Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 09:09
Static task
static1
Behavioral task
behavioral1
Sample
aa69142a4fbedea1e5a31a209db44b27_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aa69142a4fbedea1e5a31a209db44b27_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aa69142a4fbedea1e5a31a209db44b27_JaffaCakes118.html
-
Size
9KB
-
MD5
aa69142a4fbedea1e5a31a209db44b27
-
SHA1
54610946f10bcc7327881739ab4e479beab991ff
-
SHA256
1cfed42d9aa7c7ebb673dba9de70806af653454886d7183f4435fa3d48eaa8ee
-
SHA512
eeda2efc3e551cfd2cc1af72dd1d985e69a0e6cd696db3d5a7722dcc7479fd4864b95eb2ec1cae3fbe649cb558748c7a467d1ad05c0d37f66f14e7793edb9a61
-
SSDEEP
192:iO0iJ0xVpkG3UpIsEkd1VNsW3y/Mi6gxMlAR09LAcHKqDJ7Np:f0xVS3pIsEGfdb1S0N5HKq1r
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430220464" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ef86a317f2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CD85F171-5E0A-11EF-B507-C2007F0630F3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000bf8ca124903b9dcecfc8de95ebd93a94b966461a8cf5e3c5d0cd6d3dbbcff1e3000000000e8000000002000020000000bc518b41bb0d154cecd98b1cca16aa289d67e1b6676aa74c9b89bfe119007e3420000000a4e358a6eb7d802066146493504146b378ee89e90f4a01fefaf5bd858061252840000000773a1283b1bb9b6c653c8935d4c9d123105a62526ef476f64d77cf1bb9a818bc0b3b5eef94916c50586d7f800f9e31a053088dff7851bb6777578a2e141ea908 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2344 2120 iexplore.exe 30 PID 2120 wrote to memory of 2344 2120 iexplore.exe 30 PID 2120 wrote to memory of 2344 2120 iexplore.exe 30 PID 2120 wrote to memory of 2344 2120 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aa69142a4fbedea1e5a31a209db44b27_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2856d21f7566172b5f3c27b5e4a8ca3
SHA1d632c08669d5adfde6239512df6c4cd9640336fa
SHA256faf3075fefc934228e7ebe4728e0b190e0a4377f5eef6bd8d5496732b79a4fe4
SHA5126e06f52d046e70d6f8024d3894a44e70b919dee3953a398b4689c1108063edb35df3af0712d669ee72d2cd0bf9683cb94f8fba3652de4d34780d2bcd82504997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557a6ec01e9d6e38104776b93e3f75e8c
SHA1a74d5938d18578f168878a3a095405bc3107f206
SHA25684549f4ea553814df255481f9fef05c3e50a484ce0a936cf9eb69812892d9727
SHA51270d6fa3cb5cd8c32d83fa0fa891445bafb4b0d3e9aca79aff2366087fb464eb81e529fb8e4a52815f81ff399ceaa33180adf33ea688d5c82fd03b770fa110b2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc023d2bf68fefcd35b1a8d1bea49708
SHA1dda8c838c8406e31cf0c4bcc89c7f5b425afbb42
SHA256be7b4e87f067ed6998155e4f4c850984a27e74bf0f3e7a6615d5d9bf63557402
SHA5129a0ab59fd9c29e94ca06e37d5c28473b97b9b48c44614e39a0c5595998ef7635097ba70b7b066361f9592688cc5cd5089b68e14170c1213436384bd92b754b85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba991db0d1978e99153a9ea315742055
SHA1bdf017df0dd084fc6d3f3a104cad523cf8f388a6
SHA2565f905b0d383f9a2781c2ad18e5fd452f408e749dcdfcdbe70fff6564e8dc108b
SHA5126004570d4c33d8d8847ce0647b79f24e7800c80d7d9cc21e2107028f200edcdd4e8bcb43871177d14c8526e03a9652e02a1b871e476bd7cf4572cf1aa9cc887c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ec292d122281b263d9af2edd628d73d
SHA1bd6d7006c9ccb5b34f5d49170109c8ea4e9b3cac
SHA256d5744544ec4b7a70ac71ea202651dd908c0a116f2b5c742ad33b7920ed4a510d
SHA512b798b281690fcb71e331f0759a8ae046c2ca6047863a9ef65cad7c4f4653689ef009c8b49883fd8d5a115346db75088dbc547a8e73d807ec60ac90b5f25b35af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581f69004420811cc9f03657777c114ba
SHA1779e48c36b63e84018a1530a090a793e828ab7ec
SHA25617ceb2307b746ddcc4c2311eaa7e704d2a56783cfb2f89f6fa257ed252172c60
SHA512f578d1a48e3b4b515f1fba2946837f0fbda279d6a5a35d281f942b37e5bb187ee7bcd43f85e95ce02537b6c2a6426f08cebfd1d8a7d29527573a689220585898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bfb5768b377679fa24fa94cf8b1c51c
SHA11a2db8fbe990c82b5a168670038787c076489734
SHA2564d0eaf62c08a3dea8df3762bd4f45ed46af8869fa52731dee0e7d5fda197d0fa
SHA512a8379aed80b2a46b8f55c417a122eec695c8868b51674e5b6b7839b9349b43a6329bf743c4735f6c082b924f2cd0760f97c5911e6699a5e6242e38f7a9177d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59db76669d6bb4e5b875a22a725fd41a1
SHA164b138599325df8fd5d2e894867babdfd00198e3
SHA256bc429e482e3bc7609dcc0f8180e4d18becaa1e3d3b9b6302c469464d1e59eb52
SHA512fb21c5a0df6ffe17e373d462de6e7960fea0a11a6ee8df5e1d53f69aac35d18b3f05cf482070905cd1502c2945de34086b428fd32a9d4dee5d144b439271c00a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b31ae6f5d4e71e465204608f69065d0d
SHA17632fe5a0735b8da0c347932730e6ed1c08942ea
SHA256b67f16e827fe5044319b82a34c79e3b28703c9f816f814d020a9a86a4deb9633
SHA512b49fc42b4a53c01f602297b422620c3bba15bafef9b4dca3cf333c642a57841b13db6b800b5e80d33a11b7526c33bece672dfc7e8036e5f147a486e2d9177e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccc8b42ed5fb1983c2e3cc7fb0e0e019
SHA1fe2f17450c38eebb7222740dd52cabe12089fd73
SHA2569ad267df90d0eb5373a23b0789fcca666d69e785d6f87bb17caf069dc5bbb652
SHA5122185c8fc7d4350461cadf237fbb392912547860b4db64d1897d7c67e0706181e0afccf860dcd6c793854b6abf141142b500cd18f6aa89501f7e7b700d9cf4804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adcf5ca817c449e457b0d5eb14de3961
SHA18f15e1ec2f432d9a20863be678ce5a2be4447875
SHA2568773f7b9584a73d128b6350989ae2d3439a21346e4ea0d63ba1a015e8a787048
SHA51291336723a87e47e1de26ca8480c3e57abcb7ed6dcea2cd42de32b63bfc2902479d6f58de81ce1f19603ee788dad0d4a65609ba75f2b42fa52ec43f2cb96ec4d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6cee1716e439e2192d9be85b25218e3
SHA16943bc40d5a7c3b33a3b5a69cf734d82882a909a
SHA2567fffdcd12929650bbdfd70722dea46a6af58c533a66914c611283d177f25f177
SHA512ceb3ebde709e89afcf3345368866922efebc67f7cea5d0ca6068414da26d1b31cc810d7723418a58686b236bc8e8e806bc5b8abc2f04fc8250e15cc751c88a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e158c5aeb008665e43d454b6abb0f4ce
SHA1ec73171c9a7a8535a956b0ded56820ba7fbfcf7c
SHA2560dffb8d033daf857e79aa6e9f5a8786bb09e89539d6a1e88676f882f7338f1cd
SHA51268d7f336c604c79084b92b21db167f9753ff324c53ac543d90e9e5987bf948e01593a74287619bd7ffeab84bb6bf63ec981606345bcbda7f3a94e73e5b73fcdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f80c679a1d8b71e4816788343bb69eb1
SHA113b9afc467c875db6da8d27e338f4424da1eb5f1
SHA25627a556a1fc17579ba0cb48a890d23b9c389de0d48c5961bf2cf11faa70bc7964
SHA512046b9105d9bc206a6bcbbef081ce54f428d9e1bcf1d548730c66a4c330d73b18ed327c3c5e5711de5b17a07464b9dad2383afaf83b931947f73d46417dc2685a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b566e53163e2cdb0d3b414a1ba1f4f8
SHA16292e4eb9f597dcb024611f8b4fad5af4afe1490
SHA256910a8622c2ca25f83b5f8d0caf02714376b4810d3c7b53fe48f05fe3b233770d
SHA5125a10a295c03e04338df5a66b99b39e65e8df1892fe4ca2c9f86f992302f0f62fbe5dc6f5aa2d34bf19145c7f097a1e9373a3c56fb52e70f0513e8afa08229767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53950cb057fd07ea20077ce486ae62b37
SHA1f355d32f7cfd810548adf85ecae98177773a063d
SHA256c1fb818d71bcb90793e058e0d8eaddc3dd5412281b7f05f01d005272754b91b1
SHA512fe76c0c41aec32447c1e8148a2c4ff1f10fa86e88978b4b2990c318c96b7381afd4c6b4cd0856a0e35245ec280c468e8b312576bd8409b5b999eaf27591d63b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f69b0dd25190de1c3efa7ffeee9d6d6
SHA144059d664f5a614c8d3caa070b38950e81ca8802
SHA25617eae802a7caeda9e708b7d7fddb2d894cd7ce8b9af79cec16ce0269f17f8f0d
SHA512c78b2c2922c0fa4167e2e5353c6d6b0416d90fc86cc3444b14c834e4c057d66df9bddc1b338e6d9984d0506edf5b9a0db3afcaab2ca2946199e37d1c01f3843b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8888224c4ca5b8d07b90f63987e4ef2
SHA11e0fea605f8722a138b9de14bf005192c94f3ae6
SHA2564725572c4117cc5b3d103cc10c5aec79e42f2310b9a8246706b84c899dcce2ec
SHA512dab0372e446f23c3801d9c5c5ded4ebf0a77f209a05c05058c3e46cc809f5ab8406e48565842e10c5d007a049b4192a02e7cb2c50938f2e8ee4b74926c3cadec
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b