Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 15:03
Static task
static1
Behavioral task
behavioral1
Sample
ab7cdf0cba2f5a26763ec7a496cbdd64_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ab7cdf0cba2f5a26763ec7a496cbdd64_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ab7cdf0cba2f5a26763ec7a496cbdd64_JaffaCakes118.html
-
Size
14KB
-
MD5
ab7cdf0cba2f5a26763ec7a496cbdd64
-
SHA1
e102ad9a042278f6121a8abf6f9f271227f8ce74
-
SHA256
5d77bc8659f5ff73abd96a47d4d60935f6406cbb8b7c96a422844524e2f1e34a
-
SHA512
c1b8f1b0d6c9503c71280976c87716163248f32bf398cbb25ab9965004be32246d371e56a2a80bdf19efc3977d06c90fde12bb39696274aca98626c34399dc44
-
SSDEEP
384:SGSFJs9cBS6fjNtnc4yUPTM5bCMWjqR/uWR:VSFJ1RtbbMsuFZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000ccdeed98343de6901cee1ed6cc11f63aa13388e98d4edaf9a30b297ff5a9fd71000000000e8000000002000020000000dcb29549fbcc948d057f46eacfb5f9e686d568d91bc24a033e573bcf8ef2cee4200000006e812ef6fda5a2115ec0b10cdd0864992163dc64776aeebe0747605fb8afde8440000000223b78fc3b43bb2257f58961f0b0d4704346d5f17e5d51f1614c7c266dd6e0a94e95c82c73c9fb7d958138edc1fd16366e13afa19d2bfd3a31bbcffd0a7989df iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35B82521-5E3C-11EF-A0AD-C26A93CEF43F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f8170d49f2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430241684" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2768 3000 iexplore.exe 30 PID 3000 wrote to memory of 2768 3000 iexplore.exe 30 PID 3000 wrote to memory of 2768 3000 iexplore.exe 30 PID 3000 wrote to memory of 2768 3000 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ab7cdf0cba2f5a26763ec7a496cbdd64_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de3a9c3e44d5c1f8c57d75a734e14c2b
SHA15979bf9f1596129ea265e8068df8b875e5edbd2d
SHA256840069c21f3a9935b5577a7de70df57f800ed9542d8386c45fd4b011674e8d50
SHA512b04d6867672aa7b4b6c58063527bea685b609372cc6dd40a730bf80a9994ae46a3fdc08992654de52e5b43c2496284727651fc93827c393158bf84368b410000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cd2a8585a71476e6698d1b864dd9a73
SHA12e3bdd115e18924e2d9eef5541d7dd12f0fd97e6
SHA256754a4dc7251e356c46d80765b96eb7008b3d17dd3631585a1cdff66934888da4
SHA5129229039cd98aee80cd1e530bf32a86cec89db8adb10f5ec836f6d16423573bce281302ab62963af642d5cd2b578625d5246ab8d1b78e6d6c1d4be61527911dec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a5d6269768bef0f08484eb7d74e7de8
SHA16fafaccc54099970dbfaf04f0cbaec1fb6bc8de1
SHA256ea2fa7bcec16637d101b31004566c6b30fc77023e974673e7246ffa50e1e90dd
SHA512b86f93d9d1ea8679f9c65d03ed50ae5fb061533bac53fe4fc6a50641ff3a68276b91a0e4393b27def2a2bd154b7a36f6715fdaffc957e65ad2d07d8dc9e5df56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd8c65e8ac501e73550ae940c50f3c04
SHA1ef51361e49bf29f3da4badd4f7d57cfde3f9fef1
SHA2564cf8b9666c2b6cbc75bfd91d7724832740dfc80a6202bd8af2af22419ec19bf6
SHA512b06be7551dc2ea4a0824cdb0ca5c33c89804b6e02e212e860903649f459b874eaf45bc1641899e572b5e0a6f289cccde32cc3bbb36bd5ef4179b7d93993773d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525d30166a1ae96bbfd33139d74aa2be5
SHA199d814b15073f6bf70a1b3a4058714a5dbbac0b6
SHA256dd8ae42b3c0c9eabd0d0bc00a022702963293bdcae944faa20abcbfa19bb6c45
SHA5123b88aa649637998711059bace362b16ba1c54bac09b2a6320748bfe41fcda20332f8f42791297d5ff78d61e69b627c82270a0db6c38730efed6bca87b4e088a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebcd019b35b90fd138051c269bad2870
SHA18893b711b8f2264c8b248931f4f1209ed746eacb
SHA2566ed97a361d45bc88f66c2a798d2ede285d1b1951906c22f2899773bc93fa2069
SHA5127999784a762875327f1f2602665c2ac9a5658c84988917ad59d4524e409a468f2c2209ae8bac9b9a4f820429cd98c1047cd636ad964c051691e15692cdad431e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56720a35cd4385dfd9da618681636ee67
SHA14edc483de54ca44fb283437b033d5c0534606adc
SHA2569e763f901e82f55900d55155da8f71e1712b5917f54cdac83eac159a29233932
SHA512a227ea6716d93b57c6d45c6223ec4d3bf798879a5eaca5ffe8deffe7d15020b5b4c5307a4a4afe00e124242157219f9dd75f59b49ce2d7fff119cbc1da314dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1100da5255f1d89241a50abc7a44758
SHA1b8d095090d2d1a5d794a0f8ee7916daa2b2e258a
SHA256504a75161e204dc53d55203fc486ec6c6b83fea4c9b73a26ed8a3c2d6b6434d9
SHA512618332efa5ec57f9f85d8bf74b3ecd12d1be498e0335468943c6b84ceb0fb558b9a3f6244dd9b6c88815d7e1fe4fab73e2f14754a390a4dcc351a6f7d4fed467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5836982df850f3ec6210de72d0e0c2e6d
SHA117960022813597db269f884a3b971740e7e4d950
SHA2568d064c150407e066c39ae2968b8e55ef76322f298bdc4b4136556f77357fd05c
SHA5128c2a2bf82ae836653d9ac75257a9b0bc865ab734c88a2d649d875541e0b467d90b020c5583fcab33952134bb6c73205720d22f8bd5228a38fd38c1f0419538ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5520649fd9650de6090f1e0bd73e6e6b6
SHA1ea02cbd4fa648a1e3c19e0730ea716ba538bf025
SHA2567a345ca68dbdddec62f29f77a04acc29d992224547eebf033b4687d943a68132
SHA512ad0400ede53c8a871cc1e7ff046eb864a6ceb6e6922bbaa4c24fe37342d36d32478a596d9ede7b2cd3dba6d240aed8dfb81a255bf67c602e8ab9b90eec335a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c09e45258001a78f4ddc17c4d8a48d71
SHA138adba1278e9404d1f3e4119eb10e74842273d00
SHA256946e826ddc502eb00d6595561c67de1fb923721bfd976ee02330d27f2bc91318
SHA512939dfa385bd07b883a230a3c349070a8e97a9ed0dac2165e3325ed262bb42d0a4591257388d124a905664ab1b07f6fe57a8c3cd9cbebd823ef2ab424c6bdfcc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aa371c528a5e57ebf3c7f7b5fbee9ff
SHA13227bf1c131b4ebc39b8679d4143a3da0bd079ca
SHA2567429acaf04080b03e2be52a5c365b13b13fee3d7714f5c639e1993cddfcf3bb1
SHA512cef153a87cd34fd7bf6d46caf26ef01b214fed49a11ce5e99a99767a1c3f0531c0bbda87444bde277776e955530c20f03d57f1d33bc4ff85ef31f1f464064883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51726d13cee338fd83de7293dc0e31cc2
SHA1eec038122245223e9d24e80622a30a49cc2bc456
SHA256d4cef0d3ca20746f9451af2bb2458b49ae8c5e62ee15b71edc63fde915df8ea1
SHA5127710a0bdf58cea84a5b3fb9233517a33c23722af3b64fd4553fa9b983363681812a04dfe42de45663e6431b23c2742145fec9eac7691cb36ac66d3132d727bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a129a64d5bddafbdd72218f93e5d1c20
SHA1bb00a8f2cbaef18e1aef88364a5b3567be945f42
SHA25676b0638d15b7372a422223e407b8ca3339a06dbe544113590b127a962a28dcc9
SHA512103e12cd5034f7c0c63a9eef9d5adbe7df30f719b5207b1a29ea874fd93e60638131d00951ab4505665cce631c79e7e8139344eec6f3f3187c0aff5f5a1787f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a518ee7ff98463f2a7f1e60b486fd70a
SHA1c9af412b8e87b2f731a27ce30216f2837d22f463
SHA256e5ceae3de5186fdce66c30828baf3d06267758229f2a1ce7033e5d926a951074
SHA51236a0aabbdf3cdb905b96eb32cc9f4e6e9577fddc3ddaffdbfbc1ca3d0ebb1717651642660204cd0476399802c182509a7dc01dd9c3cbd2a9de59aaf66a695cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516288589e15a50671dca26c038a6efe6
SHA1637b1b4a5a74af3f42906eb7ffbfa50ce6f17302
SHA256fe1ba2847fecabf1dc7a132e892137f6fe60185a39e83324b31aad6890402a4a
SHA5129181a9fd626c3f6e08155f897877ec410ebab03ad5b5eb561a3e652e3f292b166d5027f4c896fa771c1436a99098a768b5daea3bc0a58bac1a505da87893d263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5997584e5a60f4f0e6a40bf9b0a11b891
SHA15ec5861455cc06073129c95eb649658b57eca5fc
SHA256b830404b6a9f5bffe0ca5b01c698615c7d1b41c87c905a629e60365c5a59f06c
SHA5128efe763ac3281ce23f11824b9e46375ac7b0d09fe7322e476f180f84b526865f19bdeedb51afa2be2e473cc2131fe60c747db96e3aa4cdba2bed39084ab77faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab760c2348c702731d7cde2fca9b29f8
SHA1ef483c7a889f494eeb5f5945de7d427b26a572ab
SHA2562bcd755b3a3aa4dc6a525f5afb8c13c5abb146e0b03e2e78faae4d0c73032750
SHA512e8f03c15e00e966415145273610dded2f57da4ff4ff701e3c7708f975091c13872e4abeb7de03a741be6f636397588005a3c0def3b6f5dcbf19a77e01120e315
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc3f413d3a6ae3fc19f7422bd6c1d1dc
SHA1a12f99e18af2cf07a43b0d9bad02f41e8768eda6
SHA256e347296d869e21c4d1c454a3272fc33eaca74755c7a49f4b59bd1a4b7de7be19
SHA5125a3a2101422f45481821eb36f4f976ee22f342d3b8097ea7f3249b1ba73d5b34d7889d13e6beb4a2c1bdd8a83f67803bd7526b959c45e1954f2d0766b4418c0e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b