Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
a3d7b38a3f7262b1677b1990275ee84e_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a3d7b38a3f7262b1677b1990275ee84e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a3d7b38a3f7262b1677b1990275ee84e_JaffaCakes118.html
-
Size
73KB
-
MD5
a3d7b38a3f7262b1677b1990275ee84e
-
SHA1
bf81558f0069905ad7b680a3e7e243d25b1ab350
-
SHA256
02cfa404ef59b1d2a221702b710e35742579ffe0e97cb6ffd4e2081d32daf129
-
SHA512
75cc1dc5809738f87a53ff35b26f6fb640236c6b92cdc2d9f5e269dcb95c28f63c26a593fb790877b7c1f65afd7d4c1f6a6cf0c14f6133d1afe290264fd56859
-
SSDEEP
1536:n/a3bqz2j6daodlppsMP3IdDqFG+pSxwAVYUdIE5plCjhO:ngAQ6d/F73IZqjSxwUYUdIE5pyI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4DAD2FE1-5CCF-11EF-9478-46FE39DD2993} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0633222dcf0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000122bcfae66c35be9c0dbe6c4bd822ee5135e65cf15931c255940d7260c620eef000000000e800000000200002000000048a00d8c73882383bc41674ae1297380805e92f3115bc4e8e681968044a61a0d20000000fd27ddabda01b6660d0f596d01e99c2d8169feacc92428b67b731d55ee9849ad4000000068196006a8f8ec23b88355cb0f106cfb0f5cd02cc2437d44c463170a1ae4ee9587e6736e8600661c1499140e8fa0caa41140325ca84e21ff23b58ce094bffa61 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430084957" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2508 1656 iexplore.exe 30 PID 1656 wrote to memory of 2508 1656 iexplore.exe 30 PID 1656 wrote to memory of 2508 1656 iexplore.exe 30 PID 1656 wrote to memory of 2508 1656 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3d7b38a3f7262b1677b1990275ee84e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57793c8b0eadea5d606ac21476a2b1599
SHA19ab36e4176ddcf1abb65b33c7fb1c81cfe207e49
SHA25644e41cac9be3a3fddc6e92d2b1b9f11552498e067db27fe611c828a3688d05b8
SHA5126973175dddb72dcf7afcb3964daad2814a4a156ba5c7b6986e607abb1c62ab7bed6c07b020eb4ad3970d3ea9d13aec1e2a53aee985002979cf8e02ee0a19c9b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535bdfebf6219e2d4aab0016224ed26bf
SHA1c4a875868d36494bcf66d5e365f1cc71964c5c74
SHA256b5cf1dcbeb2a8f2dab419e52bc8f385781f92154f765be93b52876c0180c91e3
SHA51253fe9ce6d1c40df67bef3cab88afbdd3bdb18a9c41d235f48f5780186e309bd561aa6fd390a17e86f3fa7ae110d6440f45f9f79fe6ac085b4153cfeb8308c0b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2b93c6fecd59c1c7bdac3780b6b9bc7
SHA1fc72acfaea6b3cea6190e901b8c0da794e0b32e6
SHA2569dd2378bc8683a9b9b448194826cc1a79768a5c4e1bd86e70d60a3749548537f
SHA512a284217c5bbc562d8d258c8b703480e883f46e4dc0716f63f6b1f15868f89ef8636c42254aace7de1cfa0126cea71611d027c8b72075357164181deea90e3c19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592560e2f2eacab442391baf459f9947f
SHA1a0e782e46cb3ccf40a5676fbaf34da87d196f7b9
SHA256a6bdd6635b717851230b88b69700ee61fc6f9f76098b63ba8bf5edda92122d58
SHA51220bdb8b8f895b6e422a5180eca6f681abb822f657babd35ba206545c1f1b2026a47423300bf6d7f7cb6e9b5ca6cd88c7cf0cbc641d174a96d64c4705c40dc682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d022cec8449a20267d09c45f692c0da9
SHA140ab5809da9eb45ac2cabd1d2ee5ecde86cbe8bb
SHA25616bd2b4a2e7777757a9bf85c7d709de21046f12d296f590bf0bc778b4808a539
SHA512f622ce640b9ec8e11301c86bd901e2b6b330c5648db1c584431c6c4b864fc7156775da5d4a80e193dee87e9a14f5cac63294e7a6ede13b64b527f6cff2c403d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582d4d7e0775f0bed4301a88daa816f57
SHA19df574244ae863519e90e2881080bd6ea981ca54
SHA2565da6ca471db0513d28dd226eff9db5110cfa4970b1028d778db401262746d3b9
SHA512c98fc0688add0c1086d9e67e9d916272515b897d68418eed0a6cd6aeb868d6c149109c54ea2860abd7a20ea77c69f460312b7ae2e4a5474c4432e96aaa9c639c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce24a94a87c818e2c8b196242a135d7a
SHA1828ac0cee07a45df38ce7c6f6540436c4eeb2815
SHA256534e2d9b9d7586e2b1dd1d09abf6ee87a3ced10ac8e6a2ffa1adab96754430ca
SHA512b3d1d3442c18b4b7a1134b08dbaca36682ec880fd6b6fa1f97d8decfc75a75b26336b505ac2f4b3b31084f1bbe81d46271685b5db9532e4f326b819d8c13af92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee198ad48a57ff20516d5364b91f28d4
SHA1770c624cd6e66616748e4d4dfcb9753941988825
SHA25661e57141ffec9437f843677fd05965aaf49e1db976ca5bff5a9f8f8a487e1e1b
SHA512fafb4b758677f0865258afd1d4fd052d81904202275dd9f29b06b40acca07b3fbe7f21eb9f6c1f7ab774e82e751e048a1075206b47edba58887c45a3c68cfdd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adf5e919cc90164d6a32e012af701dd6
SHA1a5141811ace79f8c78a4d7e6c5df5348c8941d34
SHA2569a3352df747ea1bcc886aaec0fb4ec42a664008a81f2da66f19d2141c7669e87
SHA5122b3415cf0d3bc45c777ca29b2c0c732c0f97e77735866d36892b7bea6a1a27ddc34b0bcc2d0a04d528932de6fa4b494107de1e591863ee4793b945220a0a1c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55df0ff605a9ece510787f67301b02a9f
SHA1ac80be358c04f9efec11c02865c4bd3bea3f519b
SHA256c985d4eee6dccdcb3548738c540e76e6f145c21b3f885d8ae8abd1c3b31dc44c
SHA5124b35edaffa6269d1205e33e64d6be54591f49c3ffc98ba09ee0cc86cb769447fb93f28b33d8d8bfc2fefbcbf2397ef10b61c982221c8330bf143944ab4f5d66e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c4859852be429363d4bbd793576abd7
SHA17887ee89545b01d89d179943938ffb9d8b3c574b
SHA2567a9619456f6c226da6fc7b61da55a1386632d8894c2143599198fcd16a38498d
SHA51209e5347a8230e878c89332bf54effa52ff90b45400b8b2a8671785a3d8aec0b83c5bc899c05bbce0c5072d5b755d0889e0c40ec6cc93dfcecfc2d683d910b00b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebd6350cf951d3fb48573a4bd426c554
SHA14e91add69d9184928661f0b2a0e84a7bee64b2d4
SHA25650529f2414a434c2edc85b7d6a7e5b73bd0fb57529fb9c6b0ee3f6e427981256
SHA5128ac787e554b7df9fe6e7dfd74e236c76fa7b827d4a71ec733918702d9d74ddf51ea43b8710e85c340cb455f0d770c96d3af88d09f8906b33a7f523adabc7b85c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b79cdbf7fd5e0c29639bba8afffaf23
SHA161905e6fd3ebbe37277700111904706c92088b39
SHA25635eac7daa0fed3f41d21338f619c6eca169ac646eccfc4623e7749e4f3d5f323
SHA512bb29b64606451db71285dcd1ae509d48e7350625ebc511dc56e55f76f21907facf1703a3b2d9fbeab8c473f0862dceab4b0450becdc4ec59af7dd8ee4b43f42b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c4834d9fc26e573ec2472d8015d3fea
SHA104d1876f4416362dbe7038125450eda27b6c255d
SHA2563b7d8b40fc126732b62ed8f37ff425cc147924e6c16810f00a51aabdf3722723
SHA512a96e4e5d9798f1e9a15ea3346379647b7d5e4fe94f3b7a2bb41969365be179c30f1df7a944dd3c1316965afc3a6c8a99dafd070f87a06e80338d89744638f061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9738c779c890c0a9309f879504d2394
SHA1a9991563ee8333be41750be7fb3ca9b63fa8a3f1
SHA256d5e362792f52143b2195c051a093fb96d7fceb1396e80cb1ca704b383ec6b09c
SHA5122b3700869d0aa02d022b47755b2998713460b4d5d521054712b4a7e407306a0182b5ff88614b9df533fe22da4642e5b3bcb9a8453a6bb6000034adb679a03976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa0a2516f132d946b601f00ee1651da4
SHA1e24c7d89f65df1eac555ac6937005c214ad0d87b
SHA2566be687584a657fc9b150dc914eda00e7dfc9212911584d1b1b2acf1bc008b1fe
SHA5126d1b34a02a5d92885fb5081ae0a55a7a4360fad1da8b90852fe23a14f14cdf234d4b8418e8770c67223354b4edb720a56d6c1d0d824be84ee83ad582b4697daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7db31db098cbdef29a9d4a0c53a999e
SHA1620cc7348b60f528ad64b8b032b69dea781111d8
SHA256c59a8c28a80a45516ebe14c4102f835a82040e083fe9373c20c6de5f4d37f044
SHA512e376935a5133ea95634ebfee7db68cbee79e1677900329ff46a87caef7388b347c75742ed74abe83bcdcc846f37915fd45e515f0dca23c8a271455d9cb22abe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b277bce7775663e7e980f33aba2d84a
SHA11080b48893bff2e582264d5c4869e9d4c66895ef
SHA256fd94eaed7555f2d89c4d1c42e853047f866aaa781973cce70266c3bcf2e20452
SHA5122ab0bf91811aefba2c218ae2a6bc8a157e1ae7567894db0dc552b73d40b6db401c7ccd89bf22e61a7525a43e0721a7a19aae8908ee636aef191479f6db735b34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5517af38852d24fe2c62578dae2a60018
SHA1132c3b7c42a73989f2d3dd0cada88ece50e2e654
SHA25692c3378b372db51b4fcf885db8fe2679663006f789acb5429a97f7e3c87de2bf
SHA51249aad3a07eac391efe894de471fd3f1b6d9df958cfc7cbe8f7782f9db65631cfebcd8a57e208cb117445538b78885495c002454b556188b760f044d90c30d9f9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b