Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
acd176e5eb221c727b117ecbb1bb6516_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
acd176e5eb221c727b117ecbb1bb6516_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
acd176e5eb221c727b117ecbb1bb6516_JaffaCakes118.html
-
Size
27KB
-
MD5
acd176e5eb221c727b117ecbb1bb6516
-
SHA1
ab7b5e34bd480bd503f7a84a9d2221688165d9e5
-
SHA256
4b3af62dbd080f02f082e2cce1fee0efd45799c5ce0d37ecb75e8978dc96b3c3
-
SHA512
12900786bc068ed0eae0026de140b4558b28ab9e2b50bc0329c9e5993b24592cc5af5385bc10f908e16879a094ab719a0378fc3db64e757d354af241970611fd
-
SSDEEP
384:x53H8mf53H8mf53H8mKZfQ0hjuPtCwRw+wVTZ:x538W538W538lvhjuPswRw+wV9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000ae17939cd5968d01d9df719dedcf93076ec2f022bc9f70a59df16502d643f6ca000000000e800000000200002000000036499e251bd870b0909d44a82b78959c8d4e417eee61690f6a31cbfb0c77bd9e200000007b5448eb52ab96adb48d8de91b09d71b87249c4d15a7b74697f67d668616df5a400000005c402342c85607a8953a823f9266ea8ea1b271366a7b728c24db696529c680297d0465f8109c6ed0680f0b88de5b1c8706ddd69ccb5b96635fa8a8b8dc3c4a03 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9BFAB7C1-5E79-11EF-B704-42572FC766F9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b0bf7486f2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430268054" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 580 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 580 iexplore.exe 580 iexplore.exe 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 580 wrote to memory of 2060 580 iexplore.exe 31 PID 580 wrote to memory of 2060 580 iexplore.exe 31 PID 580 wrote to memory of 2060 580 iexplore.exe 31 PID 580 wrote to memory of 2060 580 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\acd176e5eb221c727b117ecbb1bb6516_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:580 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b76885a40a621b86134a253a5839a0d
SHA10ed9286d689acc3e400fbea269b5e5aac4809ff8
SHA2565a7c4a40628cc4a939b113580ff40a19f4ca2fbbfd97df4c274e51546bece9f0
SHA5123c4cad27213c2d21726dc8b0b5579e0aec6f5406af4e9662d84be0509e13df0e8e8d12e87d6c8bf06de6214bdeaee39955edf194a7dc20cbd8d66ca6e01835a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599bcaab6e59e3ee328d827c0406a1cb4
SHA144b8dac938f68a7f0f09418ef80ba9bdf26c5a1d
SHA256aabee2e801ca0da8e97a4708bb12ebe4da91aea7f084e2af5114dd72df64479b
SHA5127c3fc2428f5acaa3ede084397fa14de617ce7621dc9e1c4ae2c71f3fe597e7d4451207fa0c8c73624eb14041c2d5e53ae9e5a1e50f42fee127d42a4e47447056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae9229af67a1f7d44a4f124516b02860
SHA1b49b40eca89e4f3c5709e6cf3ea94f8c7e0269ea
SHA25659eb5ff7fb622e067c80c9ded24e642662a85d62d7ee9f0b6c9f9479639be631
SHA512e4136bad2849753bc12fa127fdbdbb74e21776f7678a1ade36a3464069f193291b43709166aa13c05ea36b6cae2a187d9c4e37cbba8d6328848b9077daa72300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a62aed7cab05ab1511badae06ae0d4d8
SHA1d584786b5c5c9926759045e6f270dae03c6ab083
SHA256f3c7fee44ecfce085dc45a484efd513e57579997b14663e634518021d9b6fb25
SHA512d3e7e0806f263b624ffb46da72434c852bb08a45cb0a9e156cae3615dba77f977ca6002889a24afc49811966193404bd9d81fdebd424e5d962b1f216045521d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ba3dfda80e6170b8feb8b28fced9d43
SHA19c061dca84c4838e61073f7495559e5e8a3c66c2
SHA256067a221fdd2fee24e9e7cb226681a70b8efa97032316577c7c582bae1bbe70e1
SHA5120db984c35bd6c4fa98fff2b7b08f472542b74636b1d02d2c4ab5512f37578fde58ea15dd5f062e83e57718c43255ff353c4c49104a27bf1d9e78b8764145629a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5a630c03c26c9ca819ae3ba6af60a11
SHA1b0022609334d118647567b9d3716817acc0345a6
SHA2566162023a9fe29db4432025949147e12a2b0ed8437a64884ce7a2b5adf39490d3
SHA512f8646b475dc0585d33ba3187240e9f780b062e0732aaab7a1f1c8f30723e0b1134780e50753de2374119b7e38722918714b68d79973a2aaa4a1c09ae2f48a2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f335426a61ec4898aea65d969e33af94
SHA1bbe23672bbc256dcab8a4e9253be92a5b20af229
SHA2568fc27ff0fcefbf2339c7b0cf4dffa3dcf0cff8502977a9cb28612bbcd82508f3
SHA51232a7395994b176389e7472d2c6d157051f7a88cee2e42fc5479b25d50cc017ea8de5001bbaad3f513540b349bbcd548dc78998f5f8cc5861e1ec980e893bd9fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d33af2a1fc04a953c226aec10b8e3bde
SHA13784b707b49a43b5589437b80bb8672547f5b547
SHA256dec4b7ab3a0cbfa4a6edf1233814fb8edc38ee4cc247e3d7c0cd9ddd098d295b
SHA5127081694e599ec4a77fe88bb7957a288f3d105f35ee6bc786e17ae3c1c22f34c765ed40dd18c96082f9995630cdca5d17d5d15ffec96c161109c5e95ecdc78d84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab2396d447b793a7183e1998da0a5a73
SHA1383ce089baffaa8e6c93c4a2c7ca96e10b55368e
SHA25625e1a0b5a16455b7a2fb6d28f2342c830504038ab36582806405e1bb1dacaf46
SHA512a34f146e50094746c8f05f2281d6f5743bbb9a3870f6346d85e59f8b37f2ab8718034e78f5abd06e4baf4bc698b957bb35b8bd2429b7d6c609b8307f4b8c6341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b77f4d33b2d2b4ab43a719ced01a7f56
SHA14609dbc0f5ac898a25852c806cacb7c1446071c5
SHA256d0a6e69f8fc5820c0d5a5a22dfc07ab580270c46e4645c099b29d11cffd72d32
SHA512ddf80dbeeca1ffdad3438de2a95c91cb56b3848a59abfacc5177f102740da4b465002d50f69799f299a2714b7ac3d2f540dc4253d43cb9cf6ce0040ab65a1c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c046054bc1793bb9cb64b6d49ded3971
SHA107e771322fdb4ea436e269b376fa897f54713151
SHA256c28a7324c51b9abb9d930a0d62143f7033593a07c642af0d441df2cdc7099e8d
SHA5122ec8bce566c155fdc5b6abad666d9cad15ba93950327f37021e7b9bc5a8480f2948e8eb73aa42c652fb922814c71ecc4880b70e0dd6ac7d4e0af0938208f20bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54590f5510bc9176515a539613a7757a1
SHA122a2125921f55716266391621d8a3670cf66bb55
SHA256b6c5c59c40fb3d9bcf782a7088cda6787d6b02db63407ad68465cb7d3c15adbd
SHA512093bcd6908cf70482f3f962903988e6a057fd22e4762c1630f707b260129fa55ca217b0e953edacb26a2917f18b27b1ccf4a297f824a89e277979bcb6148c723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee74fe6a5361f238a1edc404f97cf1df
SHA1d8348bd01cac371d81f6b14030220c844bcf213d
SHA256af68fcf2bcfc05069495ebb0b85fbe28a5fc26b1da9dd11b8e401584c6676383
SHA51233c161a6ad604bfb4188c1702d3f3e9b88661465e36f89ca70640d9b335ae3bdfb55c0df3a315fb99afaa3a7bdc271dd9e451fda91a7b421baae0dfa9fa27939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ea9ef0d02e5676e5aec447607a80944
SHA1e068544ee6bac75c4fee2a9280e816f26eb64a95
SHA2565a11aa3826ce0be69f6025386a2530aed91cd8f982acc6d292e58014c819faab
SHA512a84301d92c98082f8e6a0c42a34b062ccfdea354b0db5fd270dbeac0368e808dbc370435adc248adff457e98bd12aa0070bb38a9342770b1a3ed81256e510006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5983a610b7a68372461cc41bba71e936a
SHA1c84512865aa33ec3f38b2eab937b5e9d11df9281
SHA2563a363d64fe4a2c6433fa63530dafe23ae90141d3f53a11b78f738f63233e9ac5
SHA5122eb09b110eaf31020b42e493a52f5c0666cd54214992227426b65bd412143367b18d9ccf6ce34e619f2e3cbe7c4e93065e954662e99e2ece2e2c8e3a4550b192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5775b5188e3fde434e9a6bc2ff33646e9
SHA11e5178c594de3544bf6ddb140f0392fc5c4c96d3
SHA25641c899f68683b16fe9274fded4c5a9faf982fd704e72bf219f17b40c79d0a053
SHA51298a3041e3f3486b2d7b8a7f5db93bd2825fb15452399394f9e472370e49546c4ae935e63f518280da9482f96f8a90efda900f3c2236ebbfbbf8c8f6622797b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee08fbe01830ed61f0c534688758b1ab
SHA15b1869c8cb1b1364c5fc3ebc0b2117deb5b09623
SHA2563205019af59c6e71b0e59b1164166398c47c2026ee94313f7a8406105b18e5f9
SHA5125ff9e98e1ac881508b83bddd264885a8191867821c359470a4b1331315c15e7e626488b52c8cb2298bc3246d4ff74af45da1a1dc65e40270a5bca4835e78d639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c6e56750492efabff2faacd082e7df8
SHA14ac0ed638825eeb1d74e3e436d5ad8f7eb7c4bea
SHA256e1c57e21d4ecc3f4d419abdf5ee54ee366c1d6c981d8d9de0ccfb960d21f266a
SHA512f208d71eb26d610e8369c1f0a581eca74bfd7e30c0dbe4f721b91cbcabbdf096058f0c7742a96cad56b5e217dfe100f9314d929132f6b4eb09f46ba81a1b2aa8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b