Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
a8a4952c2a70cd273b16b635523ecd87_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a8a4952c2a70cd273b16b635523ecd87_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a8a4952c2a70cd273b16b635523ecd87_JaffaCakes118.html
-
Size
56KB
-
MD5
a8a4952c2a70cd273b16b635523ecd87
-
SHA1
dc2b1cd147815e61c177e6f1bc6caa3fced126bb
-
SHA256
d7e3cde07c5471e6b2b588df0e42423db2d46336f1b773ab36470e74e4efacd2
-
SHA512
0322e96446a505d4222f3fbead8c57004b2c6b842dc253184cb93a1957435d4aa5efba0fd99b76ec73e2ca244345d900cf5c4b296b81c0d3e38ceca0be04b9cd
-
SSDEEP
768:OAPpYRDoBlz2YbTFB/V5s4IIyRkk/u5CqGaWiq8dtwsbzWBAmdf/IQusIFv367+j:tPMNXfsl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E704CD81-5DB8-11EF-A567-DA9ECB958399} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000c38206beccd944275d7542a5c7495fd3cd7a431bf86265a8f758b03228d8f5fa000000000e800000000200002000000013cb7ed85e4fda3990fb5d64b12556e5be02157b6c81d6111725303edbeb4c8120000000274996961be099f72d67ee29fde551963c6bd27b763621adfd08e72ca6e184ff4000000062470f006baab2e774e39c1924ec3088cefb146b39ac91ed162e73fbda35b8a8c350b280260cff891ecc423b8a7da06f537dda1989524781074e3456516e11d5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430185288" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40fe76bbc5f1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1892 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1892 iexplore.exe 1892 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1892 wrote to memory of 2760 1892 iexplore.exe 30 PID 1892 wrote to memory of 2760 1892 iexplore.exe 30 PID 1892 wrote to memory of 2760 1892 iexplore.exe 30 PID 1892 wrote to memory of 2760 1892 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a8a4952c2a70cd273b16b635523ecd87_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1892 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571bf186bc09d357f4d26cbe7f6d0ca40
SHA17a3c4241730ed7c7cf2f2d4ea475c28d9d7165f1
SHA256aaee491b8265555d67d14a97af297ddb36b865e38bbba15e4498acf532bbc028
SHA5127471084798bc34fdd5dfe822cf96925f9773334f4db6aa29a9149d2627638f28569721175949d5d11ff23d06d6ec1b717d23cd3e522eda5359c4c3e4d3ddf5c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5253e441c69dd298f7273553124476358
SHA1d66fe4fbb0f8c0cc30b4bedc39eec898ea499b35
SHA256db642ca4efe04ba1e08aaef355b851186d685afe1eb0ea3daf4838ceeb8064c0
SHA51256998d6b99853c86bdc65e869e0773c740e43f359ea33280fffe44b8fd332d517221faa4a2ba10fd3539c5f0d0e2a654be0fe12f3bcf243d3a9b09094d18909c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5b1c8a158e18e7c6dee8fa9981c6635
SHA11c609d655cb5fc0017d1ea662d97748b979f3be4
SHA256501a4da669072f29053254f85a32c6077af09eb1d4b24e6e85a96b862a287f6a
SHA51221153e0820e92167076fcc0efbcf099ec1705c07302b4bfb7807c17d400fdeef227a950f7c653e932473f514e40453c9d6ec1c024ca5d3b85369c830d3eb0dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1c191b90407fe06af7b03ab8711d52c
SHA19e1277532e161afb0ac43e910aadbc2f417da52f
SHA256563a2d2132f046892f9570acef61d87893b8a36817a0b75a39b59b5d6f0f907b
SHA51256d3510a41eb407e5cabe5695976ea84255d440fa8de390f0063062bbdd2ce44c3ff1bc4a7c5e04e6826e91e9406c18a1bbaab4346fe995cef89d16503709fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51beb6f832c1f8dc2de52f4b12466626c
SHA109bc2d48373a61527cc2fd451e144fdfd309a135
SHA2567bb1617c1f71e848a846ef915cadc55cde1be012079d8f90c78ada2d7a51f7bd
SHA5120942eb54d595773d352317dec7aab7903acf0228ca1bbc1cd3c1ba61416ec12894c8538e2b745ee0749cc9f8698c245d06eab854e3c07933d4e90e745a138233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a829780ae1ae320cffd41cacc906f4b
SHA16858367e1ce44bc5731535babf994bde961fd616
SHA256efbfec55f9eab860d4bb847b4265a61c876389c9ebff14b6f19334e5aa2a6770
SHA5121d6ca1cd45cd780cbf70c23c6a7fca18909b16897a75a09fa32b8927d37b448e76e01e357a890ad399619f95ef96140c9aa392e2d8de63b4da6e80fbbd96714d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf41929044c69b81c104faf8a4e19e7c
SHA15fdc20b34da076358ebba3ac4db579f811db592c
SHA256eac123d32f14cae8fd29e8a1862da993e98effe16745045858bf576311e091b1
SHA5129e1b6b881db884726fc9039a5faa6bd277d61ef987a88f76b1f772eebc3f4a6f8b7ea26296d8ef6373c9e7aac090e2f6553696f607d82a50e7e53a5b81dbf794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e04d81fffd944344f5727a95d17e126
SHA1c1b8eff2b56273f16db2173737f06b7303b0bbbe
SHA256ca12917352de31e7e87ad9fd6d448e82714c52df2158750c12758f23013cffd8
SHA512bc55d646c2f3515bb3b8f3f0a130fb2c749526de8eac3970339a0611d29b4560629e26422d9d0455f8e260a17faa2a5743a7b053d02185c49a46de19b96c88e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55af3b301ea9c34cb2889271b62d0dd51
SHA18a6b3cbaca5b387f0c2bc2088bf94c5b345a8d7b
SHA2564ff1c0c67f874ac1abb8e7cf3f382281ae23cb569dc39ab918a5ad193107ee67
SHA512797bf801b7327f3ba3b08563419d613442ff4fdc6474e687f2c8e46520c397ce29fd5a1afaff435fe618f24509e5ea2b6aa6a0161f69d4a09568459ab8ccb660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c93115e70a43dbd9c581782f01192fb
SHA1730696a2074151aba73888e38af4b80a018374ae
SHA256c6eee49e3a78f5bf2e62208b72af15392be26b829d27aa40de32ed15290f8b3d
SHA51288f22076322d7afeeca842d3a303361c294ed748282384cdf4d7e47385f74782da831a15704a2f5b41bd4d9c6623edc2b24246a13bf97910d80712723d4119e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b79a13e82def85415f6cd5ccb7c1af4c
SHA1ea706ddbe4b3acc37b5ad946d9b8046118cce316
SHA2569bd26268f1f82b72c0a0341c42f701ea8f3f49d9887c380537781e169f5aac6d
SHA5127d7637a805551f0fa6658e5f702a6e4f79ae29b134c35be70fa911957d17005cf783d46d1f7f1c23d1b9c645d2516eae4ea04b2ee80d6e3194cb8d3348b582c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580f4ab0f6d864ba6fe8f96219383a1f9
SHA11a0a4567ce6869a8e969fae6981769105dd0065b
SHA256806663824186d6cc641a5a3ad25f578480e482721e8bb97154e66ab181c7dc92
SHA5126f4ae64fd3ce24d7a1860ec8b73bc4adf7e62cda69d74af61bb0cd4ae783e0ce5d68c98685e74592ed8a7f9c301807c9cc800e068f57e53fe9c8db01c5e7f5a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5481e9d22cd2bc2f7c9232e4d76add43a
SHA19c80ea3fe7ce856582c70677f9f55ad51a3de2b1
SHA2567550bdd8427c12e0270840baca8d59506c2d54d214505b866abc056c811d7033
SHA51269ce4afa493abf495a77917d7186c394d6f9a29c23667e76e83141f0ae5c328cf05ed3011798ee1f14e2bb9f8859138474292aeab3a8d3572089e09481ffcf88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52775f527d662baba55b6d8e1c0171048
SHA1f0976dd078210ec1a151404978805a2a21c5a652
SHA2562108cba0dd91a40b37ec11ff2d6e23b4d6d19b796c5f7e2b6ffebfb9f9d42d6e
SHA512525de1ba72eea618346b09a308975511d0837cb9c6aabe8d0c12ec0401e926800d6d942bf36d3b01e1c2b4981b23f7d1ac0592f268d38f5bafef13e6ad2598a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a72d7397437e2f9b55009f51102a01c
SHA109a6b02154da289d82e946424c45f48785cc7a7f
SHA25649d90fbc40a851ead548332ab003f3fcc151501f83b3ca507bb401e881e248f6
SHA512a96bec87b434e4c14e618039ca759526f004781a22105e5dadee441fd3f9e86fac868bc49fb74353adba49a73011fbec3faf0cf6d619e937a1635364a93c5bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fa188aa67b31233c0b9e064c057c728
SHA10a023da07230365ae17d1fdbe8496ba42b5850f4
SHA2561b9f662a5b0f7b5be0d536fe31050bc9544600628a6ee516bb47fa165505215f
SHA51278e1d6c896023b01f0b97ec2da2107f4288c5d5122a96ee9d9bebf5d149d142c38a2ecf6d0390510e63c8a62e89e1da008c286777e2110da4f35c9016ab5087d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5470e6456bdc7103274388dd44d9bc5d2
SHA10831e52d9f9530d8806844767f97443411a2792e
SHA25668d769fbd73da47b0662830838091f1c4e3b8b849e90b565565fe54d7041271a
SHA512a617c99bf52f794f54e25c25ee0a3b8e5322c535e938158ce6e0f983f2f16775cc72877c36b0ca3bddf8684d22b668c8f9d140b53258c3be87a27fad69b70204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a280677f7edf2a57378b1ac632a32de
SHA1faa02e83419576673f3ec767fbcb62d3fecb0f9e
SHA2561656d2b8daee369179ad4d7a83197ad0760ea6625faf5a67e6aba69515a8ea7c
SHA51290de75c7e8cd6e09903afbcc54725260eb45a425b1e3a528cec7a801ff1909ca14715afdbc08c8b8f4d1304ef81364faccb15db90dcbfb95fb629b4787d5aa7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c82396913aa377cf09a1efc2f868ede6
SHA19e048e021e5acf051c4afd99ed1a2bcd6e325d56
SHA256747f3281cd7edb21db3e103a1eb3a40249c85eb036fab3cafa41ec5748f503ec
SHA512ecd65569a8e274ee01ba9f658dd2cc8e309e18e214afb348f72e3073efadbb104d78d3e5e55dfee3a7c6c3de1af3dbe9a30c55400566f5a08571bcc24a04500f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b