Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
a249ffcbd623ca06d9f8e2668f19c454_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a249ffcbd623ca06d9f8e2668f19c454_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a249ffcbd623ca06d9f8e2668f19c454_JaffaCakes118.html
-
Size
43KB
-
MD5
a249ffcbd623ca06d9f8e2668f19c454
-
SHA1
d8fd4220c1eb470839b5f4ada23b2a86aaff5c02
-
SHA256
7a22924890187813d5650c7aba9c401a01d8bf322c4c1fb58a5fdeee6acc57e1
-
SHA512
fc7f884f29f8448b84a6dcc11e3178a2cbbef9ede8ef5d1b3c6e987575fdd10d38339f55ca470a2affd2c34d428549b5bdb8197d5e9752539d1f9f59ae1aab06
-
SSDEEP
768:gO3UXcQoPKvsx3S7iMaICjLiR8PfHIbFq/O+q+1Uy7Wl3/pVF7AUGPQdEsxZ8P3P:EsQon3SO5VLLPfgFqT1U7lpVF8UGPQdI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D22E2D61-5C88-11EF-9816-E6BB832D1259} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430054686" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000075f1334e34bb7fecaf568cc759df6a040dd6d90dc0375e06308140560cd052e8000000000e8000000002000020000000fad8f51779215d57204029e443f9fe53f6e57c68c1956f28f8c9550fc14e22fa20000000c4df02f49d42a14c435b0243cd266d902a5e72a8516233b8e1be6484ddc6a8f44000000004cc885e5d9242660fe68104c35721324b18db364f7b5ce8d0c8eeaf9a6fe674eb4d5f495fefe1f94af01125de8d61da2d799909d9081a392627bb8fa4c9f85d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f02da2c395f0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2508 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2508 iexplore.exe 2508 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2748 2508 iexplore.exe 30 PID 2508 wrote to memory of 2748 2508 iexplore.exe 30 PID 2508 wrote to memory of 2748 2508 iexplore.exe 30 PID 2508 wrote to memory of 2748 2508 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a249ffcbd623ca06d9f8e2668f19c454_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2508 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55827d3c4aa8e1256935fbd8a22ced0b1
SHA1b4e262c2ec39d1b0c88b51e37a080ab79a87b320
SHA2562493f53709a35a6515a0d9994afff24b94e2f0637985242baf151056051d2563
SHA5120350c6b4fa2a6d00be14f55d7cee1de8832d9ed1bf85a6bde84bd74f2fd7833066014898e97d99afd2e0e508170b860cce01958398295d79e47d67e75056a9af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1e2bfec3b89656cee306c014003428e
SHA1b26dad09c3d5f3cb83e01e477a1ecf3cb2139759
SHA256e1ec701ec5f98a1ef61d14ffe256f9543317a1f8d651498b98a4c19c623acd62
SHA5129ceafa819034a951cce2732cbca9ea6c705a90748d3ab56cc42a71a9fc8309192848141833133f4cf8effb2604dbed381059f6399020210a8f59059231afd466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505f13cf8ae47ef9c85a457d51424347a
SHA16bc214d64c62f8d2c973bffa834de07c0c534f6d
SHA25657c6cedaf67c3722d6f479bd19c5597ff8c7760df5ba48759c8e92153dd71344
SHA512d37fe5c1e0025ecc3ad19144be3243d76f3e455ebb20dd460370b2c2f7be85598259cff9cbe3e93b253c9700482f7434caa3f7c8a118aa10d8df8ef2387b5c4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5572f84e9e12f53a69e33d32d2b7435c2
SHA168f3f2a54b4d5e6c03afd86cc1bdf4b2cb7c0e96
SHA256286ba0c6ff4bb691907e156e1e1213a4262bd62d6d6d24d6993aa98a24b8edfc
SHA51299cd3c67c07c956967239e83ce3ae2fe71a3c5f719f5f6f7c6b771c949516ee81508ede833544eef79532f33ba577de7e933f679e2424da2abb1a7d558d52260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feacd3b04d6aa45fd20611f374eed781
SHA107525953a7142fad93c1a75ce7f821a2975625f3
SHA256615585ebee4ae4f8ca6fc3d68e4694cc1dc41d277d1a125f50b3f9081fe9bbf1
SHA51282185260a53902d28cd2af7ec54c2260116a4065948523dc6d4e8ef16a82e195c63344e0d5cdd838b5fa8ce964e1299128a13dcdd47add3af794a24c6de336ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a281e4f71565141273a503659521f997
SHA193a75cc16255aaaa90d9fe022c9d6be4281e3e96
SHA25686b1cf6d20398e72e6d271616d8e75111cc6f2122fb6f68f878d3e622e3eaa70
SHA512f0cf6fecd7734c8e37eff985e4d3f796217492c441e9052de10a42aff8d4f58f76f9f4dce823c997059874c112065a0dd1e2fcd5833e450147e57be52df2b3d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5079039ad11d0683120ef4a964b5889b7
SHA173a105376b8a7a10b613be3e0c52d4a0427979b0
SHA2566e15698d1b4c19dcd0537549dbba347686178cd0f882d1d71147c87307d7539d
SHA51255006961aa787fe7563464f34bdf0fec84ea6f62c967093617afd3393f79b65b74e002e8bcc7fc6c9c696b4c1cfd6cff6b42b503ab7eb363c3a74fa30fc14cdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5666aad2c03fb41eddb3c8285b2be35e9
SHA1e0c67f6417b5d8ca606b9793f781f112a77addba
SHA2565e7fefab82ab25b71702caafe5ee65fa5b91c3af1b908f2dc8246ff2feff4e74
SHA512d85ee048c471a41eecb458dae388022d1a673efce52108f95269a06a85cff701e0eff41e589a4c64ae9b655a7802884844309edd9c67578ded4379c33a2aee87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f7dd99f89a924a8a50c4948689a340b
SHA1d05d172865c5fc3fbd899e9c01e7efd141d71eb5
SHA256b4138f16bc2012d3d338beac14e34ce24c63b98579b351d0f2ec22283bd11a1d
SHA512b6613532ff003dcf8a817584054e758688b6cf1c0c34fbe406211af008846da6556622e2bd397c2175ff4da18dab930f4fd8ef91c7a63bdb54d59550b6b9b547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d031fd957216edb64f1336a2aa01600
SHA1e813cbd5173a0c12fde63b2d241f744d8093088f
SHA2564a8a619c6cd48c5f0065e28348fb1408153970b13991a2837ea508193384f13f
SHA51247e1098c713240cc73ec42d9624f36e02a24415cfba10d61d94f1d19be16f66cc0556da83ee025f1949fecd306a45e0f4fb9d2e6f5c6bb83f14a2244a28f348e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58338813f4303e54415a6a809c233326d
SHA19a84892ada94e4ea209718848ef087d28d67c780
SHA2561f6585c54993fa52790e54263e386ec15d35a1823cc40ff7c59d2141e338af1d
SHA512f17b82ebf08d2baedea512a18dbbd32afe1575e006456e04f580a803e0e0af7b759edd510a8548ca756ac94bd294e8ce32d661ccbc2a72bba902a05bde411783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a75dcf469aecac0727742ca971b47e6e
SHA1f6d6b9c105914f344b588b0ae3c28fd37f65af0b
SHA2564bdca5d87e24dfff321a717e2bcb5b0ef5380f28b6eac7ce672ff4dab7c0a86c
SHA5125016c95dbad0e7d2693de357930018a602acf5bdeb0b0c42be5e5626601fd3360019f22ff045de1fdc7623ab047f4503eda519d8413b227e6478976ec335c21c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a53b023a4b98e006d387d8a20f0b1650
SHA1c6849ebdbc7817ea7d8ba4ea84c833f8e7aa77da
SHA25668fc9bd50a6dd1b19f2faa7c99caeb8045da3579e9ef49ee9863cfdbd14608f8
SHA512f304461814248dc5e7f8f5e27d672523844e86dcde4bff41a3a4e177c2d510ea05635bc5141c5475447144b96a31b0ba6447b81e94ca8fe6bf605ac09f5509ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b1165f1a7dafdb05ec3c4eaf09b42be
SHA1d26d2196623e4c8957a3447e37149707e69bef98
SHA256ed0682b2294941fb9ebb5d80ae86471797704d2588e7ec29a0fe6ebcaf79c0bc
SHA512529107a0792bb444b763c452e898aeb1bd71e49fbe58259f2a8642a7271025d54138e967b0cf1442cdc19ea8edd7c6a401461efa276ac28b4092e8510b858ee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512a82d191ca1a9677b60f7d357e05487
SHA1ef6bd0b2f7124f6ed38e402eba33356e75e3ce7b
SHA25621ac58406f64b84a5e208783bfe0c58e76878f65e6c5256f39d5c65e0776f69c
SHA512153129ff54f8044671358e6013c48ee500ba602e3d52eedc2d72bcc2a002fb9aa373dee8a7bb688f62de7b097878a88012317de9fb0b932f3022bc8263bab1cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b10a26d3a90485c46287e4f610189c4a
SHA15a4c1fb41041db63d15d3d5d2fdf6317bfee77c7
SHA256fb96d4e1a5b0d02f67c94994bdc69047487a2b7f981ca9c16829d4b088f1d572
SHA512f7069227c6b131607a368903ff37ed8d86aa095725b1fb8919cc72b186a74c7c353841ac79268af6d2a9c81f7a02e7aec3751be03f8ae35d0bb74e8f6c71c831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cce35f088401b64b27611b42f1a41e96
SHA1a6ef33f1efc1941e26bc34e6b44df8f530f361eb
SHA2561b505cfdcf520700026ff3606426fc9f9d0d5f97681d761ffbdb3bc22ff14ba2
SHA5127a6526a46e0a50323964ee6ac4a89b0ae66a63fb7f3fddccb436c56aeca9d643125bea9a146fbbf7431ef1d14f561e22a359477bc8f57e6543af6a039eb16c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5541d1a3471edbae576ee8cba380c9734
SHA19f850fe01c10692585f0207dea3b05781cd7b0bc
SHA2564bd42f5e291a212f4a8d294716cb3ce5b48099b069a5aecfd8390e1b61b88a14
SHA512cb825779d597f367af1402509de2bf22fe87ed9bb88c62f185623b97fc6daf9dee35c9cdaca40f826ff90c1bb30aadb073bc730d6934819fb00acdc88334a426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4ef59e20adfb814d8cd61be516f9336
SHA1fab6a34bf5924705d8374b3e99b201d939553e9c
SHA256556d6f692e277303e44f2943b08229522e27a559f7ba6afc67a73381ff3aed59
SHA512e9bdd794b0ce3770c99feead4cf1576b92b97137df92e0fca826f65a3ca8cfc76e6ad9d41860aea87143a24caab8db4cc7214c264c94bc50f4310c3f55b1aec5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b