Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 10:53
Static task
static1
Behavioral task
behavioral1
Sample
aef0ebd87db10b922ecc25d9d16fa995_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aef0ebd87db10b922ecc25d9d16fa995_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aef0ebd87db10b922ecc25d9d16fa995_JaffaCakes118.html
-
Size
6KB
-
MD5
aef0ebd87db10b922ecc25d9d16fa995
-
SHA1
12ba270fecda3ba656ce27edb66e22e88a3e09c7
-
SHA256
1cc31abab8e1d6a3d4b96a655a141800cc483cef0643f87d8a6d0eccb47e5e26
-
SHA512
5d49da6540088aa68fb99bb170b3b125c750ddbe3e5777df19b543994e9fb87aa966cf557fe674be1b271483de06af1ff047ee3484a3e660b4d0b79d52c5cfc7
-
SSDEEP
96:uzVs+ux7jatLLY1k9o84d12ef7CSTUTR/6/NcEZ7ru7f:csz7jatAYS/e4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000626ced1086556a0706bdc81c3cb3f2d93b3fe83fabfb2676e60f6bb30ff8b621000000000e8000000002000020000000715de93bb625bd3c60da895042f9c6ace614bdc217687ec997d6c44a461fa9c3200000009ed537decd2c3caf79df8c966833cca1c5a64cf65f3f6004a9adc53776a3beef4000000007cc9fdd97f69bd8b9edaa1b6eef19f56692265ee995a10ebde342a4949ea2a85cfb3f310d41e42d4217d8f79f4daaa234dac1c57e89ae90cb1c557711ac64cf iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{748DD231-5EE2-11EF-9478-46FE39DD2993} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430313085" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 302b9b63eff2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000863f60615264a25491bd848abee5793ab5fc8f30a098bd878203ec0433927748000000000e8000000002000020000000edc58478a48d08d907b4d97fd94fef87c4a2a38255954b40237400daef73299090000000e9811aaa99be5046b86134546773b13aad375746382ff8184370d29885eb4a99c07a358704b7338f6403574f8db191e1d4a4e096e7eb4ad2413c0682d4bcc0ee9f5393fe5606aad431225540aa0059ea0b547dd16d69083f720821bece12a31d85d56908bc591dd7a4c08de68e63cf1a34fe6ef4343e6ae01c8f8722a228ecf580a6655cd4850c8def5ee2264e5a4e6940000000916124cf865c5fd7bdb849bfcb4a2a59371eb4daea41142cf4659f7600b83de7fb636fd1e9d4e087ebc2590d0a63aa82f5a38b8f96d31d19e05c9d04405775ac iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1676 iexplore.exe 1676 iexplore.exe 1920 IEXPLORE.EXE 1920 IEXPLORE.EXE 1920 IEXPLORE.EXE 1920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1676 wrote to memory of 1920 1676 iexplore.exe 30 PID 1676 wrote to memory of 1920 1676 iexplore.exe 30 PID 1676 wrote to memory of 1920 1676 iexplore.exe 30 PID 1676 wrote to memory of 1920 1676 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aef0ebd87db10b922ecc25d9d16fa995_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1676 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccbe58aa395e01cd23129b7190e7c3cc
SHA1c5a83a23b72a89bb8c177454e956184eab545eef
SHA25602f5a12f1bf7c0aefe07b19f9221e22768edb75821b20be15e78c4b6aa48496c
SHA51281d518eb1381bd036446d5f56ca7fff85440dee61bc9e8774dae71dce956b021a15d00d88fc795c514cc9b2a901f787e5cdd189f88f7730feaab450997f6fe1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ed5727b854992158609cadc861dce26
SHA12a572f16b73510be76acc63560b0d273f42ef85e
SHA256a61abb83b7b135237a6d28e02e9e0bf85175b3d25f8bd5d2ecda84ddc0f1c226
SHA51220fb63b25b31e11e0f42b9d9ed02811b25934347365332f17edcea825fe4e42fb23235dfb95b8ae5abd20d6839be878b7f0e52e47f669df63a9cfbb14fb5081f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d0fe9b6bc896fba98ed01750e7d52c9
SHA134337e2499a6353550b093d113db5fe87203a4a2
SHA256ba37df61d524536fe42c9347df96d3cfb7dd3b085ae821471803161e85164caa
SHA512c6a8f8118e602ba460ab14eaeb9667e3763c4985befebdae9819aa1cb84e7beb717edf87a8dc2d96fed4df6cb27c9a484e46eca2762021073fd9bbc1e9457a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51baa7056b291cdfe8eda97f1187b4e30
SHA12b5773fc3f06ad8c04dd9f0b9d932cf91889ae08
SHA2568da41c74e212f872b7333ff627294ce516e67cf3dc9c2a4bc1d05dcf9b456ecf
SHA51212db5b232aae9ca5586dae9b43f47e2460470c6f069a9367e88366bffcec5b51025a85b7f8e1f1a210bc710cadb4f42e36f04b8e30a5ef57314dc309e246b64a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579c40d48ad93a9fc1af5a4609d50ce81
SHA1246f4da9873b8a41e6f6928846c4c7a8470f8f8e
SHA256038dfd591f8ca57a92af59bc523398e30788d64064b7f03ec36da7b79eeec743
SHA512ba9bb22d44e95bd8dc43af834f903606246b629b886a52d76ca06ce58aabf887b47e2827a14905a728771d670f53e7fe4b3709ada8221ec91c10bc083499ec69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c25a3b678d4960fc0435640d6e106a78
SHA143f6fab861b2f58a543207fb3861ede42c636216
SHA2567cd4d68a7a8ecb5886fd69e03889a897dead5ea9a759190586bf2e3c93cefd77
SHA51287362e7c17e099bd22946596e06c77d3bfc6d0ccbe9c7647f5f1647f52c4f11421662113d235aa7909e03c329e78ab917c9da2b1160f6f7730e35ed24fedeea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cebb1810db4b6fba484522e731363d7f
SHA173eb7e977da3cc92f2a3ccc0fedcc8c0f5de0ea5
SHA2566a2b0f5934659a1bc8ee2885fefcc309be93195f718e3c41243801c8da2b232d
SHA512b4a1996612241f42dc9719c644392f812d58a874855ca8c9f880328a85dfc4b960f6776cbabc5fdb33b13bd04d8b0108af525f7b12c8f1a66e1c1c0f1cbebb17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5244aa50d63144345b2a911802b3100e9
SHA163f04d0609d200228b682a572971725be68d9bed
SHA2563f9d70ec6c88bb535172556be6d779542ac7325b9c35969d8b891650aed47927
SHA512d2c820a1deb17a632f37abbbc49fa8ed3d3a6e8c7a83a7e9b48d30d1e2bd42204611da688292d658efcccf60c33d4cc356b59765dba89544a93750ae30c887aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcd9e1b4d3c4acab5a96b09dd27b8983
SHA18bf2b93295592bdc1f5d385838ab375a7b8655ee
SHA25684b80ff3a5f215189ddc79ff70dfdcfc7f9ba69a2b33314dea42cdfce93b6c59
SHA5122f03a79a04d221272e3b486899aa2e9598713ac46b886188a0346673c512029018588cafaeef7376dfc1a0613986f07039048dcf56ee54ced2baf3de5abe686c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c389d09d0c0d3de13d1be46af2b1a59
SHA1569358be6b30955274518ee0af6f7ac219a80cd6
SHA256e6c06d63c97cc41f5ca46fc72d4014e1715328ad429a1742c7088e325ab3e10e
SHA512099757416b6eab451946a21d84cfe962a0c6f8ba406f1ba1556163d4269d736ad32cbe71bd8ff8752a65c0860d6a4f6c27b976e4c6eefa1a3d95206ba744ce72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552fc8ebf3d1ea721f02cd36ab0fbe53a
SHA15e5c6e751fce15c54fc9bb58bfa83ac21dd7cb62
SHA2565470d469354b0edf77586ad5adc16024e47c3a06ffb33ffbd993c86ad69a04a9
SHA5125e5dde5f7a7b0036a497b6f7cb67d8db52291332edc8506f898ba377f0d7c22219ffbabef082a4acaed4ced01c501185bd73e9b5929b29c786389261b7b76191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50543f19d9de9211cdeb24df6bdef2f3c
SHA165b061bf891602827906dffa748dcf600260beab
SHA25602cd7c72f9ad12e8c33605385554fb71ccb872e88db258f3f768c9175ac6d56b
SHA512df6b92989ef56632bca4bbabea9767bba22e202e4b53269a4516fb1058a90dc41221e3d2c23ca8787a12b21a7706ecbd80b428b2233f76446fdb3d47be86ace5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1064792e609f77e3e3d0cb81e37a903
SHA15ca086fd075405bba046f2a347697be98ddc5dd8
SHA256a7f9f481e0000791b68caa4001e69a61d5bea5ee721375fedc64367c6460f327
SHA512f337d9cae035269bc1b22e7125dda7a0c1ecd515262822b0fc3991de2aa48f32fe81d414c5fb649c27b6f734cf60a72fe74ad0ce90ed6d53291109761d8ba45c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abf37c3f06e42721ae0a0fab68308026
SHA11eb04ffcccf9d500efc0e289e477d4d121b53446
SHA256a1f7eccc73852b9a80b208d301f84a5c78ea2d1ca030ead81c997444f31524ae
SHA512c443965bdf411a9cf9851fc2b407248cbc834c7cb97cbdd0d3d4a1959c6c1875f8b6a0bb1ef1967e7c8785cf54e3636d9e3838b456398dc8656bfc11d4e028ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581f080e07b780cefe208265dea8ddb66
SHA1c44d138423d6dbc6f29c383c50c92bf21e89f58b
SHA256476b983b58b8379a6ec22bc9a1e1ba85e3ef4bcd96af99665ea8fcd656c1618d
SHA5126d27c724dd01c0009b9f52e563619dadf4f7dacbf8fec011923863fdb8fc8c21fbd7f700f3c604d6b53ee6d074dcf9f9ecf174870ddc6d7a93d1eea213eb0822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53181f3890a9070adfd92a37177a0130b
SHA10e82039b0d93364bb6f5efb88b8b73208755256c
SHA256484644f7e04ba99098572c1541afcbb66d78d6db31a8ad5466264a5af4149d52
SHA5124f678a8eba0edf76071c2db177dad63073464a54cccdccf1e457aac09452178f9eac6671a9374fdbed18c7bb94b1c53ccb4f7b56076a31b5ee6befe65514ee3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560d4b70daec15b373bca9b889f32d144
SHA1a6222b67573e244cf56f38639ed0183d29d73888
SHA256ba35e9fa15f367ed41e1ef6b145da5e900d93bf8295e189cb82065fb4174c6ad
SHA512a6a52cfa3d9cf59af3589c8e9c588e4de7f5a1b58bcc435cd7d6abe1361e2d37fedf659693a5a54def90fafb366ef7fddc4d16366e5195becabec33992ace215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538cf6cb7a5a08f131ba5fc6186587141
SHA16e4343b3a275997339fb1741dd9e877160ca4ee6
SHA256f9da9c66134521e1a40525402a65d25e344cfc865d92f4d54e971209c8884d87
SHA512e3b4887d6311d8399dccca84cea72786cd6a699137a439206d14aee8f9e86eac2b339f44cc13182fe1a94bcf3c0851724227a43d00512cb84142768f6c70bcbd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b