Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 02:29
Static task
static1
Behavioral task
behavioral1
Sample
a93892bf167fc8027e08d4e0817f3af8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a93892bf167fc8027e08d4e0817f3af8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a93892bf167fc8027e08d4e0817f3af8_JaffaCakes118.html
-
Size
22KB
-
MD5
a93892bf167fc8027e08d4e0817f3af8
-
SHA1
97e39b6b9de5ea360d7c2ef6b7403d8e17a4d2d3
-
SHA256
74d96fff31e96776220e51613b0abde9ceaefa7d6634cd9b443dbd80780f8616
-
SHA512
1f33c06aa8b9f8e7432db2b0d8884b5182320354de19004d7d01f9e5afca48347482399bcad3fc019d07b94b39ca2a0bb7096e43a0fdb16b494c0b526f6ddf30
-
SSDEEP
384:Vcx4mq/5inm15z+Om7RJjFqsyWZUC1HexjOzRuKMTt:V6q/5bjm7RJZUC1+xjOzYKMTt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000009bf35567e16ec10624f2c249f1a13db8a0c49d2e8b012efd9d0d3ad70e74a0ca000000000e8000000002000020000000cd956ce96b485b2e1d96772342e003eee640b3e5ce003e7fb76aedae76fce0582000000075c9c1918a366c72814f676f760f1f6f8b4400448b19ff363453a1a93123128f400000004c8c654a61cea0cb5b00e7f5a740b99b7ab6ac97977a25fbf4b72ea965bc55251a9d8248542b38388d324a8e9e5e14d23014d9b772dca01d8e1115f657afc68d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D373D5D1-5DD2-11EF-B557-C20DC8CB8E9E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3048029bdff1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430196422" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2808 2076 iexplore.exe 30 PID 2076 wrote to memory of 2808 2076 iexplore.exe 30 PID 2076 wrote to memory of 2808 2076 iexplore.exe 30 PID 2076 wrote to memory of 2808 2076 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a93892bf167fc8027e08d4e0817f3af8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4a8d357837ceaf2730b4ee34f186843
SHA1291af1b5b8950cd9a6b5cfb89575db0115fd93ac
SHA256eb71e7dad7d24d3fc2dd2d2972b1d70427c81373f61dd22d6435fd61a50988b4
SHA512285102d84793ab7a8f66b3e9599a41c12e22b7e43e48412e361ae69bd76149deaff46f22070d70586b0b3a71ee82124ed851258ac3337513fc2a7ff23249e76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d0bc5ecb6a8e5462a899a6cd0b32706
SHA128f0cb85a332c6b1614e1ed02de9253c84357494
SHA2560c037a607827382b84d96eb12eaccd622f8cb88050a25ad67bfbc47582c937df
SHA5125cb6e9f13312bc26d9a14ba4251df9ce7dca852ddc32ed18005359d09a520c838c92a05bd8534011ea7f7aaa30d28fbb3b25b6b27d03b4b8d1fdcdcf028c8cf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5490acb0b4443481f315d14ff0722eac6
SHA15b9ba74fac387c99b91ddd7d30a23206303f8641
SHA256f04116f08d02a2007b9a29d392df056e1da78c6085a5746196257879cf89542e
SHA51248ead972f4e1ab4439d909838cbc6180d5828ed337033611e663e9659069d9c25772e079b847c4df5ba697e69cc1af3dc2b8f49d990f23b4f488c244f0b013e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576dff27d3ff178c7530b9db2b87b1ccc
SHA1ace6f0505e4c4dcda60fc5bfe407736edeac11f2
SHA256da437bbe97e0b2476a2d497a24564027ac2cd4fe5829e833dd5da408dbcd6e7f
SHA512b115ec589be6d0881d834b01d11b518c4873cbb6d3cfc86103c141ee2436b913a0487a56e865dd3ed7ae4ccc4d46abaa57cd6824a324c8dc2c63ed87536007c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5544cd0ecd00d6428c8db066da6be936a
SHA16a6070fe53df6ceaf01e7d2a49e0038fb71d334a
SHA2568e4b3fcee74dd9c19040b95b587cd27a01d43b25e983f8cc498a7b52ae683856
SHA5121229b9b429648bd14a02432b54b9a6c1f55f4ae5fc686152cac39ac14dbd8dd34273293329d71c61c28f25084eec0364c3163c02bbac1a4efdf0a50cdded5ab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc47317e86118f7bf6168edf1473d46b
SHA1510a0e8637f19922d57f2f530fa275cc125cacc2
SHA25689a70a4c6bd83fbffe8f9107216c554dbb94af27b30f680428e56ee245fcb57f
SHA51216661dabd54e4c396b177b547fcbe7d63134d2f588528552eb2bd4f23cc972988ea163916dd1bf63f2daba55ba7f357c5b2f008a6c030f5b5f27b412b9fb1f96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6fcaa4c61376b9bd5588424cdf946ae
SHA1a9d713729441280f25e284313ed345b6ef688b95
SHA256fb8ee8357bc662a6bd7e668d4583365ca4aecc975483bdd46fbaba5606623821
SHA512e888529bf988ffbd965a5f6abd32a5c5c4c26b43cbea80c451b1716db53123851091b9ee7b93f32fafdbbb55a052c58baa8a743cd36d72e21670138613f6c6db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554a373d58b1be09a58ae7c843f060ef0
SHA143d40dfd678028d7fa9573cc0d3ec314730f7e82
SHA256042841247dff1d09d377a281e53d3490cb747edfc71835e66c80a5a8d90f25da
SHA512ee6a6cb63ae9fb4bb02fba22b32a7818de7110c6c683dfb0a4c9115253135b3a80fdd898d2bd879415430132316ca0f0a7d39511d23fc7e8b4d5ce201d2ef2ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a76391032543440459859c68b5b22622
SHA166b6a1018d62654eafe6a484257162ed5826fc37
SHA256433cf1c0c22378b3f34b089d2b7b94e09879613141e905f25e442fd281786994
SHA5124a8684b107c407e7cae949d8ecb67d1aaae2d165e3a2d3d007eb78e9e583c0f2db929008e382e3bb6e5680fcc3790df1b39b9c442bbc6df65791a111e9933762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f5a72984a57c6ef70e670e350b29b97
SHA1cacc9eadc9b922f4ae2ee24737df10760dac38bf
SHA256432dc824e134a4d0c1d70b074319d751dab26ed5aff74ea536e7b69ac538b92d
SHA51208d601b5d6f3fe11ab47f329f77a7e8f7969242ef46033a49c81a1b4014570c1c18b6b41c77d8468abc3ca40b11cce78933654c395d3594228dbd00498ae8ea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca8b1cd008e18d0eb500a78ddf1c9bce
SHA1c148817c0524b9274095d30da422afcbdba443ff
SHA2565eeba7fb2d95e96f2529aea9f50c8021250f2e69b2705ff1ae0d9e4eb176a501
SHA51217441b93f61d31ce1d4340272dcaa0ce2cce9c3a8041116310060f53051da3151a17500e4488a71805ab96b805a302685831f134bd0c2e9dfab7e1532d3c6655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5056f15d763c2010a5a91c4c2953ab3de
SHA1b9b9b9ad9daaef1e8ad3fd7fbcc25d7478442b02
SHA2560dca14daa4325af836d8d426e25944a1555a440224782405055ccd605f72616c
SHA512cf1da61bb560f7aca045bd3a603c52ac5cf91e99cec253f611d708467b392b9fe118136ae1dc6a093c6aa595617962e9086e477a4750b6a28fb7fc16e087f4a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f59534fae1509b6bb6114978bba0e5
SHA1986966824af9f977c951637eff6d8df3ec44e973
SHA2561a10efedfd6d9f539f65a86db0ab397d12c90586712da2ad65780688e879efca
SHA5120256a624132ba30b6e7dcabb82b1adda9295cbfed0da8dba0cd18b2856a5721ee45ee819bb10f4e553adc943cfa162cf80e9e8629bd96ccc9309beec3871d0e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eb8df5dda289be46ad6e412208530f0
SHA19f12ca12c5babfbfe8c492190469a32ef7f17df4
SHA256b85339cb7728ba7242b0a319b4d6eabc5869f4450ed273e303b164f1d0106060
SHA512c08527c3e1a9eade873345000f19ed6c32cd362d9e2597da6fdcfd0abc8960858cbf627406a6f59e9bdc22ffd0773c601adc938b63ea28d566a0e03a00f1f85e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f68c4f5544cdc87d494b8c84743851f5
SHA1bf8e03bca7b8164571089e17ca60a747fbe733e6
SHA256a9791469ad368f5b74e17708e321d841198d3d6a19a7abc525b41a46ae79ec52
SHA51200ac468f57e3b278a06a2db81b1621cbac7db5d1d80fe8a997b4ee00a0f1f1527484cc2f2d9b670207b97e6dc3ea04c28ad2fb92775783ee14cb4ac69ee22887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518315a216b77d2fbca4ff761701da5ee
SHA1e0356fb208bceab46b8c98f89be6070cbbca2d05
SHA256bd5c75d09e35f9ada07fe51cb350f673bad56d9006f8f0607bcb95bccc020b36
SHA512d65118b478e76a3d36c71dda4fa35ef93cf2936a2073828a3e01602cf1e649a354fceaf5d153e7d6693bc8771b8a8fda36e2fe72ffd7eef35ce7242d06c61bce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecb7e6f2bb1436220934f12eda4e41f7
SHA1d954b1f47edbc14ed73a853bfadb393c2aba022b
SHA2563630d673415a7216721d9d17f80b5ca5b8c07a08cb0c47afb77a012ca9c3ecaf
SHA5121a7d3b63a636b62f6af523e5ea937a53de70051e8ced544312b7d1ff325e56b9c0c49e801352ad47932a0a721e90f0e7e464577cbe24dd9f23fd73cc45344d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eda45a8e075a0228828dc18163134c74
SHA102371cce59bce3f4aff30890d19254a4dbf6393e
SHA256cfde156243e86e70dee2936235f67fa8d2d5b6644f2cd54607110ea51916970e
SHA51219f7c135650e38b43be62a64e46a39aa2b123318589c22cf237dc3fc4c550a29c6889a158f4d6b5bd01f045c6541376856311da3748026f3e27ddf6ea7186834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8641cdf7c5d6085404c0ad29f8734fe
SHA111b7966d10f00abfe03b973d90442dbb4f8de29b
SHA2569d89801905f37dc1fd5ff2f31eefac69b8b267b1c2bda57556c81791f15c71d9
SHA5128366113b8e3ea016cb9eb71ee262f205d2cdefa66de1673ec62e403df039311754bbfe7d4a0d04d305e25c504b709d070ff7ca8d93aa3a5adf854ee6bff48d03
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b