Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 07:17
Static task
static1
Behavioral task
behavioral1
Sample
a5df35662008541cb550c99280322abe_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a5df35662008541cb550c99280322abe_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a5df35662008541cb550c99280322abe_JaffaCakes118.html
-
Size
10KB
-
MD5
a5df35662008541cb550c99280322abe
-
SHA1
48916fef39bf5d56285bb3d4d033a5e1a17248c9
-
SHA256
573911bff0642cc5ea3c63d77f84c388e6a606e9406f9cec485b97b38ca2b42c
-
SHA512
e10e4a8bb0833ea892e8e695fd8c3523102948fce2d1d4118a91c8067adc4c3d6fa395dac0d0542509bbae0e042b9caf8a0c81749a4aef1a034d128d7e0afc69
-
SSDEEP
192:w9+4Du4gcUh1QI9f4MdcgxY1EimJQuMtONoB241dkr0R4jUXOKqS8LgF8pQ0uo:GRBUooFF7iiMx24fBXOKqJgepQ0l
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430127347" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e504f03ef1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{001375B1-5D32-11EF-ACC7-DA2B18D38280} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000c502ae144b579d960a860686cd6062fc70ce879960244064f7ebf33b2867f43f000000000e8000000002000020000000165728e3203d9a49927a427bd17ab1803ea5afab2901962cb7ddf76fea7cfe5a20000000d5ac2ba0708834d3b9d90143d4271d73d624c6492f8574e889b8ff7a19e1bb574000000071cc20bd963752b31690afabdded72c54c19941ab5d794d30a4dbeb142396e6779a6ad5f5d9f87a8c979703be519ec30649793b11108dde152d032c7461a312a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1512 iexplore.exe 1512 iexplore.exe 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2012 1512 iexplore.exe 30 PID 1512 wrote to memory of 2012 1512 iexplore.exe 30 PID 1512 wrote to memory of 2012 1512 iexplore.exe 30 PID 1512 wrote to memory of 2012 1512 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a5df35662008541cb550c99280322abe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e262ca4f9dfeaa19b49df9c305e9589
SHA1928b631932be7ad8d1aad6564eeaf76cfa279791
SHA2561bbe7468f40538ffe7ff03448fc835fd5e7ed9dd536e442bf4ec88cc070ab228
SHA512009eca1f2a8b2e2fdfbb5271733feb8c563877a4eae6b94a554c136ff7c5170d49c03bd06c58f3d5ce3a19daeb48b57e39aa3e3c13f5795965ba3c64cc5e393d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd8dca6d1e971e1ff060aa5a9515e72
SHA17d1ec4eb13ad49fbba42e91fc262360ad0a1c682
SHA2562cd9f0f7fedb973820a5580e42e58c0fcd8f8d67b51a30346166c094a2c1d86b
SHA51267f073dc8e21193b70d94bb8d5882732798d8663039d31a77646e6ef6b497ae4267c22a27637dac02f6e836e61d7dc5827aca63657537786ab88358119777e28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fc21819246077ebefa6dd0af008e8a0
SHA1aeb0822bb05edb31abd11f12d72bc222965bbca0
SHA25618a299b1fca0d74ba86461c4873d0e889fbddae2b0a45d528dbcdf0c43893161
SHA5124bc930faabef848d64eaa7e8fcb4cfe314861645c4b23b17bce31dd65757e289020b84906425158027e31f99be995424cbecfa2998de9a23460376e3dcb1176d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5393b5ad21ec073be42a0e65ab185abdd
SHA106bebea4c690b8f72ab3b877699ec7df77678bec
SHA256e7d17086d69e06560a4f663039af571693f47b35db2748e24ccfc44afc27d5e5
SHA512566f6e91b893845f3605ef279f042aa49dddedb0407700f86cd2a0d7f9cb97aefe970b6f52b28a938245da31939822908128db598f64b32139c40d592f8aa6e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565dce7063b51ee3c9bfef2c12ff7f4b5
SHA1e8beaa04b3269b0da6e8bc6458d11be82a36b328
SHA25635c5db3bea1a2f5ba83348b31a99c2a283c64cca5e0c2b00e86d8e3459ad60e9
SHA512fbf998dea787a6812690bb851b23e381869a9376a386d931f5b8f3b7482d6eac3c7054e9fe25d115854b0b213500ecbac29c1689c5f0e78b7c468651b1ea9483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ede1a90dda6c4bca0ed312904c8ff6a7
SHA1b871e2911d13e72b9c6fd2fa7a97ee088480e249
SHA25651f4f6e9f08f45e76dafe04b21cca0bca153e63c32c2fc9664802f80c1403b5c
SHA512f7d6c1c42723ee777b08c16a021b45af3da64832e02a8554485b64fd7a9b795c80a77c858fb482e88fe52925e174767a4b89b04f74033f60d7b8266d0380241e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50594b7adcbd2488c3cdd7eff26579f1e
SHA1a8309de12f202b882aaa7ff854128022cbba94b6
SHA256d84078a4a54efcd30719109575ea99ad991b1c6571f8874ec973bc93c4f9c5cb
SHA51263677741a88092bb1748c7ad5f7afe12ffcc75b51dcb48489b4e3f153e5bbdd5cf839c3308a02000f726d765101baa3ff58b16613cb323f744ae3bb8326bcda2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fb6eaa5863e8a4e96677c91fb2467ff
SHA18b0ad42ae3cfa57ff66772c34bacf99ed99594e8
SHA2564d56fcba5afcb55e3027351ce3ade1b9923c26b5ec8b3c2485705558caf91d44
SHA5121d5bd3898c36051084c1bcb29c1d1102c89eb17113a10819795038f2f794959c0876d0dc5b5ee859eb71b50495c869620e87548043e58eff87211c2d26657310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505de6b18828d452666c42ff1faed8a64
SHA17aa41ae6d171f5bc780ca71b5e21c6893216dddf
SHA256613e9abf31f7fc04a80be0d7fdca29abe002b0ebd93234f564055ce1c281a6c0
SHA512aef64ff3409ed184ee0a944e3ec3cbed7c2af685b6ef36dfae2a670aaf69fd17b75e041314ccadae452c40ed42f17bf80bd175ffbad1ecf3ab06e22542318f3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df363502ebf089498c8f037e58ba8ed7
SHA1632760023b003d15ef5ae968b0322ba8198e8e0f
SHA2568607b5127e79c4e8e1dde142995d40e6de54e7825e6a9526af3fe0ffadba8012
SHA512dfc28ead4dfb860030eac9f34a7e9bced2bb2f884d001540e048077637f97058579d89a8fac2b7c5b4ab729fa284b2964227e582eb33dfeb89bfaf300ed353c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513528fd86e35732e775edabfe802a1a3
SHA146c17770cb65588208d5439fb943f14b53c36e66
SHA256b9058c592e530a96579082ad8580a60e08e2af1278ca5631c66a32437d0844d0
SHA5125f188bf99598072bd0fc105f5dcea62e664deb2a8132c7bdde54d14e55e01b100f324b103ece0d3c25b5a26ba8b32dd80c490e12af7a1273e34dc505f626353e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58288fe70ac8640b1ea77b7c2f6d1a341
SHA176b16bb4ecc2219f7addb02248e2a25181111573
SHA256b6df730699b2d8dec2c94048cd25445cafa712fb77c78de120c097f0e4aaf42a
SHA51287e73b2e4d696a2e08fb64eb44686fe2abac7b7aa6e56ae94acbd3a6b28d221856bf2ab091e8f2a869f26865f53dc0b23837e17736d950ed8c310897dc1deff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf871026347f8fe15d3b87b48d39ef24
SHA1e23ed60db1a68ae60200e874a12ea5a75c222014
SHA2568ca9a63a61e9d6c311384ece3390f2d66c67ce3552e8f772d9c5fcf66bea0a5e
SHA51234d9406346a5924bf16da3543dfb608dd2c8b092c6e6f70caab553f9faed724e9acc575de22c665905771d368d55cc119a8bc1329617c3f760b84a8e95af0750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff497aebe357667728ca02dec5b16042
SHA15d00e66c6c15360e31b5f069d5a6779312f2f269
SHA25612c0888efc39443311cc4bc5f310bbb3ee28cbd6e600c3fb5de886c3d9a09f73
SHA5122beab62ce8a7542b80b4fecf59ec11109da0dbe2876919b7ca7d1e07eecc5267569e398a6e2d2dabc54e5d89628f8fa216ac5f95a8b524c9b61fd194d4f46395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ee4d28e4bbb68bb179428e3fd39b9c7
SHA19495312e64b36e062cdf8de979e94632592541bf
SHA25630e6c94e938e9a4324b422e4aad58bc305f50553885afede03909da380450487
SHA51279535f5a0e6413050ef0b1ac690fb97d99f11b5316aaec587e180f087ac909039006b904acc9982516f87ba1475daf574dc7c24406675b045ca2552e40be4b4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df26690db623c1ce493e40607ae711f1
SHA1f57ed39e692541504e85aa4d421258f9d20d2a34
SHA256d56ab4ab6a369c6e5d469dbba8611456253b5b3779343670dec799438fd4ea4c
SHA51288b41c6937a39a70ad290e622f96dca6ecc233a2e2178d0dc8e986e30d092a5f516f5d98249f51c8c9d15c4261942009149039d23ae372332b9fb3d11905b8d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2d19388c647ec25bb4ae66a6cb1a6c
SHA1ea84e79de965270271e9596aee91436c5097a538
SHA2567bda0eb696315a0e80db07540137999b6d3a1a3062dbc361a1bc7a26f6debe31
SHA512436005d2481f0eb380c93f985695d6d21cf61cd7d86bb288afa41df3a11b51408761589273bc703af108d762d7da19118dfe43effae1f869f296faabbc6d7c74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8e42d4ced70211f921eae707440d619
SHA15a1e7c806b42972447ad6178539cc8a4bc773b2e
SHA256bded5ee66e9ad0e4d5e9c26d639fdd596b6dcee0c4887d216a8e04a7f340e576
SHA51276daa1afa959394f8c4446b4f12ccdb403b90c87099cb859c145db9169111a86540e0cc4ef69d6ef7d3e194a38260ac59b262ddb5711ce270a001ab425126d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ad5fcfcddcf45a39c80a1fff5168c2c
SHA14f6594dc8f8df05e0d9ac2c30dfe68c26244f4db
SHA2562296fbd892abbd4b3ebebdae9912191cfdbe75edec806eb150b72668ae93805c
SHA51285a1368d611822b39e8445cbb5b4ecbcc813bf891f2127e16fe04ca5423bcf0447b004316b7732c652208657b136e30ce2376c81768731059acfb8a39e8184a1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b