Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
67s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 17:18
Static task
static1
Behavioral task
behavioral1
Sample
a788af5a8aeee24b5c0fd7cc40ade4f1_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a788af5a8aeee24b5c0fd7cc40ade4f1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a788af5a8aeee24b5c0fd7cc40ade4f1_JaffaCakes118.html
-
Size
1KB
-
MD5
a788af5a8aeee24b5c0fd7cc40ade4f1
-
SHA1
c138b5fb1214f4421ea5d697d7cc5822be16e906
-
SHA256
634655207311b82367b2c33e469493ce1f486f61f33e8f802d89af4ac8a4cdb9
-
SHA512
d568fb53b240ead95f8c1a7859df8b66a9f76fec50ebbd04bd28211b2ad593f6d0749b811a4b1243ffd2723c2d711464d37be71ed43ff9b636fcb372647dc155
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000094d27b5272562265c77d3df9fcfe0d9bf4945392013e44491e657d92b265eefb000000000e800000000200002000000032283c63ce4a2a842a866dc4cf67587885bfd86981ef6b3777a3337bbbe96ee920000000456d97d3be23c0c3e09318a3d48c98f3a8b54981fc3bd5225d30d8044db73ed940000000f246214a97d25e4cf9b919d5efbbcb416bae18fab4dba0b337825d95d87c7ea8a54ca1bc7cba4cc017bfeb93e8a8aa29b3a2be98919f7e641ac2e315c52074b0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430163356" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10d1d8b792f1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D686BA51-5D85-11EF-A9B2-6AA32409C124} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 484 IEXPLORE.EXE 484 IEXPLORE.EXE 484 IEXPLORE.EXE 484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 484 2296 iexplore.exe 30 PID 2296 wrote to memory of 484 2296 iexplore.exe 30 PID 2296 wrote to memory of 484 2296 iexplore.exe 30 PID 2296 wrote to memory of 484 2296 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a788af5a8aeee24b5c0fd7cc40ade4f1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58240417f9709eb77df885d0274f771ee
SHA1b8111f2816b4919fb2d8153b45e7db9416c47d15
SHA256e0035393258712829e56f079214afb28b4d25666c1611e2597b924972f2eb125
SHA512478192bceec4ec4441bc3c35bb2707269198fa5fbe8cd61a4b9b3088af89c96c805720b2817859351c972f3c9087c1dbe6d393dbd053ce8ab21b1a405ca77632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f0f86edaf287a9d911d854a6d82109c
SHA11e30cd1a16df9341ba090e762c637504b4f4153d
SHA256eddbf9a64fc629d0b255b8a64bcf31889f7a5c18431239cd8f2aa906980b66cc
SHA51259765c86014f51fc3b4c7ba48770f582c2150b20d15d4c54449886e88f40c7fa55c262fc6a87a06a0226ebd2906756ac9b60c49adc1daeab20174a3cf97dfb99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578b54a3a432c4cf689a3eef4921ca24c
SHA12562e2a2bf9197d6b36c351a55938aa839f25f29
SHA256afd0b0e3f1fbdb773df5e0622a2719175182b90dba0deabbe624552c79873070
SHA51280808f2834d19c2591a91fba9ad50bc8eb302cc5a163581b7edcc3c5280831be83a7694062c24e49203544d0c22566b17b458bf7ef046e45efbf79363dc2ab69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2c1b573339b2c7969e1b602a35f5d4f
SHA1dcc467546fcb2b20fe6ab57b0825d4836510cda7
SHA2568ae90ac706a3d2582ab4d3f0b61010fb3dd32c102c80ed6a4ca8f0e0d4818af5
SHA512618cada511b9005085c0ca8a80bc1345d0c508a2b56cbf72e2b795739d98e0f3864e49c74999ec9e8355abaf399cf195a76a3d2c25424f6c5f23547243e1d4c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e672d915dae3c6980bbc8297a4bf0357
SHA127e347ba3d2368e4c3ccfbe9eb4380c09f362967
SHA256a089444bf6439d78fa56d6b6071b682c48532238c78ea698d60d61dea75ee0a9
SHA512e536d3ad2df7b3f6d12e1e182d79ba2746cca110c780dfe4b6716ef2893e944f51771a34621bf6a6abb9194a4a360f2b06a0c00d97a7206c48a44600715375c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f348b207cade290798f89ca4e5eb000
SHA1010cf8f88302d16484c60957f4df9b174b466812
SHA256cbafd4850b8899c09399360908fcc46d7eaf89844c4950393e7b6a87dadd05b2
SHA5122e8a5d16229befa1303050b182d4df8ce553b5495e8115010c37882234c8c09ea01362523255ce5f467b4781f87e445754840aa012281a6f72c6c0bf8beb95ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5868194415c37cd03181c140a22c0ab2a
SHA1fcd2d8086cfe410ea335ca58a7f2fbca677b884c
SHA256a6271387a29ec3537d2e4bc39a6d71a16bb37dbece64b564853c0520836cabee
SHA5126d99af8f2a38bcd593233b215e30870a0a76b6a2a3213be5fffdf8adeb70ab246506a7c448ea242d0856e2876ed3e54ca5cee5b0985620e162a442d21b0b851f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517bdda65c290b1627f4eb87b3b635c20
SHA18fbdbe28b60af7df5d1f7df9ac001bbf23922dbe
SHA256c72388fad7027d0150a18c215dc852cf0aecb44e18c384504eb5e6b9d26b4af2
SHA512b0dfed9750ea91be0bd3d8feb782ed49a8d5da4969fe9934d983fa22f05b6e9f12a2667a2e090ee5023832b4b80c7257eaa8ab964df0b10f0ba35efee26a1084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59462992bde2fb7a9f7af6208b566072a
SHA1af39cc1b096c59ef649c1b68133ef0d55e8d7266
SHA2560a3dd5ceead7dccebb147e09097d7c29dc566320e46d11a4d20a56c43ee16110
SHA51210ed08f107de88edb4aea57deb726dd521dc2355d847709eddde38e5bf1f753ee6c47e2f27229e289ebbaa4ec1e79354496e0badb631cb55682ad37d51abe6b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59388674ed857021a0748224f25f314b4
SHA1ace8b23037c2ba7eca3b8155cc540c623eb46d3e
SHA256a349270f62e3e9e2393374f24bdec963a190de69bdcaefa41b6f5ff3c2d72f44
SHA512666873a4e758b3b4773afe88a78bbfeb72426ff73e474b16ec1a1bf8e21e1a3f65abf5da54bea278fdc03ce5470daab2eb210507e15e78f4a570e19cb9cb9424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5745e8e8d8733c5a1dbaa0dfaebd66a
SHA1b2b9d99755fda793fe716d34f70e225c5c8f0b7d
SHA2563c8655cc776fbd40b131d2514b9a2191e560539146eb4513034825fbd9267646
SHA512ab95727e8fd065f996c613e5bd6587878dc737b4b65de055ce74f52b69b86e497a707c7eeea76cc05e1f706992503365cc9afc11f65805055a555497f75b67de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae5dbbb24598eeff36007aac5e369fbf
SHA1850c677a16fb0f6e67564b9dd4900f3485f8e6b2
SHA25663df8088b22307be5ccddfec8b308bd6245f0ccee1d94a8ce34de77a12b34d17
SHA512e24e9aba8ceb32077818b5e62ac950d732b138289f91eda34e8d7aa5a84afb4c4a5c97d56efc90067ac8711dcef7a344f225cdc255166193001f67430f4aaab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5462133546683c9a27679d715812bed3a
SHA1333974c44bec3a6c2d8943528bcb59900bda6177
SHA256e1cfe987eb19641f1b194c4c6dd0d94f1d92c1f384a8a47acfc0fe74d113c5ac
SHA512a41081954bec3c325256badaeec1275f53689d11d88ea69311f4a8b451da6006e5ddac72a43670755fc4ce20dd4cf045d7d4558c99bda70a73c8a1a6a47dd973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ede5ce140abfe3439eaff8e2af3d341e
SHA12d54e8de9b0da7c57cc508b63355b898d32757e4
SHA256f2f4c9f94d5b8c53771920d476374e903e1281e0cf34570b27d2c155132cc45c
SHA5127ba5731d9b73c6cff98be01d8c7a8124d763193eb1a8d89f280ee5975e42fef5c0c4e1a904f89d8f1c5779ab32f579dd2366a577267b959d3254c879109f2ae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c2fa5f42afbd217953c967ad758dd10
SHA1edafbe2a131df650eaa60bd92bdbca13ff977d0e
SHA25614ff33ebc9daaf668f8ee7bec5b3956c449524917b6345bbdae7bbb041238ea7
SHA51276e6692666af4530f27b124b17c0f9e0d471dc62b3238576597f12b453c71a0a12424ad5a5057f06dd7a83fce2f5207c4d9cd2a297cebf2cf2c5e9e44ca40ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d38aeaa786c8579d81ee449d2a80c782
SHA1029fb5804930d76c601f2700741b847a52621550
SHA256b3ce837391fe5c9b9582e8c6cfab663ffd1ad00bb81689bb450e6dafad15c7e0
SHA51246f11e19b3fb4384804f72ecf1563787a4e4bb69b8cb71b927702cfa41858c0a01d9dbc0ddf30701209b00e696acb319de0734e8a5abd1906cd0a50e71436913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550fabcc35db46c81b0f27c7472014779
SHA1cd8b3b3f9b6aab0069675f28a2776f01527205f7
SHA256ce0c619ee8176a10a68c00b839fecde11ddf31bfb78d7fe550603dfc234c7926
SHA5127952aff5d073cf1b78dffc8e86a8e6779e24585d30d7ff9a4f9eb23d599ab64dfe3b00e245c3339a276d2bf8f166c8bf87a654f4ff556219e9dd48b09b4aa067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2b2462ba54a3cbe5e92ee1feed5e6c5
SHA1ec3cb58f3d87467e2ffbaf0d26ee3c71d1c834e7
SHA256392e23b8425de5ef9eaa16c1f13a37ce64f2b3065ed42c1ff1ffb7d7b0d685f2
SHA51276107f26e3396978a8d4ff1facae076e80dd030cf0494e7b07a8282d6605eb7ffb651a9c270460cf35461d072201b2df3a3efa308d1f0412cd76263dedd9aea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fd5ea8fe588428ef311adb89f54c119
SHA133265495a9a00c412ad7fdea97075b7da4c9f290
SHA256debcf3d2fed334b558e520de2a648b9d952199dd5a329203ccee040a7c6f2798
SHA5123468ebc295d52d71eec2e70e2208f9f32689f0d89157f42f36257b4bebf0a09dcdbda670a59721422c24cdd663e8e5cc446a591977e70111615c6f6871a50ade
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b