Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 13:18
Static task
static1
Behavioral task
behavioral1
Sample
b39c1f3e5608d343164586101506dd66_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b39c1f3e5608d343164586101506dd66_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b39c1f3e5608d343164586101506dd66_JaffaCakes118.html
-
Size
3KB
-
MD5
b39c1f3e5608d343164586101506dd66
-
SHA1
d302fc4b36fc8233c740323b6e03c9729a01f7de
-
SHA256
0884df858af4b0e43655ded10573fde4fc1dde4fdc2b1769bff6922403e38176
-
SHA512
ac8d68e594c2f64aef51ef2a1d82e7f3faf2058454440a601f36cd6b649fe3dbc86760851c266600deb3c56e3b0d0bec7bedf2e2a6ab1c33d4d5f0be9d0058cd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000008c748215c0ba2265f8fef07ce83960a0ac08672cfc5e2360f208c2e0de67e684000000000e8000000002000020000000359e5aab5ac936bae159a5e0a4b70cdd3aafa671efd588315a8a04fe317c73b1200000003ecdcfee48e53c867daef031d478c9b287927d2b4608098b938affe51b8aa93040000000193bb038fd0f6b84015c12bc242ad2470ab2d259de613e042b08b0a17afed3dc2c037cde7bf058c09248937da608878e11d77f097f246b63b98cf285b9afddd0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E97F6801-5FBF-11EF-9CB8-C278C12D1CB0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c524acccf3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430408201" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2296 2540 iexplore.exe 30 PID 2540 wrote to memory of 2296 2540 iexplore.exe 30 PID 2540 wrote to memory of 2296 2540 iexplore.exe 30 PID 2540 wrote to memory of 2296 2540 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b39c1f3e5608d343164586101506dd66_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54bbfed39e3365b39fbd6a63588cf2668
SHA12f4c28a40d228d2aaa2e0de72fd1d4e62db283bc
SHA25638fd7d118311131e465045acfdc9f9d520c297dc20118786bd49ed9c1daab9b3
SHA512ca41c1aa5ca102581efbdffbc96523ff44b061d9f2a7022698aa322bc6cdf2832bc7b26ec2b290e9e194319d954aad94dcc08d925938e3f258b9776ebee400f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d5f70eefdf7d02ad8fade656eb13eab9
SHA1b9bd67bcb1d0f8bdf410b45669d0eac33df531db
SHA256693d9e65f15149eaf3b7a910cb41a7926def96d7f7da25b2577ad25fbf9c2f0b
SHA512e8bb0f6ee772d6c57ce7f189d71602f146c733d2e652ba1c30f57904b48b62c4e75b3bc188c4f2b2d3589e839f9980ad9322789325b02e1e6e9cb90d62a07aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50c7f156f16bf924bb4f6691bbf986209
SHA1d364b5242bd146be78153471b7dce4eb6b9a550f
SHA256234ae7659f6f857009acf6b684815d4e441038362d52d89981e08274758fd423
SHA512daae5216146bbc77bc157e8a1fa6444505bf99ccd957565e712867ebe539fda9e7275a75ae8e49f5b6512360cf37518a26275568f4bf87d137708024b808148d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD542cb3664aa01203d3b0d592dff5e36a3
SHA133c1779617232be7f0ff7b9648c334182b7fba38
SHA2563d500d211619e6341e1fbeef09027e145fca40ac43c1cd81636b160b5dfa403e
SHA512f0af840904631f617f39e9f6e8ea72df5f3ae214cc702faa1ecc03abe3d0c2f73fcb6777250925b61a312c0bda0f7ac60dc54316025feffad1e317c3c45e2b97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fa05e6d79aa03cb520e1d2fa7c50d101
SHA13ec4850ccd4b925cc4bf845c5daf03e533b75d5c
SHA25649389a73c6e57e06c3bf13a079f6b27108dee77ff9970bf91979b2a94eb20569
SHA512d2f825907cc977f5e029dbcd0f413e7977dbd3640ee93aaa2d72b20c559c17130ccb60f8fa0703851eb5bd7f8796316ac59bc2a52d3a7e723a4182c4065d2c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5324f46836c7b8a719bdb028ec9fa3b28
SHA19e1b78cc185dfe5312c92fe5b9a130f47dacffcb
SHA256093ead8cd7304261f9d74bf1c9fbf5886bc265c152cab06edaa16e42be73bb50
SHA51230615b1cd44289176ab7123c295b752962fd134ac30898ed4141fcdff5b777141fd83855d8c3f23a143ad2942c65694279f5cb4b806cb1d5926893534d40145d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5597709bf834e8765be96c5b3229248fa
SHA1c34dcde42506948f3f71c061b7f54f313146f430
SHA2563bd1a085b422d63b02008fc51a8e5c942a9e45231dd46ea2c5d2e18ed2aa4668
SHA5127b703081a1b93d4555847cff47af43795b1ea2fc9404558450f81a634fb1151232e723da5ac9d472c0a306c6ee24077e6d079a061d7a18f1c92e8074e18ca143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50aea29e9d5136eef57e80b53eb271bc1
SHA14932c133ff09a117889117cc69dd2e181797ede5
SHA25691d9c99c681b4f1188af9c8a00b98addb0bcc68fb7e14636d20081d0805823ab
SHA512c320d0de280b6c9cd0947e93f48b90bf979acd54eb0f38839de7a90b91e7b8b078a37b48610752e7c3c2c6872ba4240766bc721c2960716660cb1da6c42f11d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5daf75403c233ae9618fe8838ebb1420f
SHA1653495260c343d4c97b51e770f96d9b66d793c19
SHA256698ae662037a41ca4835bd236e5bc8582c423ec5da3a104839474b179d2adb28
SHA5128ad066382fa2b98bd629d2885ad8bbc35822dbd67521142c414dcc6c4a9d1d52b351db14b2090a6c6eb6a021fc0304c70773f7b9ae772461e78c7cc782946d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD573663f13ad926c7858c0f88e76cefd24
SHA17dd71e2553dcc75bb2e2885ace9526b2ce5a0b3d
SHA2566ab6d953fbcaf00efab39c1779c6e2442cacbc5402567b2edc95308b477167c9
SHA512a262e7276e1188467418dade55c44c8985396769da7e351404df82945d847be92d9326655bc8cb58dd64fb3a771ac3999447d2afc6fcad27a0dd1c4117accb75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58723cc3b71812a128615889ce0c3d6c6
SHA1f675dfe80cf65a595e4a1e725cf71c72f4953314
SHA256e9acdbb0c0a511b59346a3d9510c088a468d4ed44bcdbb74aa99afdf7ebc85b8
SHA512458f429a8387c2192680682c32e2f273c6c9637ab6c56dfe5984a2d3205cdb9c627c97675eec10623c3ee3c36cc1ec1c5d78c5032fd4f3e306b22f2a87f33235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e639a40989c3abddf35d15909777b56e
SHA158f287b501a134251da19d1d269184874051429d
SHA256b4612a1225a518a6ff789cd0909ee56e3b5da704f1b0bd55883e1f2fd8e0e004
SHA5120ffaed77408915039fccd6b8886108f386bc9dffb202ae498e8329742f809f8da9fdc2c11758ad39bda0a5652b0e49da5755e0002983c8332de2d81dee0a79d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dddd61d8ad8b2e519ac15c4e5a6c71e6
SHA11e2e923a5b4fbd3634fa0e96309bc7e6034b449e
SHA256bf1edc9f87cab6d4df754f1c13c733109c9ba648d1edf89e215e2e70614ac77d
SHA5129f2623307c3aabd13c31fa395d15bac3003aef2f4cadcc1ddb98b3e7e8369500075a85d70fed1e94f7a96d8edf24b05941342714c4ae4f2c6757497f757991f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50e2f3653650cee7271cb9772f5c8f7b2
SHA1dbf4230d7edf4ad0f6e708318ced22dbbefa9e9e
SHA256d621e4f09e0bab1a08eeeadf09ae5ce0a5e7e29b11e617a52c6ea10bad0be759
SHA512859cf5f117f0a4176cb3b5c2f8d7da62fe9a6379f3b33963be9795d337461c3cda61ad0d8e1b4bae2038116894e7c98619e0ef2b392eda76292e6323ca18bde4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50c3d91d301216a2237d5e79f21c98ae2
SHA18653b177f33cc4e34f1dfb747fcafcbdbd3744b9
SHA256bcb8ca1a3222e0a26a5d16a09da6013baa65ab000ee3d18d78c68eaabae4c6ef
SHA51288685efdc34b7bff59ad58f5048f0c0280eff085a8d06091c02803dd2f9e8f4f73ef340405445f28d2e9b924709fe99528bdf42acb2fc67ea9b82f23806ef65f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD553a4cc31d61d744c0a53537828ab1ff3
SHA1899bd7f75ee99e1cdba985bf1d198b4d3a6e4cbc
SHA256d0130b962b8a775c1ce7e68922ae6c740f7b5372ae23bf45f441dec759b5d6ae
SHA51264cd29dc3428961285e08229bb27d776dcd28608e50912a857d846c1335cb21783e317ee14d714d1c628392acdf2542cf5e101a163266300bc73617117be2001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a3611aebc0b11e0518431f62cac9726d
SHA1001298f454abc87b1105095f9fdbd5dcae750431
SHA256a5ca8cc07061f23bd2d54613162fcb03c1c97bbd25839f8000674c6c1ee7585d
SHA5127cdf84c7d88a151a9cd05ab508a77b03a2a002b5e3a53cbf3da987a25e856c41b1cff7a0d375e03eace56d8df51c60c6d0356a1d5ce3a15d8e30629eb16c7ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD527d906495b3bf76a33a11f01fc864dce
SHA13154029c8ebd7c77bf403f844f2b8ee3d3c9e7e2
SHA2563df40fc9d408b08a56f779636ae2ef4f232aaf9d97e5c8750626611d66082959
SHA5121ff5b4ab073e44af6e65aefcd415bdd8026636960e196d28ae8e556954c845ecc4cc4dd8dab1a05800639ad50bca72c896c1d9111d7c8584356fd36e398b0203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5293c90d0c2fe62f12218abb63735f6a5
SHA115dbd6a1b0732510a92da94f8b7333ca8ed738c0
SHA256d131481505bf54e3ca42170b47b5f57ef3b0422b28fd96af7e86415dfbe8581b
SHA5126b0c037305600a27f5610808df700203f8a41360f47437c9835c80dfe4dcaaf542dc6c2da6f9c6a4bd5456324b96b9079499b196daeb4f2d5d8af2eb663d5d09
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b