Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 08:41
Static task
static1
Behavioral task
behavioral1
Sample
ae8daf2499322bbb9334a0371ebda943_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ae8daf2499322bbb9334a0371ebda943_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ae8daf2499322bbb9334a0371ebda943_JaffaCakes118.html
-
Size
53KB
-
MD5
ae8daf2499322bbb9334a0371ebda943
-
SHA1
fa3a8229544995b426812733a77186981e4f3789
-
SHA256
91a231a3a7c0ed51a14af8067150cedce7e7bfca17a830845fc75db5667e06a6
-
SHA512
2c9739efa94f6d39a45367708fc2d5ed8172f95f5f500a453a487e3ee17d4ca8ee466fdccfe3be4f801d427eb727527b8e670d5532235e0a49188f9121ffdc30
-
SSDEEP
1536:CkgUiIakTqGivi+PyUMrunlYh63Nj+q5Vy0R0w2AzTICbb8oC/t9M/dNwIUTDmDa:CkgUiIakTqGivi+PyUMrunlYh63Nj+qq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2A0DAE1-5ECF-11EF-B65B-6A2ECC9B5790} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07dfac7dcf2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430305136" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000b00874cfcebfbf37db36d1354d1c51335e943aaa8be7bbdaee2f9e6e0d0ba8f8000000000e800000000200002000000099302a2e7ec3617f362c5d60df47e15a0022945f1b5439108f40b8b1e7831367200000004a9d7f1fcb42ae46eebf53e1ecec7516cc6f2f96e2146f27397392a7af66a2c340000000d68f5d944cfb36df79e117cf30d5644da04cf4464933d6faea0f4dede69449f6330dd11b7ec13f5421a66c9f6566b46805ddfd12e7709cc023618ef826a4523a iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2700 iexplore.exe 2700 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2836 2700 iexplore.exe 30 PID 2700 wrote to memory of 2836 2700 iexplore.exe 30 PID 2700 wrote to memory of 2836 2700 iexplore.exe 30 PID 2700 wrote to memory of 2836 2700 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ae8daf2499322bbb9334a0371ebda943_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f50159de7e259af37060da5b4f6df24f
SHA11c50d6f23a2c0870af5a6a88e5df56e5b88b7bde
SHA2564716f37b1234efb130762a26e9f99ed0dc2b3466d30cb2982113eac327020430
SHA512874841c58b59dc1e0a39b7072bd518093d662af1d9945b94b0de6f6f1cbb9c8d78e7f3c67565653dc798f7e9510389e95513260f3a545817e266c0d5d03c1c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b18e123d129f3dffe6e995eadd9d15c6
SHA169cb5a0068c64a9f4c4c84d6c213bad9271ff64d
SHA256ed4428e9d38a072f79e5e31e110d2d9746d30fe379ea690ab1270b35b8f359b5
SHA5127b3311aa547c325080b30a75012b2df99f18b729a9901fdd434d6d499b97e00b20863c489db9dbad05b3959b7889c4db19462a5e5d67d529cbe543628b8374f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559557003c2d6117d8f8708df5dce844b
SHA1bd6b86ff3949a0c79672239d1d8d0f659398c707
SHA2567298a6e17f1fae594257f7f2a21a3307f71682ec1cff406de11e0dfe040211dc
SHA51217cb971d86097ee903c01a80b753e604e428f3e39b9ee7ee37b4eca1b25d043b9ac33d29e653b2f5914035ac8466088fcb4832e24330104007ecef9a248ee41e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538d2929a7dc2da7c14b3a2d76d8d0d2a
SHA1e28457988c1ff35c914c08e669d053dc14da816b
SHA256f7c8b553345448cf3b2d33659c99bde3b63ae56ad1e695fb92e7df477467e356
SHA512dcd93bc302117893b0f2486b84006d8875b7fcadf126ac0385f736cfa6de3c79ab0491f3fc694f05e00da3a41196a8611c3003eaf016fbff865c109eb86673a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2edb3595eda13afe5f44036a4f3978e
SHA17152d7d64f1d41d3d421485edfff829743ee8cef
SHA2568f4175a1f0676a45a453c85f76c7915e1443418eb1c6aedcbf3476a209f44661
SHA512848ce7079365f6b2ee319b880af0017194b89f6b822edcca8bea4cb68a149efeab0ef1083d0c690a84b6ca457b0f0201c9f4ad1438f0c0065ee854bb19ffcca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507df5c9543c00720c2339e8651fe6bb5
SHA109787e78d20bec3e7fc55f05284b224a0efcd594
SHA25621a0f991fd5b36818ad169d7b84bd7d33618f730b3abbb3425bdefc1d1bf693d
SHA51247ead7fd8144882b11d6bf00bfdc50fa7a13b192fadfb46a762d953485e8286c53efc25a9a73b781eda1059c9515eb79489d15bb43bb99a56343c1c7987486dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5404b09d8f73ad5b63d1a10185c498c25
SHA188aa2642752bd91b8dcb02c2b40168dc236a7292
SHA25660ec4cb74840e0a05dbcaff6f4d9735cdc08957af8cc517313c94d8d68ae1b45
SHA512d61d82ac161587f3f69877b16cdb4fb9a9625f9e33e1e495f85602aab6eb81f4296c31c4744612410644ff3bffcf458b088b445fce311255aa9a0549ca906047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7d71a2537eeff8ffe3ee79c3607c1a2
SHA1d019ae8a8bf82b8e8539adf1d3c21bfa0a295a16
SHA2565019b2c85bf03d38397fafdc6901e5bf4f7095513fbe71785b7bc54dd71ec327
SHA5122c3e2bc93404ebfa132fc0dd2ad367cee483fb82d6026c88903ad9de0b9a4488e31cfc4e2c888a8ae92a985480de1469d68610bfac5c970b1222b859276ca548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567fdb43ff2a7925454f86ed26256bb19
SHA1f8c43ea8181fc97b15156643628c3a5dd3bec3e2
SHA256207bf3eb9415aa6701f4cd2637adba47f558514fcd4ea141465c59bad16131a0
SHA5123455697517048a96896a3ba8ac022b393c195a05693f95548080f71bfd45da042ecd9095af010cc6a0acde9e323eccd9fdd3d839122d92cedb7202d17ef229db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5178fa0ea0357c6bdbf8ec739f4f25548
SHA1459944d65d289a0db0627e0674c8310928d64ffb
SHA256bc20de612c3184e2f090908fec2f89b08bbff80ac8ae04b5056a226dddbe0ca1
SHA51219293be336972a88fb258eba51982537177e1d7bb069f063afa962a6963419119b2a70e83680f3a10d1e8534d2d4bbcec41ce7236ffea37bc996892c9ab1f960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572143addb55c937b0274887637100299
SHA12e531c082443e2b9da9c99676a2323e9fd5614d6
SHA256daf5513ba707d7f9a18f50eeb7d0f6e54cad12268b8037f5b88d9b370f5531d0
SHA51203ffb75404d3b7ec17f9ba44f0777b3ff273af806d8d7b897137fc3339ce5a94e9186eb8e19167b00c917bad093bf0361a57c7f6594c7b7544c4c9f107ffaddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3859157222e5249a7fcca5117d470f0
SHA167407e3ce3e721b95e57278693a6cba9afecd619
SHA25660eff3fb37c91934db15604a586bbfb2c1357b1fe57347fd262339aad5a58fa4
SHA512bebf29c05fc58ef0951b38879241112afbffb2ca2e877a5426111956067585227698bfa9dd8df1e9adf36ccc5ec7bc4b44b65a91b2a641a1bb921016c4911c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdc4b75258ac53a4ff8970f9bd2927f8
SHA1ab2295dff53e8989a11cb99bb56df734275bc73e
SHA256a03747da718b9b875481d5cb5fe08102a36b1f36fc6d189fa1b3ca257a8d6104
SHA5121c1ddaff98eded848b3970fd6fbb64af67f0743eefb64566805b50347d0bf507a280753cc4a01c2eb1d76a9db6cbcb0b8a57f822528cb2106ab45d7ed37ae0ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0d318991cd2059d9585f0cc718ab3e4
SHA1db2447fadd25cfbec0c39b4c56c5f99822352397
SHA256cc97a473194f4f1246ae249933fbfbf000067618dbc5b0206dd55f3e77acb0f3
SHA512636fa72b275fb85d18382bfe79809dd31cdd57031cc55d984e3029ca9e77997cc5acba0bf1e8578a532689928669d62ee327d9111e8cb5cdcb2d466f95551666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f95425a51551253d7781c7f474ce3b09
SHA13b0661c08dbf8ffe20f60a4f62f8530966284344
SHA256564c570bc39a7fab320db17759fec38b64a8303b0a65c901cad163a74fe7d466
SHA5121dbe84066a30a1392a2fb1ec9b8649591923f8b836ba6aa4e8ac3f9a0a92ce74ec1412d95e197c28281488014d6a08960cd02976aa01d9be4388c9c82d9dccce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7a39f01370139ea1b020fe809db6aff
SHA19301cc9f8cc6b10ef73660984cf7e66bc702b015
SHA2567ce4cafbe8f6262f821c5468afd7b63758df5d44cb0b9c69c1cca3b0f29e339a
SHA5127e31571f691cf67e15d5b8b3191d5d7fb8864e20ac274799a201c3299da422b7aab02f2835ed542df3c1a20d079d27f1e6f7cc912e2286f1406b9fd5a9db602c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5724b287df5ada61543c1b9d134ecc409
SHA17c70af6f4ddb989ad3789a7ad18743453abcc5b1
SHA256d7ce3733666595acc217af4b94e6bfc0196df735aad4165602a5ba8e6fe8a9a6
SHA5124b9bbca8a8e9bcebe98061ff3408c5bd748d3590a20d124d4938c8d67839ec782311726edf0e57dd714cfaf997e9d4a48157445505ed97eb169c0f2faf180a68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dde0d0b17a85ba3f74b1cf6bcec5133
SHA1f1aa01a43a93902e3e305acaf4360b3c3cc0cd8b
SHA25609fe0063e87c506e1e53d89fbb42ae434de014665aed22ee231bb9e0e3ec92b3
SHA5129e26a58ebf76d19b07f3654051b5c7f9620d5ba0b788ca715b6dd0d521750621c4862fc24b27bd441de3c8a249899b76a747c0238364c5c7a1e8080609713391
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HTBGGANG\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b