Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 00:29
Static task
static1
Behavioral task
behavioral1
Sample
a8d836fe6583e9e7dd2e7224cb32fc2b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a8d836fe6583e9e7dd2e7224cb32fc2b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a8d836fe6583e9e7dd2e7224cb32fc2b_JaffaCakes118.html
-
Size
7KB
-
MD5
a8d836fe6583e9e7dd2e7224cb32fc2b
-
SHA1
6bd35dbeb959eeff30995613d872ae0feccf9532
-
SHA256
d2bfdba337c16bd52cfe99926e5c7f8c750e14e84971fc1435f1ebd02533478d
-
SHA512
9925bd1ef5d37aad7454949be1a899901617e0efabf0ac312f4cdd71d859be1700cb16ac300d0eb890836879c8ede279757878a797b0a77083abd2045a7766c1
-
SSDEEP
96:uzVs+ux7oFLLY1k9o84d12ef7CSTUezfNhFBqIYP+YcCcEZ7ru7f:csz7oFAYS/9wr9zb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000000d641742400ef257c5e3b94a35785e342e4e30979b964488fcd3c0204beb907b000000000e80000000020000200000003bd41c3f219e106665eb46e0a73662135e69e001afcc26e41df175ba7ed520e920000000bb7b60f51c81e5124354c608e14d072063d3a8b6d0e3c51b8cb8905a54ebc98d4000000061cde4c5023f1f78c29ec70c214c5ee238579747361814ccf6c6c48dc0a3a2426341f12b4f60a4ada4c474c4771f652140d5ed57d489bedd789f19d884a91791 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430189241" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40b1cef2cef1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B3BDF91-5DC2-11EF-8912-C644C3EA32BD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1660 iexplore.exe 1660 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2100 1660 iexplore.exe 30 PID 1660 wrote to memory of 2100 1660 iexplore.exe 30 PID 1660 wrote to memory of 2100 1660 iexplore.exe 30 PID 1660 wrote to memory of 2100 1660 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a8d836fe6583e9e7dd2e7224cb32fc2b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1660 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5235ab6bf89ceccd80db75528d499d095
SHA17c3030927344bdd8f69e274a44289749a06a264e
SHA25635195c1e61df9dbb7382f9d59b80aa034eade3dfd94430d476605b0b71fed2d8
SHA512d713adfd5a984eec5f47e01a2e3133aad81d2767cdd8b784442b101a053eb9ef607e095e0ae1f971c54f21dffa2af3a95f8e8fa885c79799fb2a68710e252703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4c1ba491924552cc497fd1851e3c2ee
SHA1f55a34b79c4e9a26ab6ece3da4551ff732463853
SHA25634eb4a47ba1916dca6308b0c79545cb61130cfe16a30bf84330f78e668e7dbba
SHA512a76a736faf078fe09e184520a3269369ad23718c2fd187835299f3d05c0e204e0f59a70b4bbdc9fd5c9a5904dd4415a5e19816d001a4d4b19aae868492834f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbb306f333a5f526734ba75437d3784e
SHA1d9031ec3bf629be6ae6316c629d2a8a79d02f6f7
SHA256e6fe133f6da7666023bbc3d5d11cdee1aeb421ee2b945f06a70c75d2252d23d3
SHA512155ddd83f384f84c8723e61a4f1400a1a8f9f66dd758f06e2b1b7a19d8689979d1fad3f14f3fbe054970f3ac20604e383dace131071f6ada56487833f060aa5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af84af4106a754f6825040d0444198e6
SHA1454426bcebf7a98036d9e2d79866a96b940f5b48
SHA25676ed9b4ab097e262dac62629cf39a39fdf0ca3d57e906b2b4d471f0a3d6c553f
SHA512efad1b6caaea94072d291dd5518b1c52ae6d1d0c60e0a64293e9705156cfec44e98b9e18a9916700d7129124bf576303e15ca8920fa613e9b659cd9ccf02a3da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de1f542a11aa55813934b8acd8180384
SHA1e335e1920d7756bc0cc271f02a0c40abed521cc9
SHA25625be0439fefb13162eea118cb04ee9eb9f4159c51c6e6b4583b6338475c127a8
SHA512ef215dc9ff0e12d0e1b87d69a89584acbca4a7eea06cafaaf8829c352dc091fa1cfa4e366b155f419e6debf7016646c06133d3c7501599ba90d1477e75c50d7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1f39ee7d4a6eb035cffa13f684f1d6f
SHA1c903fdd46bca3038653cb9356b4ec7a3d43800e4
SHA2562bebd116b9c3bfc3666116e55d28b9fab5560cff632bc4f1c316c3fb3302ce11
SHA5129fde827b5baf880107b154e311a468ff22696ae4849e75ce5bb1b3fc8695deebac4ace3aa02bada7c5f58be741cfef43d7f890742a253bcc937b8443973deeab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e108ef4fa7b90506587fe60798d4974
SHA1cf7b619fa9453f0846e201c30be8756b6536dba5
SHA2560fef021211fb8ccf0523cbc2ee0b6af64662dd369c0442d5be028abab4978345
SHA5120aa2471492d11ab3c5a6dfc47bcd49fc2a680fb771d980e782cc4a4a07aea3331319333902e46c233619b618cc24867cafd1b5b315f882ec41cb867636dadd82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52958e6bd73f5370d06b79e23e1889621
SHA14d0384f3a22442142b184513df8d19287c96aa79
SHA256c68e45fe2293b061eded8593af4d0f44f27687536e5f41a26c128cce626d30c1
SHA512144f0bacc711355c8ad623d03012e26118440923b8ead48060eedf516dc4a4c464f8457ed83b3d9c2405a7e8f7f422ddc6dc2f83e5b34acf382601a23439c693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516faf31153f8dc1541da503a35f0ff5b
SHA1f8d0248b90cfce47def9d968f06b28d0771b4ea6
SHA25691f1c2caa7f24f1be2e3ce6b5740bbddc7239e1cd2eb23c7b6fbc8ec5f2ea423
SHA512059e1bcf5d6902c92670c3912c7384db2fbd5239fb1e00dcf68217ac326fafb93c7013f6fd693368138cb36a56493d8f4171d2dc4dd95bac4d6677d2bc43f1f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562eb1103b6937e9cd528cab1f660e069
SHA1b00491886ca27241c7d3af81d6fe8546b33764d8
SHA2567a38d41036f95bfe45e1e1e775a0d2c988b5cd2e7d8e836d2da6bd1d4fe6c294
SHA512c206b351c71dc171f08030f8b25e5d798155467cf87beb37b1829c700db522bd3f2628051c252aaa9cdea2e592f244f4107f334ca3fb1c6b74744f40e7d87cdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5225505547871d7cc56c04baaa0819334
SHA11a661bbfe758fe050a5cc9b94d05c9d1100bcfca
SHA256e298633bf49bae04c2aba17fe691e3bd0aa3fc9b0cf2322d5c349a590661e028
SHA51224aff73c910ebeb29bf4040e33768d2932ce6c1ef1b251c9358230a0656b9942d7c0c8ad002cbe49218511304a54dd3fc42cf59b3c04aff82e8126deef06565f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d63aa0bee0d555d90c0249e6446f803c
SHA1f40f20b24798036ffd34377d8ba1649934253be9
SHA2561fd13f81a07337d26672ca0b80845b63ca6c71b32e290941e60390eb912205f7
SHA512e62fb989df84f900cb198c34f64f34f85c06b10561026af2fbceaba0464c8e3fadd7be3575bd96a73d29e58de39fe74d7e4c9fc5f3c16f527b62066b647e68b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8d625020d63abb78d4947301f3f296c
SHA1001943e0d045b84739dd30b96ae235a3d1f5bbf0
SHA2563216473edd3f2fccc7b7c5f737d3ca888948a8589c6d879cb2f248d7dabbe126
SHA512da92708dcd8f5c14542f0c4db3cc9afb3a68803f459af8b16a5e472796e1dd36c50589bb9b0b03b9c4169ee5c1b85529197e663dad0e99618303dddcc41569a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd9eb9a31d12be6b8a7deceafb3bce7f
SHA1436555a3ebdd62c47b77e926dba5e20ea9b34467
SHA256440146a2d39e38b5aab2df97b81e958d0d8bacffeabcc7f1be611ca07237661f
SHA51247f7cab6d04773c6e5cc4ff1a226c687698e9d2b0783ef3254f718d2c25d55473c1fe8747e97020cfce2ae0b9ec4c08146bc2e8756c0fd297e83a7e369c09841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51090f347b2a0c128fc4c27a6d5b49519
SHA1b63526416ab13ca018fe0aa7eff615c92403ce4f
SHA256474e4c5750f55945676cd67d27c1a219cbb062d5b0a3e201bf09f0260d7b37df
SHA5121a58ee445780ac73ac53a0e0c16a5d32fa3ddf666a1b511ab66832dd1ff00111e5f78a75e92c86951b0ea7d9deb53b3fa58ce5f5191a34c129400b8ed5a65b7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cde018322840d1f54a0050e23022df5
SHA12474d4ef132b3144bb9809015f81d6aff5ff7c09
SHA2565f99d48fcdfef07d8efe9b0257a8efd96f27e67246d26a6f7afae2190c28c0f7
SHA512ffdcb4fab6a6c8b3a9eb8e12be0196dccd4ed6d1a91c3f4038aa6bb4b758255e65ef1bf176caa5e9d9cc63fb86c7519814ebcb25fc3f1f5820a1c4ea2794218a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5719aec3e63d10540839daa46f2fba368
SHA1fdfdf5139a5e6f787a514e643e73d1d05b32277f
SHA25611f2820f39d0a6926585963a1eae9031e00454dc57d51a5b4457bf078540eae1
SHA5128f70f74eb168b6b8c1ed96270d8461a269c2b6d484cfda6818e364862bb07759049ea55c67e62c96cc2efe4a7937a1ae5dd85e00ad12592a9acff07f66c59b7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a24d5844658b9387d7148f2cc75cd04
SHA1e0cce88bbc92f93f94bb5229d810c3fc1fed469e
SHA25684a198b9671de2ca7c438b5e65c668a7c39ca6636006b790d9f1cf33cdc4e870
SHA512c11235a9649693b4cd7bbe5e494bff6c0ad99a2d5ebc32ade587406d703873d59f4322b104d62c18a7a3a76c53c6f1f596525116a97ba9f5e5cade6ee75f4cef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584fa37cf3c45420fdb29567c97dcb71c
SHA14217814f4642b2adc9b6796f62ae573c2fe78f1f
SHA2562a12f152ca09235ca4cc99b5f6a50988004f08ae61ed667504056ce71369a0b4
SHA512b3d7da3266836cf6023195a660a605cd91ccaba8d7917f01ff56e3e3ca18da64d6c0d6be5f95434d896633ffe55c9ccc2b2f56ef4959444c6a2ca6cd8d1d0fa7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b