Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 20:46
Static task
static1
Behavioral task
behavioral1
Sample
ac8463f6efa2f78da6d991a58dcb4db3_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ac8463f6efa2f78da6d991a58dcb4db3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ac8463f6efa2f78da6d991a58dcb4db3_JaffaCakes118.html
-
Size
650KB
-
MD5
ac8463f6efa2f78da6d991a58dcb4db3
-
SHA1
680b3b142c3971ab1d1f472a9f2c19adfc65fb98
-
SHA256
3202a2e50c08ebd960a744150e6e614c9c46519770436135b747254c91e338e5
-
SHA512
4c91ad13a95ca67ba291e5b72b104dee6e3a5876772c0ee82bd69d259357fb068c79779b72666b999e7b6530b4b7f3b04eb0dd5b251cd5b1401eff334605bfc5
-
SSDEEP
12288:eMdA6VPuBk/wqag47wGMwnLKOGc1FiJA6hKxJ:eMdA6VPIk/wqag4J6hKxJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430262265" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e07c67f878f2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{21793831-5E6C-11EF-A32C-7EC7239491A4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000ee63fa2c0c8812e82d0e7501a5b840c49e27f6f167fd4eaeb74cd844d6dab6fc000000000e80000000020000200000000b914a36c09da740a818fb836c628c3fece9a3f5bf15333af79299ec30ed829d20000000caa67b407cbdccd88309df1fb3dccf51e9c069e632de7b0e382f37b427dd832540000000eea06a8cce33b4283b231163944e50983ed127e46b205e95396cf88974abc292db4b85339ad6234a0976e77f458aab97a10c3e1de2d12755aca4c6e2700e8f45 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 948 iexplore.exe 948 iexplore.exe 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 948 wrote to memory of 1756 948 iexplore.exe 30 PID 948 wrote to memory of 1756 948 iexplore.exe 30 PID 948 wrote to memory of 1756 948 iexplore.exe 30 PID 948 wrote to memory of 1756 948 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ac8463f6efa2f78da6d991a58dcb4db3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:948 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb18c3eb17191a31de74792e6176e011
SHA1a490a1ad584881afac14f7a57b09432fb18d5013
SHA2565464bb58bc2efc377f69aaaeed400cc6eb44546d9512c38f1afdf53516714dc5
SHA512e9ef5abfa8d1b87b73a52c1acfe66f2bdbb3aaac814bfd781464ddc26214224970d9c7d25fefcd0ec9df04b32c1abf2d2b0e883b2b173a5ef360767e7a73cf1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523b95ec5e8aa63c367ad5c31c14608aa
SHA1f16c2388e7b240394ce779ba93d0e1ac1d4d5add
SHA256405e78cdfe0cb22c9a8e322ea9e59c8aae9e25ad407c75593a61e54f8d3c6961
SHA5129ff6b5685f0ba0bd5e66ebcd7e6727cb1c4e2d5ced64a9ceb0c8edfb25ea32bcb5ecdd368ba57324d1f06b881b9ff408a6895a296dee3a7b72511390b3934fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f52a47700f2df2a9b35250cc95f4f6
SHA182bfe94294a6c6d0485bbca3a2cae76e00196b0a
SHA25688563db19789aeca6bc54fdc7a5d4ee57f05ae80f1deebdcf138386711d049a3
SHA512d5cc8634857c52009edc21b4db2d572adb8e13861452d1e534dc6a331630ddad442b387d042bb75ffb265f58a0fc1e8215f23efb012e464346d1e2d277d43a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eafbe4808acdcee7a452611061ec7929
SHA1986c9ae251de726613256fa2a8110c5d196455ba
SHA256012f395c88096beca7f3c9f7874305b6b0041c1fc7829bfcdf89dacdfb8f388f
SHA512f5ba29809cbe292810789765218a6b1c0c5d8b833260823a186d7d4881b93721e2a6a80c79b68f6e9c7adfdc6c2f496a137881a9851307f340a3f204ec402d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5912176094645f3e47523c5d16463ba3e
SHA12c09c982ce7ecd865afe171c12ed15ceabe39910
SHA2560012baf70537348cffa212ec878db75ba0040d1db6466ff5ba652d063767ca71
SHA5121b99fd0db58beee2f6710c54b2c81ea5766fe7afa396faba8076213c187aa1078201739abd2b7e447fb0902f162248e8ce82ef0f2f4277c6ab7d9a6f79d9b244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6e30bc9743007aa82497a27a2e985a3
SHA18f707890ebefef1d7efbf56bab3e446ab12d28b5
SHA256e2d84fa2a2507e0fb3dce175e95b2d2397396795d6a7da2d600a54d651517689
SHA512ddaa1386acd3621931d89563893ac533af94cc845db0be5e910dea19c33b3c3753c5199860535b008568aa917bdbd0b61d02f267dd1343dfe5aebede6bcff827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d1c6d226b6ead0aebe8456b8621ec83
SHA11a2874072f1a46f8cbe41f73dd2d2631d403188d
SHA2569797a0822fd7866b6c0a0fc658f6ec96475c344f0560821b28053d3ca0686a49
SHA512cc677393e068458d55578ee06d1a9157d5e7478c1406c2625571996a98c7855483af84b25388b0b42501c6b6ecf2d055b6c9c9b1111a686c93f7995ef4cf5381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505b0abdc071f35a9c856fb3bc7d08816
SHA174c534e26f208b51add6acc6aaf280ebb421f55c
SHA256d067f3a5074a18e4a5f65b1e0c00afeebed02a103f23b5af3026fe31eed8e8a7
SHA512e630f6e59c197b22474aaa0982c1100ead5c5b2ae9439730ed0cbcfa41ed959a6a7f7f3ecaf2782f8a539f2bf1f99380abf849472f98b9bac57c2163a7386b86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ba72c380f79cee3dbe7391de30668f8
SHA104ed2be3212a1ec8294d22b961eb70000784ca74
SHA25602890ed8df5c44290379d9f8f3a7d4aeec3005e97c654cfc7f56f31407e8c7ac
SHA512531958a6f3cebd3fa034a9ab1f6ae98a3a01347db74e8282aa6a9db1652ddca95c7a5b119b0ea1b093009579e89edd812e463db2ac33aa52fcead4e170654685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c99af9a58039a7b8ad19c6f2606d37d
SHA1979f0ac4db0b1e7c4f57f635cefae1f5bd093027
SHA256609831a25d14faedf6b0795624778901716f7056bd3ba222f8184eaa1d2991c0
SHA5128127c0b20595817d7b13557db6fd32d2a8fc4d78bf7dcd6f007f6d2110f5dc0cf38280434cd777243d8ff41339d9e8486cf1a684873d497ffb30c53a6aaf0333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522325032ee2a22b5c693d6a5dbbe9202
SHA1608cd73c992ddb11b0e458dbc094489035feccbb
SHA2569ca0e79034aed9a54787c3b1c9f31f3cfe1ac4afcc81d4e3f98554a64cf50340
SHA5125edf47894482f3e683f5cea59c4ca84cd7bb126eb901c63865bd36b0da4924a840d73f51bb68493776beaa96457a3d1b921439377c808332872c9b96e4eb553b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54613269bc5c729a44f3549c3d0ff6d54
SHA1df303f9d2ed22e727272e7a219728114225fc371
SHA2566a8c38038efab17d3d0f080c99a9c61bad83f7231e7e01f011aa07c6fd98cae0
SHA512ce998527c81d8511457dcf26fb206d4b0d98486afab9174e683779cb9badd4c6002c6048fafec56f6c3b3afcb401b685085bb4112783d498d4b50d5c3bf10c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5971b1fd7a39d7ec88796f361694079d1
SHA169a10e8d809f87a873aa1c62fac794433420d630
SHA2562b21155bc3320e2746501d993885a3cfb06f59b682106928ff3c823385b02853
SHA512557e445b8a243eb64306f5fe766172212fa6c19b6108fd8c4a0e7bc8c49affb2c9f13972a48a6d8f35e63d4fcb69ef8c3fe5c6700c6adafbd484c751a495f11a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9b92f75059f749c05b077bacbf6f66a
SHA1d36fc62d0a92d497762bb9988c5dfff18874508e
SHA2560c5017c8df7eec0a9f5c2bb99ff6ff7bdc39eefaca203fb980d5d94b8a724734
SHA51225d3092d40d6fbb2d0ab11e4018801839c3e06e3117cb389f3cb904bd26ebf0a407c448a6b96909dbc1e5ba55483b03a20f280703abcbc49e9fd413a508a9ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed6bd192b7d109148c0929c8d5bcf332
SHA1ef8f43b241c9b52e3b11d7ebfea138a69cf05055
SHA2566caeae6c6f185d0b79206075425e924ca062663f85ea476b4147c00ff87d8c53
SHA5122297336bb8bcb41fffc8ecc71c19356733f1791514bb8543dbfd06c780733f52751e10f4d980542292f5a41711c7b635d74f5196d87eaea6b571c008e62f4b75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5938bf8c64e5ea128f3f5681437570217
SHA10a29d23101268b8b8d8a77c36cf43ae08416d94f
SHA25614931f43bdf25a6b601f7ed5b0165872a4f060fcf9c855baa11decc7356dfcdc
SHA51284333af80299d3cb87dda76912961c5ee54eb2b16a05d169e42a5e6e16b5ada5fa5e9dbf69ed2b31488eb00c37f0a98123368295a3de561a47e464e18f6ecc52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be6686e1c68820fdb9b5e6d0e6bd4739
SHA156449ca086eb062a72cb788cd9a303542ce74514
SHA2564964f7125ec4dd5a071d819c3467ab57a7c3c60797edff644758e2380dc1dbe9
SHA51254786bb8a5151072df29e44d7bf5200a0d0a9effa9fb1f0f05d8359364f294da1842e47663800e843a34365a96d2191e6408675fabe9b67b847795d8058e59b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505e248009f28f861381d30c9fae2aaca
SHA1a0ea9c4878edbbc3beb3ce6b3c6b491258e2fd5f
SHA2568aca57b6e471b78832829dbd8a94e5c30a162033ef9e270dd89efca91156e5e9
SHA512695c022677c646fb00f63bbc4fa6c712d17dea088b08750521bdfac0569d2d6ff09e1cdb8439d368f3c21d7cf9d743493d7422da5e0250a318b28b98e94e1bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5916d05914d53e5c82a45783f82fc5803
SHA1148cc3d48c686fdfff3a000bc353d10c6c573241
SHA256b426edcf692e89ab01fef6c7afbf7fbd870a0092ef9391d76884da7d89789b3f
SHA512d6e612d4fb1789660b77232371a62ea0d44e000a6c3f45d37b15d64461c0c54f5c41d0e1339b1920ab13e6154d3c4767e337c974baba06488e9bfd16192323e5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b