Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
aedeba7ed1ab4d394a7d2cf5ab06bf9f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aedeba7ed1ab4d394a7d2cf5ab06bf9f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aedeba7ed1ab4d394a7d2cf5ab06bf9f_JaffaCakes118.html
-
Size
1KB
-
MD5
aedeba7ed1ab4d394a7d2cf5ab06bf9f
-
SHA1
9bd6949537a278fbc607efda68021f23ca25c3e3
-
SHA256
421fae577f55f3b18913fbb25234ffc67e3491799e992863decf6b7e3215ea52
-
SHA512
9b693ca845222fd35649e498d59929f254862e85c664f8fa6a06c732fe1c93990911734c09ed1d699926736c000e02397223ea05c6ec3f9953061010c477d9b0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430311489" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 804c3291ebf2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BCA9FBB1-5EDE-11EF-84B3-46A49AEEEEC8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000e2fcc10e20236fdbeee78f8609537c16a0bce0ad64df8b638869598c2e91fa9d000000000e8000000002000020000000db01b3b8746b476b5dfd5527afc9fdfaefe29395724ffc15e66f5ff185fffef2200000000534f77dce5249d9b376c7f9fb017475e933911fe442bd0d396d679d92f485a24000000036e8c00729aa3ae3da1f270dff9b2e52bc90c4696a585bcc9d14a87cea2c640c61b0fec174c9334bb5b00333c35dbf4f235025406cdb640489975406c89f40d4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2824 2912 iexplore.exe 30 PID 2912 wrote to memory of 2824 2912 iexplore.exe 30 PID 2912 wrote to memory of 2824 2912 iexplore.exe 30 PID 2912 wrote to memory of 2824 2912 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aedeba7ed1ab4d394a7d2cf5ab06bf9f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a36ba60c5944a0807bf0944b7561862a
SHA131bbc207b2b5e7adad63dda9d0aaaec02fe46777
SHA2564dc3039358c3b5e11cde48f59c8bc68ac36a3aeaeb6b26f9f0d4cf76d63f8824
SHA512edd145f93e22de85a203f4ba56aa4327d1513ccc1fe64f85f75dcae428e00d5bf39e4b34a9a36cb108b2b1eed349aefaf3a971587603cc6c427468045b5d83cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bc1f1c54b48703bd4be0411749abed5
SHA140ce359ca6009ae5271d20f117985d2d6431c9da
SHA256e358d487155dc732cdee0fffa2b100975efc1d55c8941ef76e39bedb523dfe13
SHA51216ca2d43a2a4ae9c490953c96a92e430ae7ac8670a986b85bc777e0deea43e9eafb221640500a488d1a7feed94bdfe7525248464d66083e0513199ef8ea7ba6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528459559b445fe76e58c8e29fa7f6493
SHA15a4f4f016cddd02f1edc25d3852b4ecfa1e7e4ec
SHA256effabb273099949d5ef597fa48b9e6c229bc0587529ddb187140e5bbdc15723b
SHA512c4a186132009c1930ea08bdd5d2f700bfa8a5222d0971d06cd2259aadf3d0ea81a55c279c2eb2199cce539315eb15edc3ff1473f7d752a81f042b37dd20528b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1c3d30ae558504bf7e02e435e5ddc2e
SHA14633914548df202f1bd17b548bccaf96f01fe3e3
SHA2564a737a4965f870b1a460dc2c05fa00a8cadcab06d7ed7ff90694957e6524d2fb
SHA5120e7d8d36984a786b41ac209fbf67142e11fd46f72736b3786532590373188f4481e72258352820759c562338b2004db34f9b2e6cedc053ced6fc840ba95d6ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594c2487dcc06206a8085736ef0a5f577
SHA1e55932b30de7189e30c68ff41e8ff12cf7938481
SHA256498067796b9107b3c7ea9bd1c31c4f595299ea0698670c8d673ddf60c9088ce7
SHA51262b88be37049c195a3e3b58ad1fd699bb15da68688870d784f10f1cc30345e4319377037e60253ffb55d4fd007fff71a29736196195ba7c45475ebf22c0b7394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6f39b0f864fcc8519bd235c15727fd
SHA1da94db680aecab8a182f16df5545e1bf274b4b8f
SHA256f6a7a4e74274720b105b04cf2a77317e8deebb25a69352dccf5a43876b1ec27f
SHA512d5e59072031b8f0380b55c4da086290220bdc116921c53dcd087a2f814e8eae7acd92e157d60b36f4d657353af5aaa74c45ff8c9af0c0066869a1dd9f0d8a11d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544d7bbd943b90fa5b6accf9f2f19c1ba
SHA1ac7f2762992ebf325ec3586dc7fd99cf484daffe
SHA256a30d97a4c308797dd4d2e75b685c725220e08ef3c64daa973d67097d484d34da
SHA512ad48dee7afa8b2b8469a704ee5a86886cfbe53403dcdf16b38d1b2ff5ab519856d5f4f4bb33efe005907a9f3a651a91dd7b284d940c114a08834d6e62b04ca71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573df0562b44f87de95537a8045fcabde
SHA1d9efb295dad00bc9fcf493f978499da2c7926d26
SHA25645c227d002bd3708c61ab4bbec3d239987d6ad078ead439e2be5ff20de0022ce
SHA5120b233c93d11a0d87228d45410aaf7b63eed64426eddf8ed8050580c7a6474002609c493670165da596f275a7095823b43061d4aaaec25e4188f06c6d467680ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3c6afe5f8b4d94d7569ddf1d6e9f272
SHA1011d118cf7eff63a5157faeaca37592d169239e6
SHA256ba4f08ca6ae383fb0d75e6e45e44ae5a23f41d99f1b47fb070bd1d72b66d5f62
SHA512e470eb9deb0b0af509af94d411183d3cd0caaf60fbf10dee4341861a77f268a94d7c10722564f517df8c0d394f970f0b49b793aae6f8fae8cb2eece36e1e1925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5b626bfaac282fe39fb8b07de5acfa6
SHA198ccda3836cc66bb11118eaf5232f2ab94a260af
SHA2560ca9402bc8c606387a6f9a538b9d5f6d40d0d9df2d33f233bd3e4ed7bfeba862
SHA512bed014c8c2d8b278153d48e62096cdd5f9c76c30700385bd499d17186ed4237749359ae91846a24b57946e60198befb5af49bf414578183536f29cbd7d112830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e785fb84eea5c03d646993cbdd4d910
SHA1eec137b245ca0dfa357f114bb31a0c3565c59817
SHA25696e89e9e5e5ec5534aa2fe6fef8fe06ed00feb0ee4f5502827a5f28582cc6114
SHA51299e60c9f977b223739c69570b657d3c4d2a103ee7d8b7c6098db7fefe61ad991bb6b6a1723dca3cee27b75f1cd7db8cd818bd5cce3b32a9f3a25a951fd88cd08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5196ec18b0267a8f2e64bca1f76ef0ce0
SHA148501c9cbc51f95bc79ade759c6e2822f7f287a7
SHA2560c5ffc62768beadab49ad8905f5a52d957136aa0cc2d65c6462f0d0f9542672e
SHA5122bd7e2ffa1808ea91c4ab820e0783a57a19bd6bb2bfcefdbc95253a0ea31d1f56be3442387d7a6e43fcc57c5df329021fe1845fd651001c56ea1ef47a07a8795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533dd9ec1d2bae0fd0042359680b6ef9f
SHA1b0303765abdc773e8b6c8c9d1771d79a1302bcd2
SHA256d85b24853f30fee4e757306ff7b455aea04f7a8c65f6f7fb2705380a12c551f2
SHA5122b2ff6956f1866fea3676adae5c267ed02f1f55fa3288f08261cd0186fe3af6ed71a3ec8203608248f91fd6fcd620cdf7153eebda84c22c0763cc251722ad3e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8fb0b9b8b52f232abcd0160434cd232
SHA18a518e1ae2f7e142d16bb60fb642c3b83680aa69
SHA2560f64325583354e3a62ec3b6874c5c3a56da2f6f7b7a88f52091c67a9e8e1de64
SHA51210898dabee067ac0f3a8046c50fa364580c75b7bfa11fd671f49da6b0effd44cbb061a4bd8fc131a8d233e59ced33666b20305a7c633f0599f72916f314a6970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a155063202f069348405ed85dcc854ba
SHA19df2cd66da29431052eed9741f569d58ed12fb76
SHA25656e7bf08cd4b350dd6d53eb15c4fc0aaffd4d55882df7bfd68a8008375f5e84e
SHA5122c9f02f43de338185c902459e73ce634067e5d1563e5346d5aaeeda441f294e62622ffd071daf3cb8457c102a0146c2017dd8d61a79ec7b362dcdaaada4c9534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a413622346f95c1ce9ef789487eb65fc
SHA197df9a174331926c537b370a23d4d1fc046ff915
SHA25627aa693e06f8431e3cf18431d3b735d746a47d71074c9b68605d27281e5d5708
SHA512b3ace0ade182fe1e4beaabd2f662a5060d70e19fa49ed4ed2f00cc4b698409894d2d2f15d27c400bb1225945317e12a4b5745a5651c4181c9bcbadd5f8611bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c238ddcc87bbb2fc8c3ba79f52d8728
SHA1d02df0f6e219512331494074467f5ea9e8bc055d
SHA256a6e14222e228196969e23afac559f0e0a453e9207a741019662d64e58ce3d6b3
SHA5127164c5dbab8129a75a4fe53a9bc9fdea169b46c7199eeadc98f97b169ebfc8d93a887a0e44249fd3da4fd3b581a49eede1e40e559bb0371ce3767f8f9dd9f25d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51114cd2ab510409ca91445834ed28b23
SHA1772fc2a046ef0cc565c893baa97b53ac517038b4
SHA2565d4ba31b86e5ba401e922d26f94be99230a0f746f0919610121482d1243807c8
SHA512eaf1c2f2550d70c471d63b7eba13de0bb22ecbc0873c146897b0e9d8b1ff61c1a176bccde330d0dd2f1a7c1091560f397a8c14e580f3929ee4a4d008c60c1afa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d071b6bb78ffc0722ce1c92b3a82f4e9
SHA18f4a5abe7a6ee19ade8fab1c1579e081ed5d5f8a
SHA256beda7791d2b784a285a025602294e06912636e7bd77d0444c66bc79938d1f151
SHA51225798dbd7f9281df4983d75e860a6c1acb47af75b4625f28c2dfff41e9fb089116615b3a0604cd6d04ce23889ba2950a4307a8ba192d51a3e7b7945d856cd4ea
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b