Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
a2bead18c810fb7a0feabdf48044b45b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a2bead18c810fb7a0feabdf48044b45b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a2bead18c810fb7a0feabdf48044b45b_JaffaCakes118.html
-
Size
6KB
-
MD5
a2bead18c810fb7a0feabdf48044b45b
-
SHA1
3492ff29c61b6c694bb2cadadbe350ffebcf89c1
-
SHA256
480f849d15cf9ad400ff282b4e17e690531541d4e59eb01b6612a91e62600ada
-
SHA512
5c460e9e75ad312ad258c0746eb2e1604d2a157dcb8d22873f1047b2e31c6cd059448f21990b88d2a6ee270164127519ce73d94d7e85468d9af2027a340d5602
-
SSDEEP
96:uzVs+ux7K2LLY1k9o84d12ef7CSTU1ZcEZ7ru7f:csz7K2AYS/Yb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000033e4bd01dc9d36cee3db4032a7969df8331035dd4ae6a13387bcbd4a656e540d000000000e8000000002000020000000f41b1271cab77eb096132fc6a698de3b34409d33fa3f645c58603d044b5e3f3a20000000d7ea24226a1d4c34635ba5a14df3cf55c60f678465caf061fe7cfd1b7cd0ad9940000000ee79cbe2e6b81bdd253fb4226b835f9aabee32317a9aeb6a162fd9e2c23502023fad1eab88df3fee6940a0f1f7202b1ae5c98618cbbb9d79205bea7abb8ddd67 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430063728" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108b2cb6aaf0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF9D46B1-5C9D-11EF-A7CE-FE3EAF6E2A14} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1992 iexplore.exe 1992 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2508 1992 iexplore.exe 30 PID 1992 wrote to memory of 2508 1992 iexplore.exe 30 PID 1992 wrote to memory of 2508 1992 iexplore.exe 30 PID 1992 wrote to memory of 2508 1992 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a2bead18c810fb7a0feabdf48044b45b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee095efd649f18f7b00447cd715dfc3
SHA1bd1614eab3ca118fbc89932b53e71ddcfa74b421
SHA2565731e9f8ca4ed0cca51d6a799f7fa8fc25f25434c1ce973be8f3fa79b15f7522
SHA5121f54a6d72cf97f989cf2886ca2fc2fc6e0819bdeb9a917297d5db36a6a32959d729bded1322dd1f4400175028b3159399f7309ef11675350989ede8025c72214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a07aeffadabd6557e01588688195572
SHA1acfe7b629b4b02282af660dec4e0e13293394a97
SHA25647d306564ac6c63b635af278c8cee95e5b21ac500066808601ce8894a15bffb9
SHA5122c975456b43a3b770c6d99cc23fa02b0e5026160ace715feb9932082768eaf682731649e827d0b7c56a2c32c52be1689803af3524f368746122ad27a925e5d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5624ae030b766c24c2e793fd44c77c73e
SHA1afd3541ab47a64fda5ba433051b65ae7246e94ec
SHA2564176b785131f9d05950ff4c1d06e7c596635e2d69c2d85591578eaac0089c5da
SHA5123355bfd7cc27d2b497493eba2a2fb7e10d5fcf46127c214647778ec0c6ddee9e26178e2c02b49be2d29f30ded8d7ae052254487d2926a75150381e6d4d68badf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550027edc68dfbfd554bf1b24ab7dff91
SHA1f4106f487a56fed04743883827c6462ad9c8af73
SHA256f75df1e65a4726f00f0ada052502799acf4e4dc312d85e4b5e42e8cedcd289be
SHA512d1fbb25bbab59b193de778cd8200895032d4d99ae991d88fae28bfc338f3fcf7cbc119a9cfac2ab01e9c00793dada43f3004f5d2ce2768dbd27308898e6bc1e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a035a20217eae3f472b462bdf0d7d001
SHA1d488d463a11d6a4db5367b098af0ccaf663beda5
SHA256bf899c9a105429035de4c3685b2486a39c2450a1384727c9b7800fdfdcfedac8
SHA5121da782717156c06041a82f82aae972768bce3c0842f8c27def8339446d640fc3ea8ed76b1aa452932e0f4a1ab0437e62bebbf5b7a7c1448c78a0557ae74c84e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5933176b6a400d05e399a1f4603e0746c
SHA1ddc64dfa6fe774862ca3f1ad9a0c45759297e9a8
SHA256cd66fedc216b4dd0a711985eccee2de7fc4b63b3d2ec3ff6b4fa3b6ed7948801
SHA5127d19383bc3afe0e08060d45cc8b14d875bbf2cded58e35b60be649bd3f78e210f54f138375581b2fc745480ee6be3f125c7601b7e02f8e1cd0ad505c28350aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c08758c237b363d7f83f0e208eda7be
SHA16c33f7627098bd546f908d8df4a63802a3804705
SHA25644564fa6e6c7d9c3b4cdc99aa7663c4a47e9efdee0d4d17c72bc547a53b77c20
SHA5128c93ecbc9e10072483d63c62186a8bef9b8350b37c6843473275dc77cdc63b668ebea8a62a31661244aa6af501ceed3d11954245fcc655c626cc1b062e2cc11c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5583070ccc098ebda84718ff829465ddb
SHA1c4e935c0ead784dd2757136251c89c75ddbfffc5
SHA25665bf2bf010f299ace5626a83e9b51b364e0f5e0f67ca2acea1a2085901d30f07
SHA5128571f7a100aaf860e78afbe6ac85cda825091fb41300e6654d9726ca938023827e6cfa91a45cf6eb192ef8cc5dc274e5cb8fc18da0420ecdbe1ae860e1a14aec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f74e9d10fcc48c6815f804dde9d9079
SHA1641ffe058ea8069513b55159f562ac81ef880436
SHA2564d8a12b458b1c5d0c9e6c293ad9c6ffaf777a2269729f726c8057038faac37fb
SHA51217b5f9dca09df3b603da4bc7be376da1889e2ad3e47fc7b70bb65c5e19cf93722ce4bd259ba2c2f1a771025b246a00668640d74441b8620c9c9472bb41f06ff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2e4a78aff79dc2117d5c6522ef99be8
SHA1f0a68809764768bd2afad660647a6e190dae88a1
SHA256970d20074f947e026e3180a8d0d84c4655b4373e8bd331fdba17b6650c54c5c2
SHA512c09ad5c2d2eb616c33577cb059fb289fbcd79052d69a2b0979e68e70418be97616d5bf520c9d9be5a420eae93b02b498d44237489c7d69072b522f56e8011f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572cf223a648cb94540c56db7ffd8d56d
SHA14116aeb8f2f92aa86ebbc58c07eb8d8b4fe25064
SHA25666b6372d4aa16185fcfd00332d77fd7b3ab1965a6e065dc6ffaae65fe0bb0433
SHA512e7e244db3f49428aed8600d1e479ccf81648298bbd126f3f408d88aacc916f04d3f12b99e7e6f04a4a018ffed1fee069c8aa6ad5417e2e45981cf05ae1802db7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f8ae3471dd706aa3f32742eb8698c23
SHA1a7530dbe4d0c09e7a1cc091230140f213cdcd373
SHA256f4881998d01c7e6f3f05a33e48f7ed12c6d398ad20977e1f16d95bc14df864d5
SHA512c739426529cb210e0420b93fbf2915fb936d2179ab050a4147e006ff68639a2d4ceb8ae20c79f949eec9e2e5ad5a06d8f725d520f2e05502ac1e7a3125549f40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584d5bc0726b7c95b1038f51392e1d071
SHA107756150037fc6812c210056471a778184aab56c
SHA256bf282679928e413344c5349aa46bc58851f54e3170d51ebb7efb4bf2972ab5ed
SHA512f7cf5b5de75dc48eda1c0ae0af2b40fefa443960a0e0e49ebf53e4e10c71165a9d99e8f93ebb3ba63d98b67285825c6df532ed3101401e11a9fb71bfb0ac3d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5870a0b28d57ed0709f3d0c7b6bb53fac
SHA1fb76acbfd591db0b602291a4a24508b00ee59841
SHA2567096835a2e78e33f7c5489a7cdc9651cbc9cc98f6311ee8ef397e9ead5e3690c
SHA5121bf2f60fd40dd5a1c1314e882cfa2426f6e8605fcfcf44a87394e49c3566640560a3507aff766220196d6cf777fdd583c78a5ff38d65f7ec3fe18bf796aba70e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5152f882937322b804650bece28bb497c
SHA1c3f3fc579c26a0b3755f7bfa448e7f2c76a15d45
SHA256c2826ce11b7d12957fe4172a1bd0f5a57c52794ffcbcb557eb1349c281a39a3d
SHA512ba7778b2587b25f91a3e74846384bcf30e287a7241d98583704e73aafc88133a8ff182545c0deb7688abf652d3953e1f5972410d28681b2d8cad6dc6d93a8556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdbd4b22e746076b677f972bedf09808
SHA12e2e0cd7739f190446a50c1fdb3ffa42d29bd8fb
SHA256a030255abfc0a0b9c0fe564da5356360a2cb71b1c2dd0fba8d61411a400edeb0
SHA512457a065f2d854ea4205bb797dfca6c4288793042c0fd926b30319c0b716d1e3a3959133381d0678814443fbab313d2f21bc40a2d22fee2620cc947925da92ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdd16e69f767b00f90b4e03450a04c89
SHA1d80993a7f5543099abbdfc5617053fec00ab34f2
SHA256e41eb9e0b4c2c24f89464db76e6addb38e8bff23ee8da9d45489399fa5378f18
SHA51290ed6129ffb70c7289a973d9dd9e7885681032db4c20788ead00e0dd88abea3e62597458a0ea850a6d4988dddb8468cc21e795257214254a7c43b01a48317746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d69a09efe1d9e07e6470acf16de5d271
SHA1230d0fbd8aa34cf31c6e17b087a91447085b42eb
SHA25621d847913429e2d88c229c8759dec7e10e140b66f57dd60e52d0f5c394bd4433
SHA512b93673199d434f366754b07a0b58ed605dd1697fd544ea8dfc33f6760ee40dedc13a1fe61c0f3f2eae47afa685cf04a4907ac57a594b02866c4d2ee40deb90e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577833d09796f30db93176e51d736551b
SHA16bcaf6c6d3088eeb772b5549e1f21a3d8d3a756b
SHA256731f0de8ee64eb89dcaa6a994fa79611d2aa3eec0275238b99507f28e4079027
SHA512d75a0f03a9a2400280ff18251139c72250dc4044d6ec08c548e33996cb7807dedbe4043e1c270afc9c30a48e4029f3638493e2903c6b83eb8a7d5b532f2228d6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b