
SHA122cfc965c6e4cfd0ae5c0454f487030ae77d910b
SHA256568108190a65d5d63bd7a0b619f309798f91341a4809cb235998c0d7f05f39b1
SHA512298c2b1aad7f1571a31f663a997a706c51ed0d7590dbb136965629effb2092886df7375073bb2961e13760b803641d267192973feeb8db724bdd23f961b07702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc16168fbf96ee963f7f27d1d86bda87
SHA10bc145c097575d01fbdf7624462e655a581d12a2
SHA256e8d492f772f20ed69b7d6f0be595ad9aa829fab6e777a1edac7ea282bfa70d1e
SHA512821c4f5be13d679080d84550fcf3f1f75546a1c0e1d770876ca2f544919d8904d338e90bc87cdc2a37f3e9207c4a13c6cd80b21de5a77ba673913a866db9c5f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ea7f14a0b08ecd0b465b92bf23275bf
SHA1a8154ea1ad519f00b718a286d893a0c4ee8059cb
SHA2565ceae43ce423d85b71bcc5315a22964ec4585f2522bb209da1f4f49b8d3374ca
SHA512b79ec89462d4a7d1c047b1ff8d071c9c06e55820bcd87435abd7d5484227992bb2e2535b4d6e7db0210e1b93a6f7982a1c99968694a5d1aecc3c6fd2859fb9fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a42f2455ebabb9cfb85c3b8337778fb4
SHA1fd46672fca630bc8ce0d396c569ea0380b938604
SHA256eaf80f4f285b25b499cc85783e4f2a8752c8bf33f4de59320943abd3878191c1
SHA5127ac166e4e6f6c24c7c02808a408db3ea6287630b8461eaddd9d0c527d0ce0f089875f57b1bda5d922d3fef4aa4800b4a3a0563871678835ec174997e9d1ddeac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526461c69cee08c86305159315a8a7a9e
SHA1d5dba438fe025580e77b8f1471c260b8862f2315
SHA256e68f001e26ed78283de1900a37c59ffe86e91258526338f22adbaaff15ffb452
SHA512108152ba58dcbbe2edf4ab024ad0472231e301de7d37771d6dd663657988e0095d155ffb57d7a46f4e97701abba9e88134761ad4271e85b2068788a0b6913fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0c8fbfd0132fab4243cf3a534007cac
SHA14397de3164507b7186ec34ab371a7e69ff545081
SHA2561a66569fdb74d154ea1c81f1a7e2cc7bea8e75ed38b5bb73d655afe14288042d
SHA51254f6cfd31dfb8869fad5d117fb102eed6bb974083ff6f691076f4296c8c801700e46d8c27d685209daf0f8615cc96926880a7863c97f10ec176fbabef4eb712e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dda36e2f0c53f272b31559215498c5e8
SHA1e3d87f81ef928d16bd99b59172ad083878273d7d
SHA256f03594da5bae4bbb5fbc59297fd89177aebe4d3c4afd0b0b3963c579528c2209
SHA512bfa05f9b9f1f54a4d09a5cab3b109530c961c11f7720c02b37d60775c535dbaa29a0ec11f92475c2f0d1f57220ae0d16d3d3b6a3aab3b115a6f4fbb92eb4d23a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb486cd8b80b605a78689a0c36879df
SHA1f95dd0c7afc91e74fb5d3889e2a679a45e434fa9
SHA2564f38f3a82f3e2d36e90cd1687c0006babf8c87e969ccab2d38fb894c6e6b5e56
SHA5126581b4272b0898847362e3bf6b7400b187207479b079b72738e6e84650d96877f07c18e2602be4c4819a637c42e925b6d2c19c8fad43e6b319d0bea750efd649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524b7533c5aa99bf437a47575465fd52c
SHA1c3b135501a93b1232cf26158007dc55cc5072f31
SHA256cc10a44264725666b13312350708874a6ccc846f881e58a5d314af6c8f17abfc
SHA512cd244f59289f246b36b1ec1f3c9493ef535134794d0a4a9deb36c13e9c3d5406523abfb8d86736697e4eba285f5a31ac9f6f3a191aaf6b380ecbc4ef69d4ab10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eb713aea9f3b6afd3c0973d6c659815
SHA130521a5d8b91b54ec2b1008d2791162dca853cbe
SHA2569e6e55afa7c8e0cc36505ab228272ad807b8fdd32636fece2d9cb63b720e0e5a
SHA512ab54c015554ac56d1bfc2c67e3f47c28fce7d22eb926dc226c4a92844108744ffdad70e59d1ba800fe9e1608b55a4829b3862947411a2733e5dbe246619dbabe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b