Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
a4f2d2b6870b9a31c165ae58706bab68_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a4f2d2b6870b9a31c165ae58706bab68_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a4f2d2b6870b9a31c165ae58706bab68_JaffaCakes118.html
-
Size
11KB
-
MD5
a4f2d2b6870b9a31c165ae58706bab68
-
SHA1
dba9487b30b0904622977a5e6915fb472c37f211
-
SHA256
c8c7c88dae9a1581fee5b65f8898599d518fb5beb7d30ea007c992b50a9db4c1
-
SHA512
5be224edce85a056b5d9c809697cfdd28341bbdeaf8049d95c20dcb43fb7536ba18f666ab3875734db74c184df31dfda00e7b7ffdeff303ed77ebe3fb1ee587f
-
SSDEEP
192:2ValIsr0r57MfxUT8Z/w1wvqa18LOXuBuLbdU8d:salIcIQfxX/gg8LOXguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430108220" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0a3467512f1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000001abc956b99e68697cc42d01afcd2c4793d4a1cf0a9bfc0267f7ecd5c3afc8a31000000000e8000000002000020000000c6372f1681577e160fd9ffc6b18cc7cdccbff3223cb2fad5aea3d6ff4e845baf20000000b4902b88f42267f62b2295759b81094df3537df6d1d7a5c53f9e5a01edb3df38400000004eea124526dc3b3b244e819b2dcb5899b320ee50a03218251b36f19b8d60a2edef6c792854f83c3a0efef0dc6a8310a8e95e287f35fd629935260d5eacbf2fd5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76F3D671-5D05-11EF-B0EB-7699BFC84B14} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1652 2232 iexplore.exe 28 PID 2232 wrote to memory of 1652 2232 iexplore.exe 28 PID 2232 wrote to memory of 1652 2232 iexplore.exe 28 PID 2232 wrote to memory of 1652 2232 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a4f2d2b6870b9a31c165ae58706bab68_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506cd25b9a6072015ffa2cf022a09c065
SHA123a61dc12bdcb5d09c3b1f2d71a6f2ae9f54c8fa
SHA256378b1f90af699658c36e6943750bd4d7afec7f4644736ec5f8f45159df34a806
SHA512ecb39ae82ab0c4252524d491ac4e0f2aaae30d95069adf29a7be34920a08cc602c7be4c9946d901694a937dad0716b1bf68017215bb99a96509073f47d4cfdd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54124e0fefcd6df3a63e631b7d443583e
SHA1523404a5aac97a2220abc785ffb3c94c2d21b448
SHA2561959104affd6301b0442ea6671f54aaade173b080070f0f3c9297419b0f052a1
SHA5122490fb1abd4645e2cad99a7cef2baadd0a9f4471459c1f86652069972cfad11171d53fde9196f3d27f7d7d41c14f5808a525f4c0f7e7d9514388a03eac70c19c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dedaba4981462b82a8e7e8c5f5cbfafa
SHA1c19443757b4e1cdc53975891c653e8359c24a4b8
SHA2568b256ca4c42a37041bc73b0bf3c8dbad42496c2c9a4658ce4852236ad23262a0
SHA51225fde54b743461b7af67e15a577c8aa8d8c5a5642afd3452d2a17a4658c771aca19e12a0e623665d5c32904a5239cd57b7247b6b21fc73f6e2ebc57d5328aac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc1c4e9073c936d6276f39f79b434e41
SHA1069a1a8745eb6b38d4f0cde28279f28ad55ee64a
SHA2564fdd58017d88dd5d4dff48525c0c600202624d59cec90e7e5e3680530f0693ea
SHA512b490585183a7a91722c208f8802bbbba7ed9079a8d04775bb147e35f599d7129f529ee42fa10bc62b0df8e69a5f275f5997344416f3a0e7b70bc03d5f265b522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557ee84a6e71c2f8900f11995899ebf64
SHA1d39ef90cfdfccd7d2db6e41997c04a51368cbbe4
SHA25676f7601886f1ba0a37c93518c60fb80f668250de3c3746607c91604f67b9b4c9
SHA5129beb2fdf34a2559095924cd8c72306cc9e1b19037344ce46148ed780547c8a6cabfe5e85997e3179f1a38d4720803b89557b2ab216802a7bab6792d99f19c319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56df108ff1ba389e32ef76f0fda77a32e
SHA1f29a3918ef43ffb3bfd6b95a500362861f2340a4
SHA2569ccb9f9caa5d882db13286547c0bafb415d455ad0a4125d67df3e88b43182930
SHA512db28d5f2a529c41c972416d2029dd1c3024881a811c88712513f1512075350e46cb2c0885b9960eeeb918d0f745619367960d259d0995a293155bf5c27d334dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f53ce53e11d17ba0e9ce3c69cdc08eae
SHA13dd837743d0d568bf52f77931f2db16b32129a7a
SHA2566ef6d8d9e09ca8329a219e69ca124163af64d7972e4942d36ce5cdbe82e6bc4b
SHA51256c84af3627a983b75cbab92231afcd48fb2a1eab31e6e4c7c98ca084f58da43df1aba98d017e31716190e631b662625daaf554db8217c9ee865abbc6bc33d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e468d480cbfd0560ecf85a03402db47a
SHA1c301418f8400fd979b287d3b71fd5377c313f067
SHA256d1ad3c6d1020b0af0a230a6b82269efaf21cd0b900102c2464dbc04fefdde96e
SHA5120357d68a0f84597d8722a67169577d4449ce42ae2b4148f39d4c4fd803b44963a5422553d33390928e97ce074f9a61850582a50fa85aa862e461c894db70d9fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe3736c5d15e602305c55d53ed9c0c25
SHA1d71c8e525a756762a7ce330567d4be3e9b0dd522
SHA256121fdc53a7656b48d0a6851be39de145e2c28c22784cc86caf79a87547cf30af
SHA51205a2c47111a34ea1c798f2c8c23244b39823731a474f026a7714983976892854050fcc7f9383f210d9a7b7e48545345f900de835f2aeafe07f2c71a3bccbd072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5518d6d15767de02008c891cd85fe878f
SHA1795877e21c78c9dfe9ce06ff84f8c754092b9fd3
SHA2562a45e1efcf9165d4c75a658504c4daa834ef103ed1b997197b56d46636a47ed4
SHA5122cd3984cee2d8e2d6778e614d9126f417b4fc67d7f39f6300c3537f8284fbb2d125061cede281cbe6c58db3d136eae9c832b9b76a7d9174c0fea975bab3652a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aac41f47bf8fe313a13cb6692fa90cb
SHA1b485dd19ae95db9378f2967e385f3d6c7038f2a5
SHA25688304c6960f3da1019d3b9d1d39d81e2087f38b034b795811446ee42c0f17f04
SHA51244c3c825287af3bcbbacd0482232bc82f79493df327d08b1b6b9eca5044dafbcb0d86ada8a481e122b5d58fc08076809ec31e74a82a23d01bc6af556fa2472a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5313ff83d0b4f5ba2a7c37e20ddd5bf6f
SHA1953325de68e344f260e40b784c54203f2629e7fe
SHA2562e541a7c06609dbc23b7c71249cdb0296e01cb219249abab3b30e2d59a793e6e
SHA512b926fd855e7fc0575f18cdd24c9ff0d46c76a787a801de9b307f3bf4248441ee90d65073961f06630fbaf3c6736c931199bbc37f7534ab80faea7395f5ceda03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cded03d0e1d010ebb93642bd102fdf89
SHA13b6ba00881e3b200125ca9d44ad5b92a70cae4bd
SHA25688d05bfbd0d12b8d9e937f7ec79814da77e691db32b716c3a0eae8fbc8f8bff4
SHA512873027312a434373ae618aa100f64be6a4888a01544edeb3900d85b277effa3298b058876a5840cafea1cb8c666dc60f53aa84cd036b362b7ade5b8b6c918ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5536a171b933656e935c13e63c377e00f
SHA16a3c3b0ca11960ba6f13d36586ddc53fa1e57c08
SHA256b2f8434219ed69b27ee8cea3b5166929453e76f66a38ab6745b7e763c4bae1a2
SHA51295b7a755bc11f505f7cd47d20e94a8bb4c6170cb9d699dea6593e6dc846f2aeff852f1dff4068554a035bc6f7339523bda80716c3055404f89a29f9adab99d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533bb89dbbfea668d2be11b8ef0ed781e
SHA1dde10f1e3b93ec4acdc33ffdc2a190242486b7bb
SHA256a198c86fa83f5980301093c4451f914974c475a2287a1938011d4147247084c0
SHA512fafac5677cf9f8b0a7a67f4133674df156c0838ea865adb47ca69a8f9d6f6c869a872ae1aabbe52a5194c232c8a7e8c860a268c4b61ec2cc466fcb983b213317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e41e7f6278af8213304cbe5bd7d120d0
SHA186beea213b1f25e31966d1ffa3c238cb731f041e
SHA256de0f2f70288753d753a1a7c3d0ea3eaa3b9a9bf737a689b690602779bb48bc58
SHA5120a9f1a9eb1f1c6f5033acab43b99f39ee7cc9d316caca37f708c89e62b89fe2f84cf5ef21f8fe79a05286341d76e55986ba659e612f37a42424bfeb33e8b6460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5054b835bea6cb9a1d8e2d6d33cec1b55
SHA122c545410af33153cb902a88bca7c19e92a984b7
SHA256a05e4eac7bcbe2d4bb523e71d52a9455fa4af06202f08ecabc32d50e26031cca
SHA512b7a84a07f81c9ddaf69a947352b81da4809bf5a6e2df6bc7313aa9061805a9e0f95eb01b7d9c8a5dff0c292d41ecaa300547ca6f0165f1589bd1c76a911fb13f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9e1d7f53fa490fe85e7ac688d37099c
SHA1a68f357091a360ce267f0d924621187d651238f6
SHA256f486964eb9818998f495588c75796d7e2950043193859689249c9c6695b2ec19
SHA5123bcf082cfe8d5258ebe2ca17acf58f26adb56dd2f91bad0e69e6952ebc12b08640a9ca81832a25710baf65fbe0b08474d9262afc0441998e7a8507dde2ec0008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a735007c1268cd7231c9f586c921eb2
SHA1964a0f97b7f38469e5aa19aba45a3bc7a9e4a204
SHA25689aa4de2a0b47b85924483689740130cfbe4ee912c064b4fce463e91429fe240
SHA5129267f6c590bfa1c08c3a57380226e0a32c0ca6abbe6d12b0b8f02da7f9494543d236a4abae7717c45637af79624949dbf2e49279021c0b43172b0f8474534a9e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b