Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
ac9613fe73ee04c68a8fb999b343df31_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ac9613fe73ee04c68a8fb999b343df31_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ac9613fe73ee04c68a8fb999b343df31_JaffaCakes118.html
-
Size
6KB
-
MD5
ac9613fe73ee04c68a8fb999b343df31
-
SHA1
7012b5c0f21622a67493c6736d90bdaa3680c18a
-
SHA256
164cfad0941891e0de8d7889b70ea225844143e09db02f36d50cc43995043152
-
SHA512
4091c5571a59f788e868168d41fbe1685526050249348ade883e0820d0586bb28e6e458039fe2285dda591e694ba0ab720d7bc12d79227488f0871bf239f5b24
-
SSDEEP
96:uzVs+ux73ILLY1k9o84d12ef7CSTUTZcEZ7ru7f:csz73IAYS/ub76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000531d39f360bb3bdbc00568ea0230405a8758454b726722e5366f0374c95f9871000000000e800000000200002000000044192d37f2d18155045861d4f9df17b52bc37320a61ed1d3fe994926c0188af120000000ef3c13090fd80a3ff997c02db2b6cd5c8ed9754e161344df915f56f5f6cae94f40000000897020bb3f2106b424b92e9cb15a986b01d143249adec9dd7287b70b13bf1bb64f813c13e2392879ffb633392208ae8c0e1e3a64cbab40fe022bc9ae496c0c94 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1057b8037cf2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2D22E0C1-5E6F-11EF-B692-6A8D92A4B8D0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430263575" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 532 IEXPLORE.EXE 532 IEXPLORE.EXE 532 IEXPLORE.EXE 532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 532 3012 iexplore.exe 30 PID 3012 wrote to memory of 532 3012 iexplore.exe 30 PID 3012 wrote to memory of 532 3012 iexplore.exe 30 PID 3012 wrote to memory of 532 3012 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ac9613fe73ee04c68a8fb999b343df31_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b0e7e9e7311bd87bc160849426b8585
SHA12bf331b8aa09058e9b7ec1f3b0c6804d9c5c4ea8
SHA256cbefc62e2e921e4ab9321915384e6bb34a76ccc79e46d0f61c50f93d39815179
SHA51242685a146f348306149103258ff74b937633de4b69f0efee86ed10561667d29d4e762c78ca723ddc54eda24c5f21b040fc61ff7db8575b9e6805d77af33aa480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abd51462f0f6f552f412f9989a78de69
SHA18a77cdff8ff8c2798878c76724500abddbaebf05
SHA256969bfaf7fa1926687e3da09678d18448bf0700adead20d1cb65111b29b4d9e16
SHA5128b192f0066d11041e2dbcd76e45a7377f2682e066b5257c277176d8f49f8bc4d337de28defcf87ce07b48a097db9daf7d6b2d6405e288bdcdea1865911db5d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b085cd15c7ad3b1f995b787d113f8d6f
SHA115a2fe5c21566d38f6d8a765af3f28d799f2d463
SHA256e84272989479e460eae0f012bbc9a2ca34bfe474e375ae755478401a5c763533
SHA5125a09e071fbba83c6ef127b212a1abcebeaea9065e51e31177a59617846df20ad168e8f77e8f2f6bd738c7f2deb307e477967299df55f086b415784525af7b464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50958370da855250d4318b3026d18e20c
SHA13bcbc7cc8fafae46714916a8a70b7705cd09780e
SHA256dcec494ff3978e291914b9b9ee25a28d3d3369c75fbdfa64b68e1c167747cdc2
SHA512b65aba6746edfc0a72573900295d4ce32b7cdee2ec1dadafb295088d2457dc025f30a591e54663b733c43cc3423b8982b88b92d125f4df157a37dee52867cb32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5412074acf6a9e14d742ad36867c889c3
SHA13cc98019799bbafcb934727431384b0ff5113e9a
SHA2565cd99b9bcb43be31c786762f849d76bfe46e385079615846d326a869177ec7aa
SHA51284ef6314c0e66acae4da890365b82f79498861e1b1160503e0d2b386a3ae153b13061558cb9ae051049031b8ddcb00d05dff13c120cd907d222ef34319f059af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515027b33a8a8a72f98128453f25faf96
SHA1260999842946edd0b15f97358616892686270c79
SHA256c6ea8136d3fa85b420fb2c879292c9c2f335f76a8b1dccb380405cb1c1f05d43
SHA512516a95a38f857273790a352ecd47f08408579a9aed434a3a576387287e1d9870bb97833d54c800dd4124c654d7e6af571fb2c3f20426db50b930b1dd550bc623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8aa1f61aae964b1fac7e3987d553cbc
SHA1327de502ab27398229dd94f045689e0fea7d0033
SHA256db778088e509f53ebb22fd1d16e243df2d10593d6f78bee07a38f52d2265ee00
SHA512b7c5bb6bd46c38a25250a549f1024314a33e2eefe106139bcca267dc9bde3bc4cb70fc79e035ba9a05a3238facf90ca7f5f62ea7fdd3cdc29ebc66492118bc76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52179e0a2f1392a3d0dfed2f9f0578956
SHA1a8b0759a1983c8cc351119c24b012431996cb40a
SHA256d7ccebd481fdcbf071e76997103a7c975cf128beadc34111f03f5f68d4f2327d
SHA51295811f6ce9a8c31d40482e368ee31251cf9eda196ecb65103901bf94dbd770ee50feafcb0a70bde35095f0cbe9bbee62011a4752421572c9b4305c4c0e9c1c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f757804d42d8d297635e72c0dea762ac
SHA1ca95ae6f3c3d4847096361d847cd978ef9deffb5
SHA2566e136a71423f5d2fea11011ce5c1bb55303e3df6491e08e271f637356a577e90
SHA51209bd91c7e4a19138f8d15786a080a7c54d33e1d4b5fedd7a41b64b3859e6527340f76f2b1adeee269f2688c6070dfa8d6392baae3ac88bc9d7b312d942796f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7402b7d07c2065d0dce611c0f6d3e0f
SHA1bb3837d6e7ab596004fd2942b4b96ea6c026466e
SHA256fe50d28e5bd3f5fc402a21164b84e8c4ca9c0375307f528abc746644263146fc
SHA512323529dfc886ec33b9cb0c3c4dc80e0c2140a9cb9dc780134cc601c711aab6f64d01e3a55cb82b9b94ef8f6a762032f42e333729de8fab664c60e351183f4600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc8bcefecc9c96b1e722815e88482958
SHA18c456e89cddd494eb54853a3b227c21bdcb8d162
SHA2561b840d1e2a4530777f2a7814e9bb8613ce5ee108fbe65eb074b23731a009ba02
SHA51288cb1dc4f51a9b744af9bd9833a3d071e1a11e939c3ca48af61e65388b2269fdc09484807cedebf73acbe04d60db9e6495ad21ac7dff2395c466bc3704c2ab58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578ddfb84277c195cb2e4d09f7df95283
SHA1a3fb76f682057ad5d6bd18cfe0fec109d1bef414
SHA2564f88e186e9974e3bd8d5bf468dfc75348e3aca224ab53aadca94bb13c9d61944
SHA512055dd292ffaa5a25f8e935e4309412cafcc1e1f1ede7a92174a9b8d0ceef8987aa3864fb0465fd533236f9d361874e1f9c2e1a355b4c9381a8c1374c1c4e71d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0be3c42185e82aa3d9d8b109601ee60
SHA19f9a047a5acb95cfd8070fcb322ec9ecc19dbe8e
SHA2564d9af851c36d1e161a11d7fc985942489bcabcfa3973e9bbe9359f4e3a18c6f2
SHA5120412c7987f34717164eca8c4fd97c3ed28e3813f66b44bec83f70f4ff699b6294d9a545cabbc3048bfcd5ba2aa70191a19d4a32ced4412f06fbbad4e4156196a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54853fea2dafe1b63dc18378f9690daaa
SHA12905b617406cd8e0d6b51489bdebe3eb41f94d48
SHA256971150fffb7438f98ef5dfe6da7fbd6a036bf460f44d33037966d8e1868d5e3d
SHA5127bdca15942885a4da6fb47dc8f9bb2f243c1f512939c36b1bc062772a7f21e799cd268c22a25e70f624fd89be66ae0ba624bf94de0c2c8c9f78d3e2f80c65d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531205f1789ce8f44b2afd9b4c1cc1791
SHA1ce66eba6a27664b8f605dddb634dd2b24c16adad
SHA256e0608b11d6e6ce3d3f858525bd82e683496c6432776b6d4cee22ea9f15d30835
SHA512eb39d7532f59588792f6143945b5aeff6310cb97d0c7c12be792a67e4733d19b5c3b2090fe14d7f5c101aa1dfbb525045630605cadff25a4c256ea6ac67adb17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c14f3b9b1ca8c6bb2f040b06242f187e
SHA157f4afe703b43bd2b551c88f98a7fbe83d9b4615
SHA256212d4b311bccf74753f96fdfb916aad325c519ba24d6a318831d30f19c1eb714
SHA512a99b494c1be8b76a50f696a61f8fe15ff22c48fa81c50bb76f06a8dc804c72c9c3ab74ab556e39f096b3f3686bf66dde5db01044ba49b35f1d82a40b7d7c54ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b51cb900e084c70c202c065e030dec9b
SHA1827f08b83f3cc56c100548deee506a1b3ed08368
SHA256f1c99cf829ef43b28106ec72115da1275fd621c698f02d6a358e744949695389
SHA5126993fd025debb7fa1eb9348606a7cb40bf625c2588b774477870547aa3c427765416903fce7e1c3f951d5b01d4fa9cfd86fb51ed1c6192b86cdc819d6de07ca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e5d878eba44f74440b251d659528dfb
SHA188bd7c4146a3d7ed6c847faba4b3c64264ed3244
SHA25693bee7d52c0d3d15707a8b377590570c3745836d1517839248417d2bd30ceb8c
SHA51259c12c262885b7ba4237b96bea57608906fef06921c648b0413d7058be5afde87c97c82a897336f627fca3ae8020947a3235a595d5c4001bfa97a34ecabcf936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8528b0903a0efad9ee9bddba68c2035
SHA176a52229322f33595f6438d0d65c8a03f006f082
SHA2568b0907f6a9ba029cd425cbbe22afadfd1815d343b361ca3cd100c15b80fd3dfb
SHA512101f4e5b8705c5c9c83fc931edcfbdecc5ccb9a298fdd47312c07df78fef8a728fcc9b6bf4d823ed433700274b3bee9f05bfee1a4794a77338f9ac271fa3f437
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b