Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 20:12
Static task
static1
Behavioral task
behavioral1
Sample
a80d855d5d9b1fadcf9870dcb8fd1a03_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a80d855d5d9b1fadcf9870dcb8fd1a03_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a80d855d5d9b1fadcf9870dcb8fd1a03_JaffaCakes118.html
-
Size
1KB
-
MD5
a80d855d5d9b1fadcf9870dcb8fd1a03
-
SHA1
3393ffdb4f5ecc17a8700be4d3707851e752e3e2
-
SHA256
9b26cea0f2f87f7851cde12658b94cf82e154384a90b5c2ba8c0e410fffcfa72
-
SHA512
f371737bf3783d3071364b1129c4a58ed76484395695e2c450d28c17fddd2f0e9e74cd9e5fc7ced97a92b1525a3b5e25b096d0541d033fd83ed4cb1055955fe0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000be46dc177638d778a9c6fcecb07a47d7f739581bee6cd50eef195855f888322b000000000e8000000002000020000000d2f67342d4e16bd0222f270ee449bde1209e63b559ead5b3a88534d724138e78200000004ed6a6e9ee2a94147efcdbb3a933b40d5577c0ed98237d8983ecfc2bcc5c72714000000035eeafe0a349c0b580eadd8c32eb42fc9ad816d150ca477921c5e749f18fa2e6716e8e2a504caa7c869adc4518f91ed94d2d2f274525da7650912612cc38f2b5 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{27A2DF01-5D9E-11EF-8EE4-42572FC766F9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430173800" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80284101abf1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1264 iexplore.exe 1264 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1264 wrote to memory of 2100 1264 iexplore.exe 31 PID 1264 wrote to memory of 2100 1264 iexplore.exe 31 PID 1264 wrote to memory of 2100 1264 iexplore.exe 31 PID 1264 wrote to memory of 2100 1264 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a80d855d5d9b1fadcf9870dcb8fd1a03_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1264 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cba5d133676bfb7a4b7147c183f1dbf0
SHA1ed2b08b8293c18045213a973ab2d8e11e5f0c0b6
SHA256d21c3eadea7cffa505dcb16dd90b84986f22d05ac6fd006df6cae5c59f455b1f
SHA5127ffffd068a0417b6476b39bdf531c4ff1479960954d738abb28d446aa23b0c66e45bf69414663945cb53f837d6ba7863bcf1510936610320d549496dc4985019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aabe8b05350add6ceafc69e46204e91b
SHA1dd980c12703a2407c50167ba87ef7e15ffe7577d
SHA25694021d592a9092ea9e80b4a779e4eb80e35e0e16d1367d4500076d9c17b21378
SHA5126b2c69bbd979ab9f01e203da6b054931fb6348be245952752c29caa6e8312d0b78dd452154a5ffcc8c361303e3e3bc35bf76ad85f771378224e0e56a20b71a7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f22204a45bdd35e2165a6c1f8846b4f
SHA1d65f826cb1125b13449345ae31038cb2415ebf6c
SHA256aca0f06db1f8e909fe675f483c1007ee71e591066d91d8bff856364e09242a18
SHA51214b4b39353d6403b4325440683b4a5de330a3f47766d3d50a9141ef8979226740a36bc3052b1c369731272a24d674e59666349d9c7e827b5b8df438ed132bb7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db75271dbddde35f351f21b54fb3aa51
SHA169cee4d6d7a76cdeaef0d33f9f0db749af3aa5f3
SHA256ca6ec7d223ec5dda4912c5a46852e3ee3d4295634a19f8af203295b1d3ff4b13
SHA51295cd772019b18e9c418fac9aff5d8655936b90bd980032b876fb8024bf7ed47b751d8f54ca7f7e8dc24444b419e85a33ff635e0df6b2c2f40370fe98e5c82082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd1b96dfdc39ce3b3188f40140019d0b
SHA104d0878ffe7edc937c462bff9799a7ec9ede5b8b
SHA2566910715d8146b0c65bbed9a40ee181a97718628f39ef552822b17921db2fcd28
SHA512ae73055b6aaad9f2767364595f4f5e9d39a2a67559fca546c07454a64703dea4f25228d47233962f21d35a64b39c69d067c22c450d09558180d7fc1be6e1060f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58916a4d3a74bd647a7612e52d5da9ea5
SHA1baa2b95ef1299cce61527873eaf054d68c57ae29
SHA256a4edd055264c99bac6be8e4a7bf7384349544685262b9354534e7e489f1419d1
SHA5120ce6c568b93243866ae30877911e5b966adee0f5df04c5b1f3eebc4ef3f509b279c62beefeefee13204bc4b1e99075d24ab2697f39f6194c3aefaccda83c78ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57601c7e5cde54c2a3c8c02ba2032bffe
SHA151cb304858d2793e6f0c3c3fa372b3f8205867a8
SHA25633da8a4bb8a7c9c5180566bbbdf3bebece85daa2c7834271c64680ad44a7b90c
SHA512362d99c2da0dd540b97d2a75747c1e802b8e377b1ecfb6ef99241792ce19b00a3922591dc5993c3fb8a6acbad95850faf8df093c341f200c507040483e0398d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5305df0d4bf588b4e6cb106d661d3c767
SHA1fde7fd893391e161ab2010050591f5e16f50963e
SHA2561c9daed0cd292875d2919772c5e25a7816880720501288b039f4e85a9a8facbc
SHA5122b65ecfd955bd075302a0b4640d1f3d0d340e41fffa074dfcb516bf10decb83e96467248c586222fd82a19aa7e4789464a290c2cc85034820b20441404e25b04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5602844eeee502d13f32d74b0ff20556f
SHA13e7d1960fe6d0cb652b293a8562cb1bf3b9e060b
SHA256ad44a0333e33efb72248162d5f56ea583580a91d5caa8da788bcc1f45520981a
SHA512c9b82a4b99834866d33eea72fd19f920f2badaf3c127a3fcbe90b768a3b6fc31858c2753cb9f5df957a80ef1be4c32c5e001e3caad567b4dc3b2ff8b93d21333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59acce7b08e6cefe6955a3c993e06fcff
SHA109619f171b5ab7d34026d42fffa45ec7c130db97
SHA256a187c8b40dc1d9b4ac26140f03ae5f76566bd1df7f3c857bad3f626125781d8d
SHA51254bcfe40c9a3bfe93a56dd1b88c171d1ee1387d170780150a20d4b558e170072baea948ce87e01e1b3d494f422bea04b76a2700d1f3debd3ace1296c2c34af02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d4304907c5bcb081dbc6531e6358ea3
SHA16b8b1dd73e097cb36e754d73526179572e61dcd6
SHA25655c90a2819d8666766148b25521ee6d869f547e20a387082ddfe720feb724d67
SHA5120cc637061aced204f51da624fb14c71752aeb9ce5c464ee7bde8f4e4d595ef720507fbc9baacbbe17bb51c682c07a61e61c1037c4ef16bcec298c3866baa1502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2a79d7943d3501f5cb6e9f92966a14e
SHA1f207e43b0e1cbdebf361ed35730f0b287e8f35dd
SHA256067689fac9bc32b83f7eae1cb325dae3f3fb5b095050701b51503bef57f7a0ef
SHA5120984965276a47d971a4c39673cc7dfc9f23eca3455dc851789410fc5cfe644d6c1f037848d8ce89badd8c98aef0453b26d018588cf9394b20927df47bdce87bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5624dff9e066b0bc5f306363418141b3e
SHA19ccca0d08736294e3608affda4f96ea5e3e7c7ab
SHA256715bc0f8cef8c8f05c82a006e99f26c175220f6ea16d42bdaba3434bcfcda613
SHA5128b5fa0c0d21b4ae4f1ef8997f4b6d403c0d6954ea5898bab323059d4ecd06b21434886fa6cfef5f03c57e06a8aece22640164c1232dbc17ccba7d1fcafb8401c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f23544008f44b012ddfbba1a9f5e564
SHA171a5bf679bcc662e25914c152ea9a97413c3b979
SHA256e885e0a30f14085b99feb8422ec5ced78a69990a79c7b3309f6c02d064ffc491
SHA512e583e17f919238c347381609eafdf38334509a3cf27a8b675fe08c36a7651a6c9f90500d4899f4aad4bcec971d01119321ee775cacef0460b7cec2a1f841d0ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587f0be1375aaa31fe59616b5fa988b12
SHA1bf2cef69be1107c7ad148b80acc8aedc44ee3ebc
SHA256b13f1ec27e750a7c6fd5bc5f22c6219382c6cbdbbe5cf5b0c69870279cc971ea
SHA5125bfb1a30569ece7476798e98f13a0fdb0486716cef8c5b9f3d773ec6c13b63840defa95bef57b9baedfc1baf0c7f8a45b1fb6d4b179835d95a40d8d7c31891ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6ab9c372850e359d964132eca2c4e2d
SHA109b873ce2455b5393f08b7176de0abdd6d8f95ba
SHA2562647dd363c2d8fba44b346b30ad6dcf5c231c1999bec999471a8e5ce14837398
SHA5123dab1e21e142679227e8b9170e71063385a367124f9b42299bb2cd76d517f7220b1e94ed548a66a6a4f600da57e3d5dd20e7301d059a812e35cec4c236ccc71c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595cf0426037763c6963537acd53a38c6
SHA1e5691528e31cd78f323f2672d7dc4ef8c7502bca
SHA2560be71713e3d14dcc909d63c4f2d03362eb6741cf8e82026f5c26ae60840f99aa
SHA512beb0f82c682c519a7e9c54f9d0f85aa1d3fc903302fbe7df343b9e0d142fe1de5cac763fd9b0844c0a4d6000c905e129960b657475e612f6c5f1c7fa1fc60199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3ae788350e4f5643c510cd771a9fc08
SHA12ed0b1f017b89985166a27dc4bfafc7361942326
SHA256bfc3fb0199ffa4fcd842c49adf1870d4aefaf753ee4505b90b46cdfc332a3fa2
SHA512befbd425150adef8ecdc488a6b0480316e38658715d6796f73f2d4a0262ea1be2d54efe9083835e2570884ee7ee25ca78338942c23192ed9b82b3d68ac90af87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c298d020d2d4c11f09ee330037b5e8
SHA17a6c599ca89149e0468e03503001022279415764
SHA256bd058dd8f9cc8835820d1a4bfbff8ac7dc4d40f22afde9fc551fb967c4cb8f4f
SHA5121d0c045885bc702431566c71e57be0d0ae7123181c07aae8b0696b873165983f41035a3c6d3fbe55e44b0647020d3121f1061ecf5036426657716dc6b4204445
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b