Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 02:18
Static task
static1
Behavioral task
behavioral1
Sample
ad859c8cd96d1249f696803a59e2c357_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ad859c8cd96d1249f696803a59e2c357_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ad859c8cd96d1249f696803a59e2c357_JaffaCakes118.html
-
Size
8KB
-
MD5
ad859c8cd96d1249f696803a59e2c357
-
SHA1
6d46649988c4314178e5152d45ffd072d26eb0a5
-
SHA256
48673411b7fec54b2df38eef17fd2567771a9738a84e0636fbf624900ce7c5de
-
SHA512
9fd862e1aaacd4895d156b9ff3d7c7ad5e66056024105a77b291013151ef3a20f7a1e83b602464b3a85b0f3066dae0c40789caa289de17ff5b745399d974c63d
-
SSDEEP
96:uzVs+ux7uVyLLY1k9o84d12ef7CSTUDyqUhoU9gUdlBdvn99JcEZ7ru7f:csz7uVyAYS/J5hV9TdlBdvn99Jb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 709acc61a7f2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430282201" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C415891-5E9A-11EF-A2D0-E643F72B7232} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c92000000000200000000001066000000010000200000008bd9c98e6eedba3041df96273c04fe570076b3aab766fdd29331368b00bb04d5000000000e800000000200002000000052503161ec7228b15556529841da657e6ae31bdd1318a247e117c4a9f80702cb200000002bfd2af5b83195348079422f2253c43dae63ea70030a65f21f1f983c0edd0ac8400000000a369de8c3ba605350c651cbd60bf781c7f41c653c6eb3749c8d1db1c18a16ab1c95ad7d3fca4b4fb82e8ae9855b33d8c1424d9454343e943f43941004672669 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2384 1724 iexplore.exe 29 PID 1724 wrote to memory of 2384 1724 iexplore.exe 29 PID 1724 wrote to memory of 2384 1724 iexplore.exe 29 PID 1724 wrote to memory of 2384 1724 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ad859c8cd96d1249f696803a59e2c357_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c605a915f2bd9ac7a1c59bc91aaa7508
SHA16cf6a3ea02a63ae49df7cc8d137cd8f94cf24bc9
SHA256582bb07673f39496c4f1f57fe94f02896cd3c2a5e57ebf96e067e9e736b4e379
SHA512dd3922f9c0ec315e5162b986d9825107a2056c421543abb4510a18d8e12b22e2476cfc1fd9d29d8b77e32b317c8226042586790552b7b175094ed19f87ca9b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5455c350ee023181c7e70036f31343f97
SHA1bc320ea099c6bca794e4f69b3fadd853cabdf116
SHA25619c32c5682c5474e90b7f19ae7360c0eaa7eaaa3bcdd0b173e069ad13d379708
SHA51296031a2e20657ac39cd6f9b250052b28a7f261df5871ee302940eb16423423a57e9a8f89a8c0ec1bece50aae1c32e479b2fc6575646a2921bdc357f8315ccfdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b45f0280bb89af8c03300a231eaffe58
SHA1ec68f91b66edcdcbdb9f8eccfdb1ba5535a2b3e6
SHA2567aa05f2d81c0a16e7803ebd11583ebe977e86c159776f088efcda23e695df3ab
SHA51251a0195891be542f9f7dfc41c48aa8527f9b1b9bb9685a2aaaf27c26900d6386c16fe42227a383865f84fa89cb689d47000362e4e03d8e5c388d35185e7557a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df05df57aec51142cc31556b8772fa04
SHA1ea75a9e17e8eb6c90e8af9fd4616e3605466bce0
SHA256792ddd5520fb051f97035d2eb11b86fcf3278a75cad3b864835376bac0f82574
SHA512c49d6ab283199242d3709da8f4c25b92c783d697f3e6da54bfa8c099b18bd1297d3664d5a2c6b5c8143132fc22ea762992dc03aebe6325701f86518809236d8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e3e285ffe1319e2e031ab5195af1860
SHA1075f59230f35b14532d67b1439ac928e72cfbeb5
SHA2569b151917884dfb187bc9ebc48a4276e7c778075457eb621eee52c78a453e9163
SHA5123fa324df2ee497d8203fc80bac9dbea094e8a2286c0c203d98f26d576cdaa3485183b912488fa6e1401668b27e48b1e8bb067943bd3e7b8c2e46503ea607c839
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f2735fd55017fb9114bab68a1725f0e
SHA1cdf842cdf83839ca37a5803b8ed7ec1dd5d85e83
SHA256e799514636d8abdc62abc27377a3495aa69024d8d940ef7e337174bdef2da542
SHA5124cd26677ebd1ca5aa88a74846fed6ad6257241304fe13ac31342d23b91f4f1983fd000af47596d7e99e7fa3a6a6b9aab8250ef84a819f67a7ece9f4bf054dd96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc3e802c4868e6f695c21d4a59099515
SHA18d729ef0073aafdf68ca2c31c7a3f7661ff89311
SHA25651eb555bdb649c2ad358d53a03390d1724a539d0665a83f62d2b671a2ecbeb5a
SHA5121232156e18e9d620774d65e4d6346620e44adf2f2a14a84b6c27ec252caa6267c4f80fd3b66b0cffc5c0af1fb43466808626aecada108458ef61a9f05c60cf91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3f8223ef6d53b0ffeb335c7dddc4726
SHA1cde5763e21d460bb697766a9975b11f61fe28dfc
SHA2568e27a7efb88ba540b4676c8786468dd43f26be06c1d6e4e62432d5c7df84654b
SHA512464a5564f10076043438ce70091fb6a392aa60c5f1a6da4e463a26a68187589922ded4df35d6832baf1678d7902e3498d8842ee9207e2d9f3947de7a018e80f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56053cb409831e3eb71845238e92b8a15
SHA1a94379a40c225d7bf68c5360e86feec45165b2d7
SHA256252fbfc28ddb6875913942497bfc050c3e159d136866a69989098e2e461c7d7b
SHA5121fa3ad0416ccc107b9fe52e147e449ebbe2f7d4ac254574337d91c06be43676c8c046ece671824ea335f5ccef245fbb497a1992071f3c30ec62fb8eaaea9663e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567ff4cefda9da8405ef9245d7f5dd16e
SHA1c0056e4c2cd3185471e3011d7d68fed957915b9a
SHA256aaba4e6a429fef31c05e267259c70b5bae4b4e45e9a2457574d35d663e8f2f60
SHA5122d36f1beba07d5959091d5021d7ae6d3ab2e2848bba244a5b6be3ea3633580aedd14d0f62822214534ed332cd74e4a72e762436430f85cb344410da017c06b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58635ee356e60d786fcf6657b0d8f33b3
SHA155d7a38af71280c1061ec8e63904fb2ca58199a6
SHA2561044937f7b8749b7779be6633669706295eb485a35962d8bb1b02d8dd601e7e5
SHA5125c3f402113c0ad737efb16a1e445af51dd8e17eeb7a20ccc903bf347e19338eead1eba4131b5a57da28504b2bb918aa4087f2617bc313630378bf056385a9096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dd7adbfd784bbe6ec399a9d2246853d
SHA1bd312f2e405b87aef577a550da50368d91e40ac9
SHA256223959fbd2f9c76e5e743fa799713b12c2acdec1ad55eb4f2c939d693a1414a4
SHA512c5233c5cd27dcd682175c16a91c67aaba77beda4799e5da84e0a32af948541bb913cea4594513997d963c8dc192537eb5a097c6f7df73a1063d79bcc162fbf22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e30e06951e4282e95d4c65083abf911
SHA1bcf0939cb3ead17477372f4f17cc8abd2a5e0887
SHA2567d797ed5176481aee0e349d339b34ef2f295c652835f450e0a4ec42e4462f9ba
SHA51230a3f9d77af698a839898bc95f8764eb684bbb4733ab316124f41bd1f18ab8aca5a6f46acfc7a7f94b7bffa236c9492e7ef74ef214926932587a3b158119adb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51721cf19798f71b0df90a85085bee2d3
SHA1d34989bf247d700f5d4f57aa4b4eed1500294492
SHA2567c9a10d80a0dcc801eea6b6b6ee5ce5daaef0e8d297554995cdf7bbec328fec7
SHA512ccf726769b2ffbaca85b031ccd2080a3bd8ea5c80158c8cd3406a008aef18ece8d610dee3b16c0038f65dfb213f9a7caf63883cd70d3e3469e9c4ca98b121062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56aa78c5abfbe5f05204bef04961d2625
SHA193979dd9b99b3ca71bc2e47e6136c310b2c8f637
SHA25637a3c22f368b1bb67eb55ef7537bec6e9db4d43c5612dfe461ae642cfbd455b6
SHA512ba49ea99add6d9b3c29aa63abed62a657023cbc3f55a038bfa51ff6d27892c5207ab15633092f5b9afeac2e26ce2b6f6c059a26442e73253a0ed222213d54099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc0a5eaf5b2a8c68dd0ba00fae9c8d96
SHA16316731a9dee6ee3ef16e12d971b156cf2244efc
SHA2565d5485bc07a2cf79ad0e87b2768d033d625fd2b389569dae73f06eabd14cf6b9
SHA512cc4e27c6d93a49a472fa4e4f38e966241497a523a602a2631460d04d54b7b7cbd0e18afb04b8561bcd4705b614b5ac8cf84274ea0f8b3a0045fc59312cf368b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e85ad339dd80a5b7837fd4d425e2824
SHA1d94d0f5924e395aead3462d9d96b7ed1a9b3a8de
SHA2567916b4637c48fa204bb0c7bf2cad8e543b14fdd842dce72ac1738851a7c3327f
SHA512e4d32521dc63b8f2168700cba72ecc01869c26c332a1045b0623494eb2f0d64703bd6126310f25a2309e9640380d2c4d71503de5e796c2bac02c59fb8d7b7149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5712f2dc9db557e258f449c64dfede9ec
SHA15759edb4d95b49dd12c41c13404ee5a78a92c7b8
SHA256ac7302134f951d51149a2eda927be372358fa15c66c1b495933902fc0e6b4b38
SHA512f0f57442127efa1b5d625123fca1dd6e0fd6baa91a2ed253286e948a13ce35ab84aba8f7227262f276c3fe1af6ec12bce7e7e6793028e358f6e4466c66479bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5588bc1c60b9fd339a519c30a09a897d8
SHA188a45d8a0c3527a0ee8e9a1c72ae4ade8df5699f
SHA256187c4f37787fd5706e53acd14d53b9032c9ce759d6de59a8be8cc1021c96089e
SHA512fef745e6d48e22db5c5f89635ebdee5dd8c9767b375b4914981e0a9e4d752b17234c86ed96c17f9c9f4d60cd180addb9616c471283b197a747836e6526a68a3f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b