Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
a015e2e97d3d6e72398cf24380099d52_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a015e2e97d3d6e72398cf24380099d52_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a015e2e97d3d6e72398cf24380099d52_JaffaCakes118.html
-
Size
53KB
-
MD5
a015e2e97d3d6e72398cf24380099d52
-
SHA1
2a424187b31aca79d22c079c13b09c642ea45614
-
SHA256
5acf1b8ccdeb468b62853eee43402dd7229b7b629642f681173ff982c5f68079
-
SHA512
996854abdd4b9c9ed268de6a078de21c098d0f6d77b7964a25d025714dc82723fa0adfaa60703e204dd9d022d1eff13f3dd3f00ad39b7acce773c423d1204501
-
SSDEEP
1536:CkgUiIakTqGivi+PyUgrunlYC63Nj+q5Vy0R0w2AzTICbbfoz/t9M/dNwIUTDmDw:CkgUiIakTqGivi+PyUgrunlYC63Nj+qW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9099851127f0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000dfee6ee48eb155c9423d2f5e8fae2cf5f92970e5a3f6ad5ee973725a4f793770000000000e8000000002000020000000404ac848844a6e4410e923f4f6a40ae2961b1c55e9e739b15114d3bf80532fe620000000fa03a8f34bf0a9b91cee514a5facac8b6bdbafadc1dd7ae325193a10000d04e840000000aafaac0c49b13495f723b7fb641004b7a7be1d65ddf8142fe3850baa0ab2f1021168edaf09459af07002900fa8ccfce6ac72b86998d53c6cfb7b68891776602c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430007190" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B829771-5C1A-11EF-B29C-DA2B18D38280} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2440 1656 iexplore.exe 29 PID 1656 wrote to memory of 2440 1656 iexplore.exe 29 PID 1656 wrote to memory of 2440 1656 iexplore.exe 29 PID 1656 wrote to memory of 2440 1656 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a015e2e97d3d6e72398cf24380099d52_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1a32af30baed8c74a06a1cdb4b4ed49
SHA148b852e8ebc573d94a3d8297fdeb92573ef4a44d
SHA256347da3ecad851cc5467d841a0c8447d64f93c8dace1380d2ff711bdfa52228ee
SHA5122beae164a144d3abe0268e58500f24238edc5a936de48c76f15a809998a2454ec745d68ce61db2818f50c8fe5476a96d3a089210f27411ac3040f63696830a65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580f24e3ad82ff285bc0c8a49e8993dff
SHA10ec2a3fb63ea201fe267fbddf27cb2eb82f5b3f6
SHA256f8187ae0851a06a6fff0e09dd296737bb80434d0efc3a245f27a8978f8fa2424
SHA512158fe7fd17448e25aa67b0034103d6688fb9968113313d4c347d10bc097bf4dcc3d87c23e1d99345021863846a9f2d6b35b5a7ba8fd8ec2dc3a3017fe606b487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c533c30d01268c3f2af910ca71c26d0d
SHA1f758d248e88be17dbc2f9807ad27ff88390ad1b0
SHA25662a940f5d73e57544a6019970ecd9986f7b1fbda81d404f9fa57b1334e8ecd2e
SHA5125a10c05e720682a7f721362da87263e9dd1833fa80b3ea40aa7239d032e1031543ff18379c557559fbf8144a2a36af5b0585aa4c4cd2fb4f1e61d3c7b261ecf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ffdfdf3dd3fb20ec92a1f26697b8deb
SHA1555510402fa4fdc601e3b4ce32fa2b9786467560
SHA2566491f861bba263d064d03a7d929e7bf32d494c2f43ba01c0ff3ccad617cce361
SHA512a38315d71ddbec047c1a1fcea75efad1c7318d56537068aa7fa832b7fa8b5452b743b022bbfa5cbc42feef20c42a3783d1a94990c93523d626a19b548df33fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58835634164aeb0e1ebe0e0854bf2ff8f
SHA1670620b2ee4349d0de7ab34d5ed8f9433c6f5e8b
SHA256230803accfcea82dae1d37121790b9a3c7b7c239bca17a349226d1bdb7f293c0
SHA51234d0653f2e4580cdbee7338d37c5b842075802fc3dcf44591e60888f06588cea94cd683e746b3d86872087e68a9d08808993d7d4d9ca17ee02096fefd3bb1ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcbe3777b0417e69853676465bf92c9e
SHA15f7d7082b9c7b4199a32890bc91d4b43b6ec2d26
SHA256f498355037970780e8dbea19c5f70e4ea7e69956e78e1b4242f4de655fa4c773
SHA512a083245c45e9c5bfcefcee603ec2b8e04ba4e6c8701672e7849e989df7160aa4104fdc9f2920e7c0d90d5f9e505e990924f90679d9d5c9a7a489b68fcaacba5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b66d4aac88864be46d3ffb409db06c4
SHA120d6a4723aa0db0cfa97e25eeb7cc32ac566d98d
SHA256f70d720fcdd010844b1110b7643677a31096c3230fe6968c25755cc11b2fc337
SHA51225afad8e9c3de5296f31873b14d7d29143a582180f9dba41fc682618308ff6f750a094bf8f3757f1f2e5d804f7db0b7a0bdbe8cf0ba777c6ed9add9530a31acb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5bd869fa3250bcde17002a5cdb12f28
SHA198009b9a2a76f9663f81919cd9c6a055a5930e59
SHA256b2766842e2d2e2169f8f67758e79975611cf89ced0450ebfba93628fb6e569d9
SHA51282b6f4ef8aa44655e1bb7e68f2d669d3d1a175078240df6232c97b885dc01efc8f9bfeb2d4b057d1030af5a985bbf6e9aa72558501470e21b2bc9b1a21742a9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53033a01dbf13ccd8e05e893f39291778
SHA1a523a8295024b84d840a8c41749e49b547646e49
SHA256aea9aa0355121939094cbb8550f874bb633ddee923d29d0bbd6cbe2f3b3d50b3
SHA5128c36f546c32e49456d09543f089ef88d1d76416df9c6b32bdcdcd373c1a408d51fcf9d5149e192d7c7b4737094a8876bb584c2142d074e13ae980b6c7499a1eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5c6bf1f7b304a7915e4a6f3ddfb1934
SHA10db32f9bec666298047d3954c31e25e4515c7e88
SHA2564637a4d22d86a4c04979435d4be8fa0dcb3ca1a80ff726a4f27f80aaed7b50c4
SHA51286bc42e6733045b1afbf3f906359784cc2a4482970824baff448462213a2f353ed351efa65850c7827f28fae08653e23b1cf4119b97c55f6744783c2bffe7c1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e0a9244b0db7e375aed43803c080f42
SHA1a5d40e4ff70d4b1bfb5ffdd0051285c15d7f5053
SHA256f136a4b83ec913ad477c467fbd8c386c1ae55f740dedf79956c277f627fd7fe3
SHA512fe2b6e991a7ecf2b99f7a0d0b9a9f8564bb230511914a214adf9f9ec733cdf1029e74a0e8d8a000d676c2fad8f0225438244a633cc86a2013c5dc4d009c56dec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6ea8be4b0b0ca9f244fe8d3ffd2e81a
SHA152b5773e1c13ce5989f285cdf976b3b87c9ec247
SHA256a8238f66b7384a97ed65b8dcb99ef61583317794ebc8f8ed7504ee0760b1df50
SHA5121e451a525328413dd31bb2aed028857ef97ece9f4b93d07031f5212016d379d75ffe22f844e25df89105b78cd6dfeb3d3fa208b221bbefd44c04338154265eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dfbb600790189bc887136c422c8d6e5
SHA1d2eb533da583b79eceb0b1407a859670d6a39fa6
SHA256664c0401f9072bae501e75b168d167281165588470470d8bfc502f41e0b4d4f2
SHA512800de2148b87a1749b9f72a411729ccebe9297e90dc1a2ebd1b4f08728715b1f1c368fb1c2c9ae55594c3f03b243221c685a390c8b3f2772bc93b063c1b98001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1212c826daa36a4daf77894c10f5d7a
SHA1d4668322f2dfb58dcffacd5e995ad196cbf6148e
SHA2563bc6d0527c09667e761cb4b33a3523ec9134297890a47cad7217dc844cbd6725
SHA5124cdbda35d2ce91c4bb7368ae2a850ac2addc0e8b7e7f73ffec475476e51ffeb3e61c2c3f06fab797c96c5fbfb34899f5456f1464408c66f8ecef41b60e8204c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59025207681c65a0a82fe796471b139f8
SHA1a9d847457669028cb23345e77bb5ce3cfc9f3d16
SHA25691749e17e4dd618ad71d01ce541019644b1483cc3c92aa220dc7807398686565
SHA512e2e2f7c608bc4036fd17be6939bcb0edc74b52fd66ff4a8fad62b131d5550c364155b4b97d4613bcafae236da1d55e794218989cbea9de92aa490f3143900627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e94b7ddb345b095b99cf9b284de70609
SHA123a9c2f09d47b2ce06b44e928d43214dd3ab1174
SHA2568f97f1f2a34621d1fc74e866adb5c6f0da9c24287b0837b4ee0755fb9028f291
SHA512f33ca5ff6d2cc7c23bc91813c38170dc5f512e2851c9e6bc1d8af796686afef08d2ee9d864383566648ebaac36132229056995257ecd3b4ab0188971787da26f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b83f680fec338082ac2d3ff8d2a9543
SHA1c2ba24f91744d1fd7edb1756fd57418631872b26
SHA2563562aef5493de599dc135bee8d3a56ffeaaa568df98e3b94069e54a99e3d5d40
SHA51274cc85e63c797d10cb8b834a50d1472c3dfb8d99f8aaf5ffce62ffdea0de76e64b26e2eea54d4da6a2d59a0c60ea630c3dd36103f75e3ced8f340f01df76ac12
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NFAY0EOS\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b