Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
ab9d020cfe62b6d909ba339b76914f60_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ab9d020cfe62b6d909ba339b76914f60_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ab9d020cfe62b6d909ba339b76914f60_JaffaCakes118.html
-
Size
42KB
-
MD5
ab9d020cfe62b6d909ba339b76914f60
-
SHA1
6e829dbd78ecfeabb72433811a861993f79f5934
-
SHA256
1f451cf11f24993dea1b8b73ef83ca2705cc77b4ba6096ed87076d9430e9fbef
-
SHA512
26ceb3d6b9417e2eeb62821a8ebab509caa1445baecf81373226d2c2c8d132117fead21bf1e05e3c7dcce8c4a66fad4a7234dc354eee9796d9bf4282dfe3a799
-
SSDEEP
384:BuhHaS7BrRyL1XVJ+cHeFQR1urvlBe8Co8u+dztcSmrbn4R5:BuhHaFHeqR1Yl6o8u+dzX5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40bf1b354ff2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430244332" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{608D82D1-5E42-11EF-A6B8-D6EBA8958965} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000003e028bcaa6ce206ddf1f7efa38d3b10c469c2b03028e36696b873f4a8edeeef7000000000e800000000200002000000015866dffba0d26934875523aebb0f59d32470ef0aa90134f01085497fa429002200000007fdf4eb3da34882f4ade55e917aedca712c1ac94f646908e51c5d502525836f7400000008ebebc76abadec52dd76079e861efc5a6b57181a857b78ce1f12ad2edb9710cd15616dba737477ec2be70f91809529f5bb2659eb38da992c531434e6ac65354c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2420 2116 iexplore.exe 30 PID 2116 wrote to memory of 2420 2116 iexplore.exe 30 PID 2116 wrote to memory of 2420 2116 iexplore.exe 30 PID 2116 wrote to memory of 2420 2116 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ab9d020cfe62b6d909ba339b76914f60_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a85f7e53be63d794e15eb0aa7cca0902
SHA16367af88c8cfe6f487dec3ace39bb9ecd9344570
SHA2565c62a77a659a0aa77a92bae1a075205f915194ac7eb1f9a16443a28605ea9b0f
SHA5122354e66b0efc2a69101a0ba6f1bf77033d5b81f868241c8b11c289b4643286d5c28efc9a159b6bb8c3515b0b80974a3004663327339bac7997b8a00f78e4f56e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1def9bdaed43ccb8881e7b28a655157
SHA17d1bf855ee43ade3543bfbb41b083c77e2c24909
SHA256728edcc73413c2f5adcc0767209b1889d44190283944dc6d985c8aadf6adffd4
SHA5123349fdebea6ee37e8eab2a147e94d0a7adc5303b884bea16fec40450dec8552aa08b9f68703b5cabfa0ce410cc6fb8594e8e9fb790c56fbb540cbafb8528c636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d106e2a1b910f06c86fd283dcebf7ecf
SHA1582c64910c8feb41ce5621eff8727e7bf406202d
SHA25627d23b81f514ac7ee5fc4603787794aa53d273e72b698f1f7ba1268571e62cef
SHA512f23d28eb33b06d880351bb09a96c5d7f021206721d8a1a2d54271f41402fed8b804b7d4fe9f6cd02dd2ba5062112ec2255df9b511b12f01915910bdd90616202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e33276065189b631e51daf93fade6e8d
SHA134258319b8657780518f887ac0bb0a86961b0633
SHA256b8efba3d0cf7f5f2afaea45f4e984705df24310204c62f941839066cd3cbc6d0
SHA51206e9ba55c3118efc6a37c7005f046ff683df8255e758d85a7666d5f69d6bcfc83d8367cfaaecedc5b0f04c25db32ac7ae8f9e143cf9da73b6136bcfd0f0a347d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b697b0a067d6129da9151cc9d99fc36
SHA1aa06a381c06ce8a0a5cf0f0055f9ecbdd0f5ece0
SHA2563ca363cca993b9a4ea30ddd8b0701442e8c5c0bf3302f3c9051ac8c0cb42c479
SHA51244bfc147019de433658f950c450ef5e1433dffd72d8fc3aae765151e7c1ff1c789727832aa3d8f1db70692c8fcc3cb875730c264b151bcdaad71908086677346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e85196688c8c61215286c7936794c4f2
SHA1d4d5c607a809f4744c5b71625c6d8c6f1dbf285f
SHA256fdba3a0684b56c5ff15504f10ce0cfa4fbfd2838c8233f0b661b3fe3c573e2df
SHA5129b14634be1c1539d9a43ac48abe16d62a7375b323d0d395e8a32571f5b973f3b2591dc4b5d93567d787c922ed561d0f2883613926ce2b15be4ac11bc1cabe630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556a7c5c8c11c2a6a8ebf3ca01b9ba3df
SHA1e7923fcdfac5c60427624a22aef1a1b3da498f82
SHA2560f915272bbcce990aac67263cce1c2bce14fec430409f4598e3c360d4366331d
SHA51205961eb496309d44e4bfe1b773d72a33be0f841ee77bb0542028683a52ebfcd311074a4ce75916344cf4f71f4860b7dc10002696e907fac62717b8061ba2bcc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b3fb1773bcdb662a57405de97cf6452
SHA1e2c3ce6a57f792259c6eea121fcbab2ed926f39a
SHA25660a42bc98831832fd091dbb3ba3adbb9f4a8ede3a20eb46a29372adefc771aec
SHA512403eb1392585216c5a124693bf60fc50bf0fd30330de9d3f5e8afc00f8010661494ce1affe7006ba793294f68972eda3a378d799a2718842418588205039bed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d445c66fb8ec4b5f27adf89d4a3752
SHA1b69a70f3634acb36cb77e3ca4fddb8243af46a3a
SHA256483356b1830ff19071a1a57eb3f8a15aa234c85a9c103fd5b9b2dbb2b6021cd5
SHA5121fe91585cd66c5be64fdea1cda2fa4c9daaece9c458a77266c839cae438cb5eb5801c9eace6449fdcde7d8091b64c4a6e3067c00b8c7d2d70e6de79659dc326a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525d8baca8feffc73ecd8438bb8c5966a
SHA161bc59b7c4d44cd209c9350d950c9068bde64dcb
SHA25688881cff368f1e1e242ec0016208351a25a6dd6e5f28386b5ee7210405db04b3
SHA51261ed199b8f58bf73963d77b3703bc6cf3d021db8b08b14b808c21e3a594a29ff57a0ac490045044d95e2acc4d9fe3f9b0d9b026bc729e7222f37f42a9876ec67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5175a9822571715d67bf39546954f0ee6
SHA15c70ae951c8b7c0cefe10df4b9f40adf08b3a09a
SHA2563d0dea20b5504f9155af743e5adaf24f11013b9fb70c45b900c6a4e2066eb605
SHA51233f4cd9a5d9d6dd9baead5e2e13b0129026f1afd8fc740e9cf2bbe12c3b7cb64be672d7e7000f21b779d73f312a11311df98aa0dc7ea602ff4d8f95f76df7bc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572a6e6c14d7be8ee7d5d7cee0e403caa
SHA1b1e2cfab1dcdcbd95ca3da8bc5663dd83aa0ec2b
SHA256231fdd65905952e4d14e7f24a412935c4b84bf76150e6c9ec234aa31b48ef2b9
SHA512f89e5ef71f8fc818cea242e324146eed169cb4e671c02ad157afc081fb5860b3d9499dd40b76fe6fe307a72b364a9b579b7cddf645072c121323c76ff84267ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baf021725e2d5c624117bd921a0973ec
SHA1af9483ef61a5c92d5e0cc10cc1eb48fa851a58fb
SHA256134ec4b5cdc1b3085805a6991e48327b77c5b8b05b155130fc62cf9831a618be
SHA5125b96d16f60287e8889505608ee3a1158601a08e2d744b8884b4fdc7b93b40561705c91342072a2a4a4d80846455d971ec872857cea36e832b5d2d00fb69b773c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f4472caf5c4b4537cea3d7cc76e17c1
SHA172164a28d451c771bb5102ed8b264a38ea7540b6
SHA2562d8d75d12a629fd02ab766afb142d89c9c4ab50bb2698e7b7f45ea7063aa9107
SHA5123b9b36041f9f363290e19fd2f7d51d81ef6af3a585cfb24aa8e14d8d62864588ddbf999c32769ee262c1129b2608d152f0cc00875bba376e393f8fd1ac126632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df88b047c17fec799847e14ec9928e73
SHA15460a480fd9a26c889644659388fe862a48cf099
SHA256e2679de927b87ac692487adf7813e11a4fc7c5f480776ad6ec32228359619582
SHA5122c7ccb2fe7f5c6d65471ff28ab2eee6413eb7c7edd8ce36c64313eac3783c55f5d8356a9fcf867eae85dfe6dc5648b5ff15f9f455ea6e2cbf3bcccdd4f601f58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc36a655da303a21848a2d51692be986
SHA1420b388a3ff85abdc4cdcad7986de7bad7367672
SHA256e6faa8459be141d70522ab7396c2d35956668989d4697eed73754b3a536377f9
SHA51204b1693bd23a20a8bba7af25e1db12670d692a67c9889d018769572e30ae5162733bd3f6b1b0ff7ad0c2c79d1ae5c919eb4d7a2d6276228800549468772ced2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cab4c67303cefbfd9404e21092407170
SHA127b3412ace2bc8f7824ce1a0c531582d54cffcd2
SHA256014fd481ee79d1e89f2d37f41c66bbad54a852bc71340118bbef54483f9a9654
SHA51215d2f07ee0e4dd378ecdec63dd792df37113040ec05bf0feca4c07c3323445efdccd6a6953214213d2e98ca3c123b7fdee20057874c3a8c62933292a7ed7896a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53309aec200fb5c204c4c00b2a292194f
SHA1dde6bb1921cbd5dc642fc5967069e52447966438
SHA25614e4a102a55c44812032ae3a962b46eabf2ab11ecb5ecaf8089d71017dd2e003
SHA512c55896e6001d625688abb3f5c1cf35854d84ab4e352d2efc31b185b0e7e74df51d7efaacb61745e6ce8e3505bc6bfde41858011b05fafbfb0b3b3e0c8bd567a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3ea222965193e1f644d95c49cd60aa0
SHA140d7b1b6f858b868c275c86f2ea00eecaf9862e6
SHA2569677b1770abf44db1ace55de0e6a22f1b78799c8b46bf8b7d64e84ed03bf0a9c
SHA512ffccf012c55a96868cb89dcf827671c230ee31668bb0227f0353eafce20c605a1aa6bfa7f59e4746881561cf37ba923444a57a1296b7777271753e4a6f817c90
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b