Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 11:13
Static task
static1
Behavioral task
behavioral1
Sample
a24eb678a75a64e9d18adf260d2bdb34_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a24eb678a75a64e9d18adf260d2bdb34_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a24eb678a75a64e9d18adf260d2bdb34_JaffaCakes118.html
-
Size
37KB
-
MD5
a24eb678a75a64e9d18adf260d2bdb34
-
SHA1
e909feb9473d95000ce77bca9e76c5808db00468
-
SHA256
43436909abb50ef379fd29f39e84da57e6a6b96fac8cc33dd087afcfa69dc91e
-
SHA512
9ba4e2caac03cc2ad3386679e91371d419e264404b0fa7594d16541b12ec6430f72792614909d99ee51d18d725092b6a65fc43f4e1dfad19b9162dd5743d2445
-
SSDEEP
768:Y1hBwks4x4CGhB8hMUPVcPa0+9rxb2ksoNUPBUPVSGn6v28saNNUPOjNUPEshBUC:YW8oI21PTHI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430055087" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e6cbae96f0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000e4e1289593fc6cc9ffdf5e8cbc4f62043ea38f48cfbf042b6a78449d76e06fc3000000000e80000000020000200000005962164f2cbd2f37038f3414af968f773801b11ff9a1db032ffbc3c0c5e753302000000064d540cda13ef29e5ac951c7a6348a53add7a1c400697b9e226650fd1b887d7440000000debc59e0d757a16879c06d3219b2bcf26c33a5f2bf638d1fb883d6971d5534d5f5282c2c76a1155845f8a6872a1c25696327b27f9e140d47d16c8e2671daa611 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C1268201-5C89-11EF-8CEC-EE5017308107} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2768 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2768 iexplore.exe 2768 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2976 2768 iexplore.exe 30 PID 2768 wrote to memory of 2976 2768 iexplore.exe 30 PID 2768 wrote to memory of 2976 2768 iexplore.exe 30 PID 2768 wrote to memory of 2976 2768 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a24eb678a75a64e9d18adf260d2bdb34_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2768 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8b1b9cda579f34eff3d2f0488e9dcf0
SHA1c86b54f8788ede6aa472e0d2cb5f752dd380db83
SHA256b22165b35980d595f02e8116d39d67294544840cee0245ed201a828a7f78358a
SHA5123c95f67a2b10745f3bcfc51d707279c6d01fd875319485071ff87d0c6b5a88cf8343ad3ef99ce8bf95f26c39b30c964eb6d2bab3fc4ef074f9982a3ae543a507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d369129880e41853e7e52b8aa3c479c
SHA1ef2d16d7e873869b7b033e0c344dd2cad4c2b798
SHA256268ae8692ed180f6d64b6569cdc45e90824acdef4e1daf7e77b04a8baa68ec62
SHA51259771a5029ddd4fd13db3a82c2f1229fedcd96a93c17691641ba7cbfbc04f3bf1b6a17f7363eed154f1728b3e62d20b405ed40959b03fce72692cdaa06d059c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52673e09a4ae8eb524f97d8b6e62423b3
SHA15202be393e3baff140a1096c07c9a994ad68707d
SHA256e98d79736e26f8eeaa88b88b3a4a2856991bf66491c199daea75a34e65ecf6c5
SHA5125e5770fa53965fb710fb155a1c612c7aba75b4df72783ba4dfb5a274a52e45f8068539a95c919880cf683651386d238db493c4850c4c73a8bc40472aaf32fd0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500ff42faf61dc4df15501ba7eaecbaba
SHA1f0337aa0d08330157f22fb6a0b2ac78f173e90dd
SHA256a842c4ac605c2bf341b11209106cc7a3cf01707d511aa87c62d527bd3a586c08
SHA512e0c058d74f9eb183faf95137a7549a0cfb7faf8a555673cad90824b4fcd9d916c0e506924b79cc19a9ae2f36ef664718ebc8bb32ee74b6b2dfb1c9af5ff44311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea422a56d1973d1eef965b07e4a1f6ea
SHA1bec073ea447d46d8905ecf954fab5a63ce635174
SHA256bdde7672d1315673b844e2259948e2595c17fc495b33a9351dfa940e47a6f6c7
SHA5123180bb0c476c7ba6b20997b893c434ed11a4ccf56a8a9d60eae58cdfd37d4693fa5256f9cf39c364c54948bb97b4fdeb85d9c831673c42193d2a7c511d49896b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bfb0de4b1d5e5839109b604e60ebc7f
SHA15e766c6783795368281ce066b3bf88881a770ff2
SHA256c8a7d1edee139aa39a1c87198f52b18e3c1729419a16ffb0c03d034b6165f744
SHA51270f6cb62859dd773040e31e939845e46f95ca3359d8ca44f850b296357a74d606c8944d8291bd745b9708cd8946868abd51fe6dda7e5ee2f4ee5bed28b23190f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e6e483f82fc760ba93f8c7403f4b137
SHA1dd7a79acfffea9a79a3f1af80f6fed164cb1b6a7
SHA256a0e884233354db637eaccd715b5267944ca2bd92178a8e9e1db44fb689d4d1d7
SHA512d85f882bb78a196902d5c2d33bcb6d2db5f83aa99b940fb789e466526fdb0732bd638d8fb16e7d3c377d2fd9a0a20a9e43db2b06c201388bb1c892f13e6c0105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56de5f00afe1450dbf69eb2a0d51686e3
SHA12a5bd1a4d28a296004913cb095bb37fae561ad67
SHA256f0d9598105b08aec73303d3af411600a2a3fa08d022aa3341d318ae04dd70d79
SHA512a1824f5aa157eaffe4fa0284a713bfc7f8d0041f9db9eb9dbe720b00bf92b91a90eb1ee615b244e25c2043b2317a610a93fee125fcfe0f1c4427881578adf77c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5418ac9128d188494d0348b2553b9d737
SHA1bc2ca26b3606f3fc12aa088ddfe643041caa018e
SHA2560bdb05f95c3d27e5e95cda1f019a852e23a9c56c2f7b88bd360c1683ee4c2235
SHA5125b0a4a583e1016db620faa2b0ead7d6e81b97f6de88196711a2fd3ad076772b8b174c6954a8c73b0066488bf4597c6eaf4cd9cf1bc8404e3c2818ac59fa11ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5623d69cf0b97de4459be449bec16c51d
SHA1461d9959b9d506d436d4294598ee94218941273f
SHA256996743afbb1a2e9296c156312e6024bcd0ddbe5fd29d071edb143563c542fad1
SHA5124a04f7932812d9f584b270d81f82e8761ea8c32318daf636fd50f04d6298e655dc9c91dcd6fd73559cbb9c3ce3ce7a5d5f977f3a8725ae703d0d7cdd5fa4bb03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bbb50cad8603139214db67aa63fa09c
SHA1aa6f84b5912c8e360dc078327298c2b9f42ab498
SHA256351296f0a3b8411d15d83ee365e575d181051c2d3094c3075b64bcd76f087c05
SHA512399a833802142e596629ad4183fd4588e27e6073fb21a701b773a6db9be6a563cc81aa3efa46bd210411397f680c56659b29a23127830ebdb1f537280f4295d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e3fd029eaf01052082d0c1e144c4a1b
SHA110cee07ef32b36e5a450a97cf19be3e4b3d99dcf
SHA256f49b3226d7964459aaa382b2204ccbb8563abee0f37dc0382abe3800a2fc6651
SHA5120ee012fef2c5cdad51c4668280374b77e058565c88ceb397eae2608eb5f5ab26a3cc26920f2634391aaf2ab8ca072bac0f2dd0c8141f57b8f698dd8b94ba8b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dec78d166b4723c4a47942522d308ec8
SHA18422dd494960f9ad43780f1c74730091c2604128
SHA256302d2516fa6bb64e50e720a90f77c3b4c98f8a28cb9bfc9c0d100dc960284ac1
SHA512d394342c42a5db9d70d86d6dd3917cc8f32b060d3a1c334d6c8c5e68dc1a5ccd891beab5c85c8da7845e41781fcd793acbc7d46ef5b157b095563d48a2689d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53adc4843637fffd077ca0f99f0f0b4d3
SHA1d545926dec89a6720d16a5c7ff0317eb9a9da163
SHA2560478e05a6d252e24c9b24b955949516b167732ec1230964425952c618eac086f
SHA512069196a55e25a00979d974798dcac2a5fcb92304c4e3711ac49eb1dcf6190cd86698a8677f1187df6cf65f6ef8743777e78c6aad4fc1c91e56a084a5206fa329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf74ae485f4ea0954a02c3747d840ed0
SHA1571ad65df0ae1fce61827d5e5e405076f4f76231
SHA256a48e56917c093ad1a2617ddcfbbea741b27c0167b2e0fa77c804689dd4d8bea8
SHA51237a30a6d95cc885d6bee9eafe8f744a0ea3e2d3a89099944963432bbf9642ed2c1a4671b342b405e989222396ccfefca7511da89f2dfc7a1eceeda22abc419cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bff2748cdf0ccc977b793ff84219a7e
SHA1e2faa7decfe04127a2e68cf97001719e2502d963
SHA256ff7351a42589a7f2d8e332dd72496bc2b87fb88d1f61f45562cea0282c4b6f1d
SHA512b8f32473d5e16b9a1b230a656529a1be615ccb4b081584bbfbca314d790aa9b232a5372b5e381420dc252e378159184984f856cba46b301c09e52e8d188b890e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577ca89be6970843c8ca3270495e68af2
SHA12e668b376c9f0aded79d3b0dc34fe34299270051
SHA2560404c9e33a156053f0c41dc87794e2f428ba6ede6b28c9b41c1edb7491b658dd
SHA512ac0b5ccafcfab7d52429d213dfd1fdf8bd2ba2f287e1241996c9588eaed705289db394fa59bbbbb07b96597500a5e5f3a0c7670bc4493a1f995145140a3be602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ada398b738c7f76f3e8f840e24f549f
SHA1af269cd18e3bffb014aabaa82dc0a02089179194
SHA2566f0ef9833de4a498f9f9d6d2d3963229c0a72eaff10b7d22a69cba28c12c4a1f
SHA51244bd4a5f3694bfff7b012edb57243c1937823915b38c36d146e772c8a6c91618505bfd39cdbf372e5175c43a3b5a3260ae15abe44e2e2466dcbaa6e74267d1f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657452abecf4cbbd231aa1b45ee4c472
SHA1d3ff4aea420eb9f944e4b043ad0d56a77f3f1c93
SHA2562a0a8793389ec06a4b25c54f90fea1cc4da7de2563d451b049e80925f7a03061
SHA512074ffa18b4d1cf7e24dc5b70e2a0cac24439e601f55a0efd20dfa552b145b4f41286e3d2f9f8103719992dcc6ee1cf6f63df247acfb93131e642e29391641cd8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b