Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 10:34
Static task
static1
Behavioral task
behavioral1
Sample
a233a25c8467817f4b03b80df577864b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a233a25c8467817f4b03b80df577864b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a233a25c8467817f4b03b80df577864b_JaffaCakes118.html
-
Size
495B
-
MD5
a233a25c8467817f4b03b80df577864b
-
SHA1
7e03186146da32c8eebbbcc5b3fe4ba449887d10
-
SHA256
5345e34467c8ad2b95864f0b171cd61dcca25553db7480494d15205a524e3754
-
SHA512
e610f8ba599356384b6a5f7433a239cc21314648b3e7264bf77191d66cbd9c96a50423c2a4b8921b06d1d90daa5df99297ff5b38a8b3bc5f93c95de8fe7a37b2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D3BCD51-5C84-11EF-991F-E297BF49BD91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430052745" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0679f2191f0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000002b4a1c67e788aec4cb107741af26f201b5b353c90d713a69aa7389dc148276cb000000000e8000000002000020000000d596b6cbbece3a73f40e8dfde2149651b312cd9cedd14563e6ad539f1cc4cd98200000007d6affed1048a16e60690d6f16100266178f837349664fb0848891ffaa39e8f140000000ea4c7eed5e6fe3e30e441b8e3851d600cbc857498159dac389ffbde1ba0e2003a2afe5d69c46489c60694b9c3137607102a6a3aad84ed4c7857220c04bb5dabd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2988 iexplore.exe 2988 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2320 2988 iexplore.exe 30 PID 2988 wrote to memory of 2320 2988 iexplore.exe 30 PID 2988 wrote to memory of 2320 2988 iexplore.exe 30 PID 2988 wrote to memory of 2320 2988 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a233a25c8467817f4b03b80df577864b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b4cf68c12c230606639e8c9b48a221c
SHA13ef35f83f5cc84d9e557209b81995fee66b4ce56
SHA2564ea7914d6549fd63ba9c82ca765918484dcabb0c2ff2e6dafafd52b9cedce745
SHA5120abaf6010b256b8932ed63d6f28cf55d62213907c717ce4d71f2666877b700f23237703a70d7056fddd31c0f2709cc8b238efd58a6a86d5d394f0741d5a5f1f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c4ac4dd8d3047f881269b2f274c12ff
SHA119211eca7f56d64df51b84664c529aaed645c1f3
SHA256d29f69be5eaea31faa42b0e1e834d1f3487f773996f4f75ec6cb01d6facb3d65
SHA51270eca2305b813905c8b9ecc8607c6e0b7f99e9b95f3e1aa433a4975aaf9f0b4785919527c7cdd6ac0aaf098faf1168fa390f88f2f7d9a38f2ba47dec2c1ed9e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598941e45cfc34386725b636c3ecf26d4
SHA138060d9b2d1b1dbe6e69ff86ebb026144fda1215
SHA25670795df0ad396f593d1853899ae943f5e36d63e559c0b3da1bdcf8922b1a582b
SHA512b4c09976501a5358b79a5be1bbda98f6e40f910b258ade9fde0da198c6da67d5ee52f74458c4b04320a008dd921f04628021826805cf25d3327480baee6afea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560199f9036daae60999f57c4a0ced3f7
SHA18ed465fc07f8ec4bc2666badd55dca58d19c067f
SHA256ad57b885fcf43cdf3e77fc2ae88e3c4c6edf5cf497dbadfef1a66c0b76fbacf5
SHA5126e808dbcf721f5eb6d3ddfd5805932d095922b005c99d7c5e88488045ac3892b259e8d7406ad7bc022c042837488acc71a358bcba3e444274dd06fa7e8906d8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef8c8965e823789893bedbad64ebafa2
SHA1f53dfdc5967d07a8d4f58ef16a104b3bfcf36510
SHA256dc652afceb868324c0cc685667f2724ce4945336cc0376ddfa49336d7ff257e4
SHA512b1891809cdb55b70ffe7409fa43f780030f1c4b5513227cead056d227655dcd7f635b03b8989209055dddc29c875fa748e03d304986a348654ed34e841a85bf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a778fe95790b0fdc2b43bac41a3b0921
SHA1b056757d6c657edca556a8e4e8023692dcd9ccd1
SHA25644d140914fb90ace07cf65dc6c4544e9d7866806b85640d805c16d6e9d3afe0b
SHA512f94ad3e7e903a80420e34248db17a91730190b3696e62df22b95fa37f992eee488599071ca8fce3a9a0427697def61ff954260fd6d50373feccbc59eedd1201f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b4bbc2544a00ca9760b213977ebfa9e
SHA130405e8f4cca36c95143dde3a2da9a37c5ea3f9a
SHA256709d5a6b5998248ec826a9be3f598bafd9ec9ed0d05d78870f832adbe7bba496
SHA5123fd7555fe026a45f7987bcf6b16c257caa8ed97d8046d525aed3b5ab41b3772771a3ddd390fcf8e09bbe91630280928847f377efd3eeec9fcf6064e4e58c1aa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bcf884d787d02f705197c8b981a7289
SHA1ee11493ab029c2b83bfd5f91c1321452e5644eda
SHA25694eb78896874a7ade5a9ab2317cec179a0d0ec68e0dfae555acf5878a29019d2
SHA51259cf974aea94dbfe9e7be40a6d207a81b2dd7f7cfd79b103ea7f61168229a550771992b686144db9bf56090d311fae63ef3e6301e4fef358170089455176ffd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541e7278ee0b8c51ff61e79b95faaa7af
SHA1f251fc3f8cba8b828bf298964d7b196ac22be19d
SHA25638596c6270752a1608bfa43e1ab34313098c49b1d11a525c7ca5e90e0c1a71c2
SHA5122e9ce0c082af033db24f82fbe242e26ae8807d260fc503f069935e660e64a961de368808976bcec97e9b2d0bd8570c04878b308a8c707aec59a0fb2354a9ab49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5876be5b888b251222b1ead3517ba1c83
SHA16fdbf9e4f8417508b4dee201355b63ca078bd646
SHA2562a247fb93b858a8a934da43f51cbc76211d32a645b8a2e8809af1e9f4cd6869f
SHA51207848c36332616d2605945be7ef81bb76b5d37bd59a93ede1e97c53d59d797f273634e5a20de3920da201fb3b7e1964e294c65c4d216789b9ee2fd99d1d446c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586b247809df8a8df24e43ea804eb821e
SHA1f28c72e69125800416ef36830ba62ece782301d6
SHA2561f59da516f79b2a9b87913f8d1d58b9469b4a86e44292511826f1f155d2816ed
SHA512e0a0cfe5887b4b109708e93f45acf2b0c32140a78b9e2a051f060947daa573e0ebecde6a6c719c0cba774157ee56d6a42c26ffbb3a33a98f6c66c7ed1b98ea31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f50f81dda27ff95ef07aa94ab0a50bb
SHA1cee889ed7180875c06e95a2003da51eaa94da5c2
SHA256f264c24c570cefdd6007875dce0a837282f3ed4958e4e28f91fabe353a404664
SHA512566ab2eb96514e9b159f108541145893ecd241929cbfb9b4b3579336931a3a62bdbefc52a8764d1f0ec5c3251d06a8ff8149217262ba45848750c9f313b09956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570ea884729adae02ceb91e4868657336
SHA1d652782f722c2c4f75bfb92690c086b176bfaa08
SHA2566cb4b6a7e9f8ade78524e799e444fa4f53c23dee41238ddfe60b7da1e9905ae8
SHA512af4a78a84252d05acfab6af99c4fefeace21c9fd395d1cc9a4ea15a133995f37318227d21963f0f62ddb3b64c5beb1733d0621a62169d627ccf1e6e14d1e7fef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cded820af9c09e8bc13f8f977506639b
SHA14cd901fe6648ca3a24442cf93bf38ef1f23f9934
SHA256938be4fe739664e3b893db3b6c3a1270f18acea9d78806b981c68839587501c2
SHA51251a2ebb4ef0cd98c5b5903eb8a821dd39a52f1141a374fe90fb22a94184b168a65f2309b4a534244a0e785ae066723850c3b91b50737dadf9cebbce6a71c00e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dda54bb36fe53beaa78fe4ceccf6a24
SHA101fdf911a974caf97c3b0a6c79d02893f961beb8
SHA2568acf5b59e3f6db590d838c02cde9d94d5cd4a4f61c952ebddba2a0f7b6d647a9
SHA512bf84d5db0192e64739a0d8058f663ef7be8b810dbea8dae56e1cf3a6c4619b51a35647eec9de430fab77f31792caba1f64274e1512e0302aef8a93668db867b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545b3c534d978295601942f7d657f02db
SHA17cd48b1b3800f82ed43dec835010f59d5b732ef8
SHA2568029bd57ad1e8fcb1aa5fa6fba445902d9ea2241e86ef0a06b56d0d8d3d775ab
SHA512fc20479da83a7e2909f557cdb240935a052e20ebb83a842c3001cac998ca270d41c632222a0ff1ff2003e9fa354ae144d7d94be9bac4066f5194a37fa22305b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e78856d9033cdaa0b53866cb221f6b14
SHA13ad1a70d9db6ce6547041c0965b4550daa1c0f4a
SHA256c4dbaf70ae2cc923787f58d60ca5461dc3ac8663920ebc619f824b3e81fc3a3d
SHA51288abc7b00808badfbe80b10f594fc8a7cc38a01a0c396db8fba583dc0d91e9fbab6575f4752b1b3ff6dec69b3a88131b853c6400b2486c838d9672fa4b4ae153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e39246ba49189132afee4de7c3c3507d
SHA159603bc9b51ca93d92b057b5e3b7497953c6843d
SHA256d0a903642af9b82ccb8fc38fb21bf5fb1b1715f8f4c5e863c3ca225dfc359d2b
SHA5128429cffa48c346737c0dd900048e463e88fe868efd3d91b909c63aad70a0cd6ad50761e03317152008b0da4b34012fbe2fbe6f034d5f5cff2fbcb9d972855737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510857892b1da6884c59caee60cd00cb6
SHA1eea01a194be0dcefcac17bfd005d5a92b7b5884e
SHA2563dfc2872dc442f30125aec71e890531f12dcd3def86e63cf2e0256148ac9d1ff
SHA512bbe5502fe445fbfe292b181bdc99c62a10cebd883d1e6db3b9593612c4285245f3e1510ddbac54c2e3bbb4fa5a58b8956d5223e3b435b18f3538593f75643335
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b