Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
a3165476e6201fff4031f714e05855c7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a3165476e6201fff4031f714e05855c7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a3165476e6201fff4031f714e05855c7_JaffaCakes118.html
-
Size
227KB
-
MD5
a3165476e6201fff4031f714e05855c7
-
SHA1
9544bdfae08d55af4d65394f9d0b02c0283dba07
-
SHA256
770ab6da66996bf3fb45b111a5105e0edd870af41a0a5c5724dc701385b635aa
-
SHA512
f15aef286ee284f02a110aa4b8831f91ad678114332a5ef8ae6e817983e5b6d7727112381b25520751300ab292f3ea8adfb4cbf749c6a03851134d1f366076d5
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcR5yHAKslLqGQJ9Q+cZJQQuop:sXHYLi9f8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90fea958baf0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430070407" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{69A06681-5CAD-11EF-B74C-7EBFE1D0DDB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000c0f7e55230e7c8ab73d5fa705e19b6267a81946b264531936cfbd0fd8131269f000000000e8000000002000020000000774de6a311e48233b01698e192c24bd73098ea8d870db077b80abe6e22308680200000006543a6cbaf3f484f66dc4836832ee5779f1a3ba097898ad32374f972d55dc38c40000000703b291a8365f862a8b31541b0a0897640d2bcae18852f16abc5d9d550ed856a159fb617a8c8d48208b848cf4206834feef2a85a24fe723683b7a6a4c7a6e797 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 1332 2340 iexplore.exe 30 PID 2340 wrote to memory of 1332 2340 iexplore.exe 30 PID 2340 wrote to memory of 1332 2340 iexplore.exe 30 PID 2340 wrote to memory of 1332 2340 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3165476e6201fff4031f714e05855c7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c7dc5593e26d7930414d8d83097e8d7f
SHA1db14a52468f883a7beb514d7a08d068e7652b32e
SHA256733023a23b410ca65d15617b55d8f1f2eff6542bc685533a89b11e96f2971347
SHA5127faa92c8e1ef39b1740286750e593523149de190ed4643fcf7b6fd3bcfa69251f4d43dff6ecc160885bb11b4d48ceb32c09b4f5d2f73e2db0820d2278e245966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e48bea27f7851b2bbd91c016a22bc05e
SHA124ed80239e7b10e67e744bacfcb9ff9407651758
SHA256c521b63e453629707830834f5db50e9245dfa1145eb17cd93670b54fa8514155
SHA512d09562bcb1b2dfa2551a6c16d8e0aa6f9fb2a70641f29a41512d5662b76b7501b744014d6ea0ec31389124bde9e200cff6f934fd5c04b0f69dc6c4b90e79fce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8ebfd8f6b13a0c0a5df1096403bb427
SHA1bd37671f740c41fa819fca511aa208b476115e7f
SHA2565e067d007003dc0e971e75eae9b138f7f1a91c79fcd3d949d708c28784aad76c
SHA5120b47ff013aeac7f0ef910a1e33c7d437d05ced72f8af956c2e886bd3a837ffccc93d334b07c2c1a8309ce674eae56f4a5c89aa91666a25e2f24291b0507873bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57930b29655fac5fc21748e3417f57d82
SHA146a3c583fb792ab364187387ddbce7ccfe7e7384
SHA256ca732a7a74154ff373d7df066802698b03950d45a320595c23ff68ee01fc24d7
SHA512cbf73fd06475ead47cdf77060f1f235f7477f92b5a0c8c3e1fd72d40ccb6fef2eef6b71952acfc1cae0d8f18c5aee223fc99f4e7f47b3d2849e9fa2841877d91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5036bd4389ae96c9752c68debcd18183c
SHA1904d5f0c2c724044aaf2c9952ccf5ecc444d1f95
SHA2563f9b30e9ff2a3b6e8855cab63c03260264596801f162ee6e9e88ea52c784af5e
SHA5126650aa3016211ed5251760b1441d63c895ad6ce40f876c0aaa5447d37f24d29e422b0a26bc0c66c00273be66ada072a9ccae87ca4148b9ebdc26d1f11e508745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552d19a788458dd2684c23c1ca48908d9
SHA1be32345e1d181db42fabf458d001378a766ba697
SHA256a230786a4d77799617e38d7097af8e2b9b6d5a07fe8097d674b97a874b1e7ff1
SHA512285ad87e060594f775a4b3cf705b405a58c6362d19331343f007fb0f8f3a2b05e6a3290a5babb3bab98ef9dab919a789a1a7ca7750320bf39f6f7748517860b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599c8b3c960d6b9eb40383332ea9b4a21
SHA1f8879e4f0d5e44499d45f1a477a05e16546d410b
SHA256401020f9d38ec0f4e53beb57d6809a222da6f8ae634c9efe91b28be4bf056233
SHA51294084665ab52d8206fdf9b954b8f75385137ebbf34a761da05019e5d837aebef3dfa3b85d89361e0223574c2652174ed03b1cb2f951798fb23a93e67fcf39e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c240d819f0cb111e437577cf5053e387
SHA122576bf8bff89571eda15489070fdf2ad7ded70b
SHA256dfbfa1a2d92abf8c31082c7d85d40bc42861f5d598f6ccc9046614727ba97c2b
SHA512169844d2b0603a869f6c422b6196f27a5a5c00708cd63be3c1d49385175193293307118b97e8cf9b4a7210e06a268ac1dbcf61581fe942f4a8d4dea4a14e201b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511164caf380ea4ced51f8f7e89099ea6
SHA12c26119d61b399496425c4345dd63718e3e5fe02
SHA256682a9e132f180c8eea2958629a19c79c0b2a084a8c2eb41362c44b60620113f9
SHA512eebac236952abdba5f26a6cc7ed8c330b8c4e874e844fdda92f5bfa5d1f7779ad507aeae7a2a1b7bf4a6982f91b3e3e2512ec3781dbbac46ffee1d59c5a6feb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b25be8acf3045d27bc18a4391895c13
SHA147796f1011f69493ea6cb096ca4bb40a02b871f2
SHA2560b814f7c3d9caf8d88c88b99190d13225139d84a5ec7aacad6a84b8f1ef090b4
SHA5124120313fe0a51e945cb6f1bfc453022488a357cf2132fdce7eb132054295f783982e6057881eba755b1cda319da213432e31c61a9f8a213bf7729a5735e5bd17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5764e178a055097ea0ee3ac78a45dbcf9
SHA1b01b6bb4add9f5133ab29c5f0702a263f7083b88
SHA2565d6f6e8dd94904f89b978ecafb71296731c6d3d810f9f372965a54bc1e5f8595
SHA5125282f3fa9566e88c92b1fad6bd76d991c7b625840e99f90ed728c901f88a2ec39989754f623080637737ebe99f491bbd622e17a7cb3fd286883374e51812e8de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597ea3637bbebab762850b2237d33533b
SHA16ab4e0116e36ef706e3b6bf23cf9cfab4b59be05
SHA25647d974886677119fd5d31bc4d548a18aee9dfc8b3f0037895b8008aedc5b7a21
SHA512de85fd804de01e756933276f7c071de7a6ca9f963d39a951017f8400cf46141d2090f6b5ec0d1a0cf97486ef756a749be9adff28ecf170ef45bbfe793b6b5c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5683f3ece3a31ac1bb936b41258ea03ec
SHA1c13061d8ee9427d6a220ef4076512f8e91a14a65
SHA256b0ac799f9f770a13cbd85e18311a6486faf6a79e456e73ccd4e562214a8215f5
SHA512badf3aca510404698ec5d9f79d414c7da046b70cd4906c892efbce0cc13e9eb5bc14036b47795d0c59390514a42323005a66dfc252c981b21f44a93299766c31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c58ca072110a7bbcde17be138d84d29a
SHA1c94f698856d71aa1f32f5370f2b72a8e118fa762
SHA2560b0984c7a31f350cb11cbe6fe078a781a3c87d5b1ca8749dabdfdaa1203b4e12
SHA512af1aefa328a361a8910b311574a4c47927676f49515d5eae2f3f75268d1f55a2bba5f61fca7bc61268d8930402d3c6c8a5de91a680f42b71046a8c7a9c2b3cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfd9d1568577060f7cfdc3261cf2ebd2
SHA18989c5351f330d412468293f37fb853c44a59aa7
SHA25698318b66f33f9094b4615fec300ceaae7e4baa37eb455690906aec1f3cad5b30
SHA512dc56695170b3a22b4b99b83f42218cab4551edca9216776634a98e12fc1a3f20edcab7e60a66ea7cbdf7822299a4d9c68948788f4e7c9400537834bea2a0b8f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD50367485e7724e1e15e8094e3fb130d62
SHA13b5b0731f4dda33d3035f0b6a71e72a4055eb807
SHA256d08254163064b89a001a9ec438abe77e586b9f83e1d22f5e3b7b2a0c8d1020c3
SHA51255c0b76eb6d82f5188b25d964121554d308250d284bc9db9094abbb004d137dba30c8aec7cca1ea7bb019d0f434803f26e752d4bef2fef0080aac9b4580164e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5cb1eb8bfc9f4cdacb4dbe7b51bee30c1
SHA1099ef78c40948d9d936b62578ac959e63329eba7
SHA25615bf63eb034e8a62e574871a3a97fbbb6ee861d63fee1ca0ba1653fea646d711
SHA51259e3ca1aae90c2e509f6549060a4f83eb2835c898c34a68fefdb921017a6dea33a8b7047775b37fc08e7c29413ee8b9f3d3ddb3ea54d625379666d4a52a6b84b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b