Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
a5b8b1ca2a851d9a3b476dbd44f046f1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a5b8b1ca2a851d9a3b476dbd44f046f1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a5b8b1ca2a851d9a3b476dbd44f046f1_JaffaCakes118.html
-
Size
121KB
-
MD5
a5b8b1ca2a851d9a3b476dbd44f046f1
-
SHA1
e7bc29bcc37515461b731d813761c93c4f3f3744
-
SHA256
5f3d93d2b9ecc9f24938206b846780e0b1dc1e24c8efe42f50ac0c52726d6593
-
SHA512
465b7ac1be390b8c9e9468a27922fe5890757cacfeac34e415675e8ef9d6a43ff003d574fe89484e2c97f98f1f1ccdd38984a74460c654441358f00b76242884
-
SSDEEP
1536:pJkazg9t39IVGquRayfmbhrwrpETr75W8HAOmhev:Mwg9inuRmhcE0FG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0087d1ba37f1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C7C060D1-5D2A-11EF-9F09-428107983482} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430124249" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000000610a3c110e5aba190abf20bb326d1b07dbd92a056d2f2a767bd16dca8e0333d000000000e80000000020000200000006371a477acaa898667c3cacd0f8d916fb47244184c2f3f615fb1225b63627dd8200000006da5549b051de77e235487cf6a9e21798a792dfa9aa6f3b355486778ee15ae17400000001030e40ac03b26409073f311d8644f3919d1a69949c656185758c19ed21edafae6c7d1bab34d079e12cffdcc5a87d4587e7fa6b146c32b9719e9e50d58b1bf75 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2816 2252 iexplore.exe 30 PID 2252 wrote to memory of 2816 2252 iexplore.exe 30 PID 2252 wrote to memory of 2816 2252 iexplore.exe 30 PID 2252 wrote to memory of 2816 2252 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a5b8b1ca2a851d9a3b476dbd44f046f1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc7d017b60d148c5d267a8a784193172
SHA13f6e6174b4ca1d242954aa2a801962bc7e14a8e6
SHA256189ce82ea73531254b7849fd43bc06464f23dbf8ca5d5e60578f4386c7e50316
SHA512608c9e9438ca2ed1fa3ad6dac0c98b17b4cecbeca0615cb285e783ed141ccf603066091686caa0ef648c1ae2fe31d726ff85af28ecd54187858f7874b4e1352f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534cbe6f6074e1ca0f28740388918a111
SHA14f5ebce2516c546aa1d48a44cb0cc938c7adaa24
SHA256b29806b0bd19922131104ecfa7588ae21300cf4a041d9c013195cf32d67bdb5d
SHA51215e3884143b4fe91932ef745974c4ebbb577b85484b6ef11d344398d6c7f2f257f360f895f44bfaea871257f2dcb47b34d5e8a2ca8cc78a7aa3c259e2d442d64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc6740de567915c90c07a38fa0dfc184
SHA19dbc860d3714435c653f139e57b53df7e0120ba4
SHA256c7e6e16e30699e1d3d92bbd9c716d16c2ce2de3c69572d582252abd02012222a
SHA5121fcd36b8d98ae71ab886ad2cf64626e2c5ea18099e62cdcd563dcd1402a25397eb964e0bff23a6c5c77ee46fe6f7f4da84ec8a0857c0080997c30e92a7d1a10b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55480a14a0c164cd0d30871a53c0e780a
SHA130db02ef4a2dd6eed96a1cc3f6e39da43f4c007f
SHA256db4d37c280dda487be81783a1dc721d09173d28abde7481ee892a1b5a1d0202d
SHA51234e09b7db562e6996a04e9933d111bfe09e0d21c30b0a2419fbe54076e831aa4f8aaa4427bc5ea64358254df4f15b764ed4b0b87159ba89b6ef8a2cca6532c31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5947d184b3e3e9242b086c2fb074dd021
SHA1dcadd769e05cdb4b5e17b976fd15aec98fbb0d38
SHA256316ad1588833f68704a73898cf82f102cffddbfa6928522502fa3a787fd1a6ab
SHA5124fe88c2fa6966b22323c08796e7b9e58c52a4de060ed3100ea38a4c5f74f844dd7ed579021e79ceafd17ac8e823f5a4983608efb65ac4be194f769fe46914652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c40e9c3ce327d6e9b4b75ca173ab221
SHA1f56313d1ccc51b483ffe8bacf67fb61e8df42f78
SHA25670c358a2b30bb00b3dc91ad9468303a16a72a14bc924812515fea88aede860e7
SHA51245f72392bab8c3285c878da6003b24fe5f6b6e987422e5403820361ae4bf57f34c89872847fd3f92d80cabe785620c1a13b47724a0a4f5bec17051b43be68151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e73a66677c41eade03ffae5021b47e53
SHA18e2b8695c3194087bb68e977248ab84fec5bd857
SHA2563d30755ac37289aaf4b59042aac5aa88dd12ceadb00d90ef5a7e932c36273e66
SHA51245a3b38cf0840d318f6533bbc4dfeb97244a2a280a2c44f3b4ec751e1084ddad34739a3ff905d9daea33e221e9a1d4251708bb1b526e331e88a60ba5ba4e75a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b51222af6dea7f0c1ba49109bc4a6578
SHA1cabd110866f306e4544aaec217de98284625d7f4
SHA256f39e1d4738ca57ecfadb6e3c669938232a8bb70009c4691aac323ec64ab33ca3
SHA512c087d563da1c40047e9ea1a7ae3393c27139bf88a0f879c4e76b3dfd0b95239e8bddad592e9c3e1d50b57aa9faff0394bd62eddab36c3f3e1f4764e52e8cfd86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d0500d69b02f02e3483b1d173f2613c
SHA11d2b1576c985032f85a2dd3f86ff93af656e7065
SHA25697fa90aba47420edaf400599c498a331a321d17586f09fcb2820dc4a3f1fc434
SHA512c1c5776e6fe252775141458dd0283ebd8e81959791305475ddd0b6e02b6dc165b0ae4fe88a68c2fa5a2193039ca67569ad76c80f6edc34122e57652d8aa2d947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5880a54e99719291f69a44afa43be4a1f
SHA1864a2862b52526d7cf5a94404dac9a7b730145cd
SHA256b2d33844edbd54b86fe3c13538bfb2ce0ed07fd0067108535745c8c7f6afd722
SHA512a8b51141f477e47b1c1928f78e036444258d6087cc2a540c267c85b00aaae6555a5509d822462ba5697ec994869a9544d59a412c8834fae51a9eac729d74c7b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db5e25ff1dea7cbd03c5b614ffbc3139
SHA1ed042a1548dece6f7d9f35b120494af11a602993
SHA256ba92cc2b4a6a2b3a83580ce542beed69331208390a4ec622976340ca7052656b
SHA51277a8a1bcadd77c9d90560e71659b680a2e62789af4564464c44d9672b893d373a8f9e63cd6fa705198decf8b6dfe543691044c59b992cadbe7544290a421baf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0c3b087d9ebababbb7182158b81d9e5
SHA125772de009110756d32b174cf401ea81943beea1
SHA2568d4dfce5e1f6c9c5be3b87959a84a16f75d27175ebb06c37afb23e0c730abf9a
SHA512dd16a8111f1c447fc389e7d34faeb27acb0ec6a26f997a754265ad1825eb778a183454adf76de0e2e6e3927c2e88871880658e88f6c80c5f3911275ac0d4e532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb5a2fcbc5908fa3372d887f6a6717d1
SHA19f103c76075ba3457968ac3ead779bb951bcb3f8
SHA2560cce7ea72671e0f77433869f38b95e74a9b2053114ee8fa689f709198f1a790d
SHA512c4453de85d5bbaa7475dc8c9ba5ccd9195b605758d0bf6b23a408b6d36cb910cba47e5027b953246b9e477dbc2b444eb6e267048db6df919e03fb39603087442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576cfe25208735f5bb6068e6edf282f48
SHA1427ea9837c91ed17e510b3fce43a22c5447ea9f2
SHA2566285c7d280ed0ea9fef9f76a9b96da26685ef96cfbcbd3e768bd64dd8df5a268
SHA512d474910262dc95fecca0213a7ea77ce059abd50f6d43d8598b43730e4088cc5f64a5e548ec6111f0eba57b2bda87d343a0304b9ef75bbd45f9fb69e2685797bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e5a4d2827b77774679277107cbaa5c1
SHA1c2e68220a3d0437ee1b0703ec20d428005c5f6cd
SHA256db0e38af6d62fb486f0fdb94dbc97ffcb51b5d2ad72a8ea5e82ba63ee9b7e2d0
SHA512bc8ce27fd77b801826c4d1d9d95fabca77df8d2445d7a69a3b313c3a8b83b193fe2e804a6a398a29d78ccb257aaa128936f8bdcd1bcdbdc46b5cb901c1d18dac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0324e7e322c9ae504c74f177e66424a
SHA16d72bb3ea499ad6fc8ccbba49ad4ee3ecce67ed9
SHA25624baf6776b7ac0e7c52bd33d77dc2c0b7db21164aaf250134c80cfdee4f03070
SHA512095ecce8f6e24eb6e6c991f26b77d5fa823790b87287905094f98c89b0cd2f2b983c5ca0ca921dc7a36f5d85b749714c30cce748e9038179cf5678cded8e3624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e7dfd5b95522015f59a28d7596f4d8e
SHA119538d4cf794ad0652b945ccc7994e5743233fd3
SHA2564e53f59fd9fab39115d6b504f0faa2704a2c122212f364004b27604ae54f8a4b
SHA51256af2a705aa4ba88a3aedb7130285b3439038eaecac0cc71e33ef304f0ebaadf89c0c340d8dc5d526c5c536ae9b5ec41536511d7c480f95af5911c85db82472c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9fa9d4c1e5d8caff3b7ef660bd53022
SHA16cbc7e736a57041662cbe3531d66db8d093b3a3e
SHA256eaa38db11f651a5c67287561e56e8b62987f8740b8cf8be63c48a252af6471e9
SHA51272725d382201a8adbb401b7bf332be43a99ee7506c865b15081f1fb46090f282fc738de602314b378b61eb54d419663ef7f6e6fea0f7d78548b6853753f768ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564af77a000316f3f6870786c5ac7329c
SHA19c68f5dd8f9ce7f354effb25becae9e89fc22737
SHA256e20c867071126c04f6ba5d2ae56d1540e380e6b5991ccbe7c2c7e681991e718a
SHA5129304c9d6dfac9d31cd0adf2977b9e98070d348b780cb198c23eabd9187249fe23534c63863341f87af5fca0bb94d114d96ed31bff7877a441e522e2cac68e760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aea8e969e22fc8e5bad6e2ca43240db
SHA191f32b268ec293e673f0cd6b5efe5c0da175557d
SHA2566728d20ea94e8a6eca7280a79df034b157942cdead54de27b358830a1e5af780
SHA512ccf126f957130b24fed1b48b4dc09474b8c50dc3bdf829f10862c9eba19beb1735e5359dc97199423f929a447d21117735c146a3f4984e516f9fba7d6d538044
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b