Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
a91c25a38cd94915fae6679d2c0b2f1f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a91c25a38cd94915fae6679d2c0b2f1f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a91c25a38cd94915fae6679d2c0b2f1f_JaffaCakes118.html
-
Size
2KB
-
MD5
a91c25a38cd94915fae6679d2c0b2f1f
-
SHA1
3ad6167da03a5c665987d91857e0eaccddb3d0be
-
SHA256
d2b97f87d3e3108d693ada2c8103dac7f8a8c10803404e7db9d65437b71a0439
-
SHA512
55f56f14cf5314b530073ec43e77b86f3ac252bf2a30f4997b2e219761c0903c179afc977f7487fe5fbd9111cbac7d4cfcacbb7faae67963b10377ff70655304
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000009e675d1131f27fc03d46b9c51e5169cc0bc55fc465585a9a02889dde3ed4754f000000000e8000000002000020000000c13b4c3d3394a7bb1c17805728da06f360c7f7761d6bb0d357d49baa353f854220000000d047700d2270a73350b1543b43e23ce135b3c7c8f38210206e4d2e197a2b3f6b40000000c38f256ccb868579245c218e63fc03e577f4daf59b069d322e0a468bf518e2f409d2ebf0b85494cec53927124af8b84c17b9b6060372e4e6f153da505c6da7cd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430194174" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{96F03C21-5DCD-11EF-81BB-526249468C57} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f040d86bdaf1da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 iexplore.exe 2712 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2380 2712 iexplore.exe 29 PID 2712 wrote to memory of 2380 2712 iexplore.exe 29 PID 2712 wrote to memory of 2380 2712 iexplore.exe 29 PID 2712 wrote to memory of 2380 2712 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a91c25a38cd94915fae6679d2c0b2f1f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5028e70d4766ca3b0a11584a2ae02de54
SHA18581f6883dae329df3e84f964f12949b7c97f20f
SHA256b636e53796873200aceef42c8cb4199fe24365f166c31a069314ad4a7b53912c
SHA5127dfabd4703ea12ff39edbc12aae379dd1caed1ae2e8e261ef0ca67df66ea465fbf23d1f895608bb8b4a3a9c0dd85aa02e2a14a88114790708cd790ce705c0598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5750b223a39e887ca021dbbe8236f63c7
SHA120ddf441b7605889d8e5f417fa79e65bb9ba1dd2
SHA25671de4e5b59a11e03efda08b446c888d49a7995e84bd49f7bf2797b7cf78a2f6b
SHA51259449b6155801ae5904acbfd8bdbb98349145ea54630baee11ba963c08e76a370bae9bcfdab0de8cd4d90f33ad31b5c9e0922fd8cb7f0e87430fe483cb9267c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52402d6b36ce6c065dfcaba26e6125936
SHA13a48541546fb568889eb294895c8cc44b1a06900
SHA256bc70f3c5bed4d90cfb923987fbbe38d7d4a808587f0641ebb6af7d63f1d8521a
SHA512f0111451995697f506b6988aad38d003e7ae00fbd3453acb81392ce04d27588b039db69aa4697ba3d9979427c3eedb39cdc7d357ba086d421134335adec4eb28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e86b0ac905b8b9a34e1c0ab9b334ef72
SHA1d04ae001f3bb11d446dda28551ed7d16d9d2d699
SHA256755ea3d88b908ce4a18c85aebfa8d06c9cb2162dafd98c5383da1cf0b95172bf
SHA512f9346566d452e3960ba29c1ef0e150e94c1bd8f58fef3f86ae9a9c9a8aa74bca2ce90fff320239907b3b629b810db408db5ddef00c53d53492c0a9182b91e90a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9640ce22087376425f1abaf4b4b04cd
SHA10e6859f3b9501e03aab956027459797c08dcf6d1
SHA256ab4185964401f5b2af458f4393915362f9d4c581f02b1730fe5eedb42d2cd789
SHA5127ef65b2c7ca1aa45c84f20d69ba83e47094ba16a893a8f6329295cd2b41f56a638477bacc67d8e78afecf3e9efa4edd190ad236946c4c2360f5a088d93ac0e66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fca8c03765450ae158940ee08c45a95c
SHA1e025a696c2d70267237d3a4aea790c1762aee213
SHA25676224ff34bf00215fc00d4c7405614792571da8252ddd80d03db32d151603a79
SHA512a2808337096bcbb4c773568a3800515ae54870f80c575af695b7afa39c7578fd338c9fc3fa2e850f0a7470836f8a5d77a8053d7975a7238bdef51789e353a3fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55401aec4420ffc93f62cceebf43bb69c
SHA112109e8f123e6096fc441b49597cd879662e26c0
SHA256b28fec996cd09502db325445521e509d5e34aad7c81166a84664c3549028f999
SHA5123100d6e4ef7f269fb846e330a36bd397d387cbba8fb44b516ca7f453bb5e0ea461bb64773be67596150c0827a1848602a215cc040df147199d30c8acb16d75eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5005bf723aec30af5dec832a554d3624e
SHA188d1e270d7de7d275d5958487f80ef0c354c6538
SHA2560b08889649115cabbc98f051f18f31f528da11eb2460d65cfc0601d804ef9595
SHA5125e123de589cf68131a7af7c57eb17e61d8f3a4efbe7f81ec7fd1e6bcca993c1d03992e8e1cd8d8535cba0f66b737a9afbb2501c0219d930e0158ca017d5b18a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b7bac2079b8bdb32caed877ecd9be03
SHA174c16af9bab7f7fb2bb079048601d373ba227dae
SHA2566745cfe1533c342a11157e3c00bdf7e5c564cc20e744d101a039bad0130a3df5
SHA512b2c0ac390705561d55884e9eba400b5dd543c3706bfc670f17c3b238418847615d5657fa0ed7807309cf0bc8a1a8a2ac794b987bacb0d8cfcb27c0f2f8859635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5317b260d496d51b8791f70cba05e5770
SHA1414e022adf2702ef0be1885974ce9be86500532b
SHA2564edd4615fc2ed8ea459c8b5f0be23bfbcc0286f49b3ad31624766d9943f2658c
SHA51215fd851f1c4b5518c8782c3b44999a38aa1558866d0210060826ad54a3cd49acae25a3cbdca4228edbdd7c0bd33d483ccb8b8cd09d8f17f36bbba370c9fa20b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581d2aab2ab0c02c3d00632efa5756929
SHA13ef0cab525a239c5303ca70ddf24ed8b5e1afcf9
SHA256402f2143331ad343193a76cee687fa67ed60877a451d285484bd1bf0a06881b1
SHA5123499745520691f911a46f80eb81782ba6903f7d63fcff925ff376a80cb5c80327297aaf5a22d8e4e346b22bb0595f9bf86576a6dd45400477b407bc9c0652eab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc5c49c372e4b0cadcf590093c112ddb
SHA18e437be305f5246da004faaef08926e03d8100b6
SHA25662bc5b37cdf877302aafaf2b13baa401d66b275bad4e430ee82c5067e6c20dec
SHA51221a0c61b750590ed6f6ac27b53dadbcfffa93fac4b2349aad6c40763084dfdfdf898bc56aff2c739bd83af88f6022727b9e826745e4bae5528eee0c5640640cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed120d871d52fceb98f8088fad4f1fb7
SHA1bd794782d5e699d8b0a3b605e72a791acbd4adfb
SHA2563852651704a3df767e27c6cf01bad63fa7e2fc1d49e6f90d8f7f72d337df6f62
SHA5123974c6f6db1481f8711d41141e24c10d8db2de896026cac1fc179bda4ef13f00026939094cd69c920f86198c3f691f493faa1db62e927e93c70d9036b5108723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5573be37074ef3d36be1021781ce2c7ee
SHA1f3d9b3a75e994071b3d0c877cf39769f382ddae7
SHA256afde57f358148c5e49612aeca11d8cf2444160d1e47d980d15fe9b09f268cee3
SHA5123000504e0f6d3807b0d82812a2f204065fdb12844def67f56ea8caa31b6f9561c803da96f64762458c5c89b2583729a0a7c742a92c11eca94765b641454ee3fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e99ba10e3271bf7cdde0750c169a092
SHA17ac0dba4bf57dedacdcaa85fe747033ace8551cd
SHA256a60ff007c0bf30d22d9d69681f2b00da353094715d38a14b648d15cba0fbb5a8
SHA51270bcf1a6cd04aa86afbd23b678c84d8774322b56279e9d4584b6d74c7ef1f2986d8511d54f9554c83aa9fe75da4758c4c1dd67fbfe1e0c11daeb49b51614c97c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56090ac38a9c9c8e2094f869df7ca96b8
SHA144435fcc41e579cae3c670e990c342decb783944
SHA2563f55dd1fc61885fdde7cf4eeae2e8ddbc01a2b1dfce55a86e2d9c217bb60e747
SHA512a07e7a1401e73583d761459bf1a182182411141ddc5efe2fa6c8c67fedd614a7333c44d8f1bbcf30d5164db6ae6473da2f0af2b074df3fae7a3a2d6b53846732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540fda35adbaef10dc001df59bb16d855
SHA19194839c3b9c7ff80aadf9002133f16ce183b8e4
SHA2566eb1f0ae276a12747c0fb13a1ae18fc14fa790ccd98f7b3882435067b4f56337
SHA51272b8fe718c1ca827c151255e55a67eb6673bbf645016923b8aaf04abd8e97b9bb971c16c41fc789e81337141b16315b4328a75a55c7a2cd79bda0c1ae529c4ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57862eb7685698ff52cfd5b9e46df5b76
SHA1e4908d4d5cf6912f075a08a2bf822444045eefb4
SHA256decc4319e93aeedca12e62a5dd97013586a4cc3c6f0cdf3a53837a9dc87434f2
SHA512e12db7204adcbf0928cdc0d789f199153410cf3dc369fce90ad1ccef7417a6ca4e7b39bec81a01b240bd544ff7c46405b32b16903af1654166ffc484c5cd0615
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b