Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
a6e398c0f56da71eaae2ec15854bb163_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a6e398c0f56da71eaae2ec15854bb163_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a6e398c0f56da71eaae2ec15854bb163_JaffaCakes118.html
-
Size
26KB
-
MD5
a6e398c0f56da71eaae2ec15854bb163
-
SHA1
f3ce38f01704843c537637e4838636d9770618a6
-
SHA256
35af73f641202736cffd55dfae1c9949cbe827bf3d3f5b634549245ab38056ef
-
SHA512
6876654d09d09e43ffa6734037cc1f9abb18bc088c7245a814dd0850778b710743739886cc2fc6034c4019b72ea6b1f68331142d9f70686f90f9c70ce0fb1287
-
SSDEEP
768:m2huDWbAH/aizO8Ew62Q6AqQc6eQWSmQOCSQah2Qsrx2u4Tf9T0aQTPeQW:m2YST2QxqQteQ/mQXSQg2Qsrx2uBaQDQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430150617" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000b471895b3318c570ba46bf2f7a5cd704670de0aad6db04b716c30c4c17ce0386000000000e80000000020000200000004f3f293042cfe0d7aff0a2281724479ded1cd429d9bb0b8a09ce6fc23416ffb120000000ab68107fa864dc6ab94fbcfd798bb3197425207772f84c23dccf4eed5662e8bf40000000919b38076d03dca24fa56e2fec028600b5dc408a887ee9ed201be873ba707cdc0aa5c6d2997c987a85de9c15df1af3105072ca264f2dff75f21a734d90f42383 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E0FA571-5D68-11EF-AB8C-CE9644F3BBBD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f002160475f1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 904 IEXPLORE.EXE 904 IEXPLORE.EXE 904 IEXPLORE.EXE 904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 904 1984 iexplore.exe 30 PID 1984 wrote to memory of 904 1984 iexplore.exe 30 PID 1984 wrote to memory of 904 1984 iexplore.exe 30 PID 1984 wrote to memory of 904 1984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a6e398c0f56da71eaae2ec15854bb163_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540b336e5ad5b7b4f3211d1c8d24a1c63
SHA1615befd7baa0ba2072f3ddb6ccda8e7aeafd9585
SHA25643b7f47a894e9b2f88b8e5af941c6bf69683510dba2548440a82542b13b1395a
SHA512f413168d9f32e8a24b650ed2c6aa103097be59e3cb0ece4b2b294823919417ed5e3f7eefc57c9a2e8be29b6f6964e5e14b7c5a9d27887988dba6e758333a5b19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502ea6382fd5385ec73eecd781ca13c63
SHA125f19a2aef088720c8e429d24404e33dbedee42d
SHA256a559718473369bedb3b727a3cb25e7c94c72ff9b8d9847ae65ae8f7706d55a0d
SHA512694c4ebc26eb1381775f0b0a40d9b1fbbcff4022a03faa79cae143b01c478ccb7fec509e0c3e520ac3dc5f067073af56e9243455c3d75927d7c87dccfef267dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4681d2381b4de22dd044f27187fc24f
SHA1ad2fe3a67a1e5ab197524477c4c2cf6e66ed1b96
SHA25698de7f15932755e512a45c71b85262c7928efefcea811af93a5b842ce2caeaa5
SHA5126596f17deb29799d29feaa6a6a4af37c47fef3d51477a72700979d22cce4caa2c1420b39f3a9880934f4a44f149d65c5101614b4b99999bf3b32ec9cf730cb48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5601643f4572f55a3f8abdbd1fe4eb376
SHA1efa7fa2f8f23a2696bfd3bd3c5d358a15059691c
SHA25659601aa99bfb064c215fa0bbc3e77ab7278301ef0e960d890fbf310fde7cfc6a
SHA51297970b66e909a89f5530453f349dc0abd630a3601f93abf3fda96be551929f4789627db240ebe59ce413485adb23c84a7e08701149d345bf26b56497914f1ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9f2d16f96b9dc54a114b670bb58791f
SHA139b9b65cff479c37997066a2536b58eed8ecf42a
SHA25600fcf328e9de328378bca3ef3222185576c489d1df5681a2b5c1d832661cc79c
SHA512300f669d3be627063f1126ebdddf4d3ff91578482858b3c580c5cd8715a9dc4dc5a1947641fdf862cda4d7044e6ab8f0dfbf4c73e7452c9e9cff3cfcb0ec25e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5706f0f2762468a57d1763e7fdd1a78cd
SHA1e5b8d971ca87450aa6bda613d795df0e55ca9505
SHA2560d54567f55dd99cd3deff36f86b238ef7c6f89c85c41d06ea2329446461dd06e
SHA51298ef3c6f53a8baf3850264ebcd91cad8068329cfde109dc69096a9c6609b3378c38ae7723065a775f26fd0f95aee952f54892bcd8fe35f362c3aaa3ad11ef54e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5812e0a3e459cfd910604dd8c6155a95b
SHA12163d5ec0f73c8a6fd3e8d8dbb9e88d5accd37d8
SHA2560b97ea72e27374984292a45194b08bf02a7008606c914ea6cdb3ead62ef192ee
SHA5120a24bbcca14141f79328187da232eab96d04e1aa3d9d6a5b0a215a18d0c1993860fe45f1f95061c5cbb6256e7cef93c2547c169d676bb292c559ab6496e0ed87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52af71e1fc6fee0e9900e30b72fcb7ee0
SHA165ce741bd78150dfd14d43a4c19d91860ec5061c
SHA256875c876a7535f4b0a1107af723bbf2b8c1065b090cd441c52663ffcf19b9cf90
SHA512585f20edcf5aab4bc57af783fa3a9cca005992edff12ffd7b3108c39d0ac4a7a9ea64b761f23cdd2d492f4acae8a49012c39f00e1cac24f1e2846f8cdab344d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a19277696e1aaa3ae6b4d80128fdafa5
SHA120f09fa1a8eba446988f9867ead274061a2c1894
SHA256013341386f4526b19e6d5b35db4da5fdbc46c8f89e4f3550899254b9082220db
SHA5128b112349c9a8db40c039249a5918232c2a0c2ccfc621f1eb3e19974ebb4767600595cfb8f1841a6d5cf387ba07144794688ba5a26f82733f493632c1fd8ac4c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fada645ecce0fa4c4d36c14b3e5fe167
SHA1eac4cfd284054e93349cc2030127c6f15c65108e
SHA25620ed83e883809b8ca7fa108a80fcfcfbec5d886de1ee4078eb290e4df514636a
SHA512e7d21358b896bd46b7c962baff50d0ca44e4a47f2bbab8b893d54139fcaebb454990b48001f8d9450595e158b4ae2ec045ea0585f6a13094aeabd44e5a41ea35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d94b2bcb0e8733ab121e10f5f877508f
SHA120eb77a1f104e4c7c8534d0f839b7fe1b0b5017a
SHA256365935916bd6642601ebf9352389c0df72adffb16fe5a6ec07c2ff3252df5043
SHA512b5b1e55dde1e0d37310d6dfc9c6b4251aeba1c676ae7858105ad648b52744775f1c3329848e8ff0b440fabc660b98df19af6943b5a3d20d39542e135d76b8fdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd0e66ecf97a78620dec0e3b795d94ec
SHA1c4561fc70113dde864fcdf2eac5f3c66b69e10b8
SHA256bd752a7bc1cd000ce6e9080a665d7cbd1f546e1222269ad26260f4bedefa5b0b
SHA51286fdfa1e23e54b18365f12a23bc816167ae1442235aec2fd9fda0fbd887b20c6f994e7dbe8871473a7e5e230eaeed30b26383fa9397b52727d4a0bb46fbe5567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b83b0da21a1cf0bfc34040a1d11ebb0
SHA1fe6643a596d2c0ee3159bfce988b073780439d4d
SHA2569609d1b6091cc3d10ba1402eb307ffe59f1fac5b4a38d47b098bf82eb441e917
SHA5121bd860a056163062d840b276c9cb1001d301352cab1aabc2ec1050571ec7ec222800bdddcf77d6f482c4b7ee3bb3b18edb0ea29e3e477eb809e8637af841ce42
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b