Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 22:05
Static task
static1
Behavioral task
behavioral1
Sample
acc35f906278ae3756e16625e757cd8e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
acc35f906278ae3756e16625e757cd8e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
acc35f906278ae3756e16625e757cd8e_JaffaCakes118.html
-
Size
9KB
-
MD5
acc35f906278ae3756e16625e757cd8e
-
SHA1
ce7bd8af614b15ca7c1493e1750666fefa43e35a
-
SHA256
479d8325b47c1f58b2ca06ef0558b21af38637f83de94a720e34e0f35c042253
-
SHA512
84c5ef7d579d3304262968c8d85b8ef21ae94d2037b41049acaa66d219a6e232e8f95ef3ea19dfd5f5997f2e024289f9b5739eaf65126c46a6739497283937b7
-
SSDEEP
96:uzVs+ux7GWLLY1k9o84d12ef7CSTUAGT/kIIhOp0okHlVHcEZ7ru7f:csz7GWAYS/BLhUjIPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000004c0990ac25a087e12acd63155d6a9fb41b49bda030bf0a313f8a62792f4d6fa6000000000e8000000002000020000000a656409df5186833e208880ee736ee44fbfbfa34f25a517ba24f46a150d18f9020000000892c115b245a19938a13f690446e1da1eefce569c80a6f06aeae029e52ae4ccf40000000ef54640cb3b0025299ce8819e915f2c74d03aaeec9869e9d9330233f4864381ed0fbd5bb4140fd434e564ef6a1cd03b001de10c1b88b6834fc8bc7328af7d81f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90229df383f2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1E288D61-5E77-11EF-BD1F-566676D6F1CF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430266988" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1932 iexplore.exe 1932 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2372 1932 iexplore.exe 30 PID 1932 wrote to memory of 2372 1932 iexplore.exe 30 PID 1932 wrote to memory of 2372 1932 iexplore.exe 30 PID 1932 wrote to memory of 2372 1932 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\acc35f906278ae3756e16625e757cd8e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1932 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514ec7ae8ec99588258718d20f9f5cb8b
SHA1f252247aaea93d09b0861ac1cbf1c5f787ca7921
SHA256a9c85eb2b159ba0013b358f6ede515536171967c4f17949d957cdd7cd704d284
SHA5126a92fa420011cae92c859549a9435d7ae8ec59e0c43e4babf626e137a230fe4ffea2ecf85867110233d101d4f274074db1487f953b3e2bb16d8354d961d206d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4435325a449e4e698067cd455684298
SHA177037b1091f489e846db336ef1783755bc0d683b
SHA2567a49ae4834a01f70865bf06a493fa85fd748d75142fba02fc17abcf8ef661983
SHA512e505b6b76dd42a344c1d6a3a58e0c30431427a87be2d94e03410599523a9c98d335afa3a30243f65829514f28aa887de00784281e1dbc55db190a6885d54cc88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5759e314f8cd21ddfe7244d6dc39dcf64
SHA16afcddbe2d20cc6ae69ff32a8a545a503a2ae3a6
SHA2561767b94c23157067854eaea37eaaf6df7576ee9ada23b1876762f228dd436c5c
SHA5121f6f8c68a8d7db71467e3a87601a46b23b280adce13120304bf54aa8bc80814c2356d00cc80576000c03297ad501e1de1ba5d5f923a85d89b02ce5781ec7e90f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe92c62bc1089aa460ddf92a276468d9
SHA17c647269bd75b45cc78a4cd8448ad30fff0b0c5e
SHA2569f6f9ae8b1f0a9530eb6110e12d2f599031d763904f6c1fa1c4358c674c39fb1
SHA512b594b0ad83ea0950731f2bfcbbfe8fa3c754649ff75967fd07d898ffff6aac0495ce755e194ac2d3000a9aae8eb51a4b53dfef6cb38e5f244e3a81783974ec6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597195c70a17e982b414f836945f706a0
SHA198d0ea73efbb3205319ec2012e38fdb6ddd65a6d
SHA25689a32b04aa583f825fba782358a87e77d3644d795b612764f9b447de92baf076
SHA5120893454b6d6fcb10ec181893a2c765814354ed6ee7b2b0705c921d740f9b37f510d41e2d9ed1abde0a7f776b459fd77f3581f64d53d6da471d2515ddccda78d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500bcce1bc5356b5e4224430fecf0bda7
SHA17bd03f645523425f3ea554bc5f6d254efcf61cc6
SHA25680d0e4209dce8f537804e34b416a30e0a140f56b302076d7caae90efd83a1ed7
SHA51234a81e8b186c35f117823f8def65253c95ea6e3068e9512193c6d0fce1d8cad9ce7f0720035ad57692ab25aebe0450df766db6a9735402191c4dfc847cd659ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514513e06315ffc3dee51ab220a515298
SHA17a8040c975524a5a147f4fe280e0f5db18ca0ac9
SHA256d71b84a9af79bead5158595107a9f56d80c5f6e65afd0e3462ca1e0d69416324
SHA5126f733c006edc436da64b6e2db2c8b4841601df9435d86fadaed14405f76c6a39cdb7185a62d939ed62e53d82707cf7d2058dccf5254b6e457a1997c5b1fd4694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f043f5cf635e6a8ffe95bb267a3a55
SHA1c46f4b4f81bea1e4a62b9f42581f380120fcc354
SHA25611083bafc840edd364d1c55cd2e1dad84674b05735b6c4cdae6c6fc2a8d9cf86
SHA5127abccd06492f5e933bcbaa49f6c1248658b9f71db76edac7ad13f6621a946f16ee19c5feb7ae4258b9f601a086541869042beaefa119fd2f4b31d2b9c1b75a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594c640b73ac255bc8b122b09762207f9
SHA1822ba981bdb053fe60bc3b903dedf3f4e49e2cf8
SHA25611f666f6f31b76c6cd20be0fe36564a17fbce711fcb713faa4ea646fdee44c91
SHA512a80a9d77a33932ca33d4c1a586d267312e6820fd32d8873789472fb19def8a567d9bcae60701139e605ac3e2fa9b2997e097cc8ff1f2eaebe654f3b97b9bacee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5133d499aa15be7b2d5f046a3de01af3b
SHA11917a957857293702d2fea0dab65957130901606
SHA2562a14b1d381b1bbf50c8163cca0d4c968aa8bad9f43d248f9a27ae32562e5a7c2
SHA512f98bfde7e01641b1f0f49310c48289db30304e28016425ea4a93ebf9d86238dc2aa4a4e4b0ca14776ef3a5ae8e0e3f2205555a220605f837a50405573aabf266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5ee89a195ec31a5a5b0f33aa4d3fe26
SHA180e77f8c387b8feb43e97596039282ab626a937a
SHA256489f3c4932a7d44dab5232fe4b64ab5b55fc2d94e02721c730363d6873403891
SHA5124952a06ecf5c19f2c87e91cc1ea1c7fb521537ee285cf82067561727894bb3f3de395c397d6567869940b9738d7c1aa8115e21715786230fcdaad694aa0e755b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5bacf3659c07b97f686cfa165abf90a
SHA12fd1a0c8f0786f9ebfcb5790640424e1eacef311
SHA256626bf491065f0c438b1ced15249054f324b8ea4834a5f68ab0a9807c50b396b1
SHA512aeae7967ba55a8728dc22ac92b8bd71916bbb38bc8fbe63567a0fa574a7d7fc40940bf7013ca8cc49d1ed8250768aaae06d0594b25c4809a50645aa664d58a5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b36dc0ee307beba5ac1daa4c414b572f
SHA124c3fb68dc18b1ce4af728ec05d14af1df0c6624
SHA256d2b225bdca5c3b56fcddc577e0a7de4b0f3c6c01c6e1dacad12de083eee722d7
SHA5128ba812121411ac328600593ad0287f6a20debfd9be35779545d54697c89d9f5180c185b8507f84716199e075b73311217f35e5f6b3ed8d6cf6090fc210c8ccb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d54077efa5cd07dbd583a9090038eb29
SHA11529c4291d7a578cd582812879306354ff0326de
SHA256d9dffb8a1bb2830ef66513f108b456a2f1f3eefc04995b9c9d28d36cac7e4051
SHA512afda6028d75932b9d392b1a82d5da773bf247b5273dbe155fd3c2503d4c813ff061a22ebc4acec05bdd62b912d9b33fbdd68713a3ac8807303f1d2ca8062546c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc3e4de32a88e0cdf1f6d665f169b388
SHA1897a82bd5a222e43aacd62c9e0b24672a0c12f9a
SHA2563f76a412d09ef09c69376d7474eb1f196afd306faa7e1e8c50ce7ea22cff6957
SHA5126444cff6b74bb3481f5cc5490461353bcec8a7ada0d7d21850088c439357df9738ba02d944e44de0182496fc9bc5eb6aa71da13645faf869b2ed2a9e469915f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58af3499d29d2e0e298e94da119c12355
SHA1adeb0e73e81c64e9841d861b4f63b0fbee1601c9
SHA2565f47f200939e56e0582ba75ee1d78c64e3cf7d67a3ba14de4e9414f0b1e2e860
SHA512591ef99dc97054bd93cc8a755c4bd27483c03fb9e76a5c2163c0802dde895cd6c267f0d3aa730c9a1fe3a00edcdf12490ef44abd73c53016b056cb7256caa546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4d430c4b92bd4713e465fa5d9fb3e7a
SHA11656214bbaf253796ef9699ae899c8fd185149e9
SHA2568b39b875d5080160b1accc6a311041d86e8c0eb7b908d4cc3cc0cece2a30a01a
SHA512a996cf34f6b26ff547b08f051ad040165af8ab30165d594c01ce818293cbbdaf9a1810bd3e448e95b8abc4b4b5fe4707242a462bcc3a197f45baa064503bdbcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cac20e7651210db0cf089f5683c6876
SHA1261302e50545a45caf9b40ab7593216d6ceeac80
SHA2561c40b2d299b1652245f09be516c477520518dd3a580b8ec3511cfd076321c8eb
SHA512cf298e0b2cbb9b13a4cc70f115b6f565f4214639e4c2174297bd2f4b3086fc589eb25244c898c1546cde9cb6cf7e2e7dec6fca938e8e62261f93405d08b0592c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599c4bcaf13700c65263ed48e60e73caa
SHA1043838c8d02c5d53cc59cdfadb54af957443a5dc
SHA256c377952f239bcaf9be5e562c10a2faede3bfc7e3fea44c8d525bf781bcfd7096
SHA5129db105e38596ca8ee0a092c1fa74c165c6efd6078565a946927f3df5b1a0a9ad0cd15103e8b9652080c0ca3abc5b109748faaf2ddce4595e848af071511249ec
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b