Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 05:44
Static task
static1
Behavioral task
behavioral1
Sample
c0131d1914fef424711f06a85d492804_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c0131d1914fef424711f06a85d492804_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0131d1914fef424711f06a85d492804_JaffaCakes118.html
-
Size
3KB
-
MD5
c0131d1914fef424711f06a85d492804
-
SHA1
a2d5a6a5ed4e9b107b0ea45f31ac1ef4c1e5bca7
-
SHA256
6265862f09098c9c49b773401541888714b2f3682b35fafba845089750a2c7be
-
SHA512
57cc541317a9ce4571097f2e1d49120c5bc87bea40f2a9554490b5c5f53124f9a6578a74239882c726e2cdda5caea8546c521199ace6d3296d709425b3788517
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{13315221-62A5-11EF-BDB6-FE3EAF6E2A14} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf710000000002000000000010660000000100002000000041152d727a414306405c3d639f390bcba4f0ac15944dfc0437a7c6b62241f81d000000000e80000000020000200000007e652200ddf3acf5097590837511e998cc8ff4d13f56872a697489b3ff80cd28200000008cf5f2b3b2bb94f41ce123d4b44316b1484617f16d8bd54d61d15a0db34c1813400000009f705041d729dc079d788ed81225cdf65868fd8b6697e9ec7e982408d336b63a1e80323052260f7561fb457fadf752f390305785f125cd2a0691364a41bfa919 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0039e6e7b1f6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430726528" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1988 3012 iexplore.exe 30 PID 3012 wrote to memory of 1988 3012 iexplore.exe 30 PID 3012 wrote to memory of 1988 3012 iexplore.exe 30 PID 3012 wrote to memory of 1988 3012 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0131d1914fef424711f06a85d492804_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5261b119627656f0ea4e4a07835afe6a9
SHA1ee98c5d2c073f1f05b121e3549e9ce0a50640e4b
SHA256788e66e750e1d614bded0c7a0ed347bc3cb55959f8128f8a8d17eb66ce3896f0
SHA512ee697fcb5ceb4714ac7c48e96c19b9ac2e4bf91ea7e2114a43d1c1af5862a95884f0ae05efd490cbcc3424485dcf7511fbefdc586c05845699428eb60e74ac2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cd73e40746073c43010b6c17e0275de
SHA18c1f2ca8cf291793db8ca945d4f63f2758d29a00
SHA2564f6b41cf9bf9d3f3d052b32e385ccea2d1ab2f635ff76dfae3ca3266b28673de
SHA5126bfb6bb020a3f85be218cbc74f48029961e99350ece3ca8843583fb6268da3607af821bdd6d1ac280ea86c41661e087c3d4681bc28288961a8629b3084cbea25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff5983ce021364d821b5fbb13f6e321e
SHA195222ecf49f621dcfdb60e1829170457f67caa9f
SHA25680d7a2390e3ca9c24d66bde5c4cede632a9b9dc2e5e2b3c051de16ea9c0f9a4f
SHA5127031d4755ca666ea0cf8ff6a152ccc8d3031ba6bbd96b7282727d1770074ccc12c0da7a8a7f9c975668e9f7fca9bfedd4f83e64681b25d83c3bc4fc6fe2c3732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b679e1ffeb8c820e5baf1670d996389
SHA1fb7de9e92e306823943b4e27554412b091730322
SHA256229128821de07274c2e6e3941bd520763b376898d7052ab32087afe9786ce289
SHA512904d601cfd1cf163e57d99adf16515ca9aead71ef6251ff684b3897bd26ae3b9f236af5664b2bb7060ff8295805b74e7d9dd68ea35e8b98326b55c450ad281af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f5c8bf35436b6b2644735f0030bf6b1
SHA18e2cc316ba1e38ddac5a983c49335183a0bc8926
SHA2569cbcc3bf16ac4ef168d64cd68e54e91b2bb647a695115a683813c5f9ae06a4c7
SHA5129b3310fc282d428ae524bf2781aed84f7f0f0f95e944258b694d0fb53bc5cc1b0761d7cbb8fb1f313a3b170d09c8de9196c66610f4433f1be6183ac3ab8ac49b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568af961120de498045e5dd668e1440b0
SHA1db411a3b08dcc83149e854ebc4c6b30e1cfc1003
SHA256c02346398797cfc924f724007a438835524ae87957df4c0357ba58ea5c0b681a
SHA51291c059d12c98be6e4cc3d4a6ebbdbd63ff6b8646ff3764bb7c7953d4b1529efc232ac81d464a5c39b3ea180c27197511fe792a21b60c66c747dcfad0dc6a71e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56447cdb8a0a2bb8afacf5fb9ca358819
SHA11ec239a354f7c683564f844ab0cb16f401bf7663
SHA25647697bf6170326bb33a17c685a98970bd2c78fa32a97e5330c01f60b976a9400
SHA512ac4d266ba70e3c8f533816f42f59e1e6ce6873b78320fca308493d9836bc017aa7d3ea9ea4efe88f442a57716569f0e5aa4b0eac87949722bd05ad00919206aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5276c8bdc559130229b8bc464921910d5
SHA177907d64ff071327b8c0328982781559a6869f6c
SHA256f178be07d38ea6b5edf09278a06db983d4fd67ae5192ebe64fa8bd81e87a5794
SHA51287b7765271000b73d98f4903737a1b024fe04a7ec32fa9bba539bd4bf392f1723b4f83869e2ee9d665833d167ea78a74a212030bf901556630eee418c590b19a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541376bc61d466416d9a524892e5a5652
SHA1c0dfdc894dfc194a5e11bce9d78ad8885bb233cc
SHA256880b62818fbd98c0d5432b709eb2c3cf8e3850ff69803658100c73219d9b4694
SHA512f734426fbff38de346fc63e15930495b6a71f39d50a1825be1dd26b7186874aa5cdd76553205fd73bc331cde9a3e3f810a598082f787f106cbda345926b3c5a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbdde010d6156d808f952f941343b3a6
SHA1afaf361fe59ff486b6706cdf5a1102cf25b2daca
SHA2569711c2c2e5221824fd25a6c50469e3e1302bb7d7df31ac2f46886278b90f3246
SHA5126f20ff8a644e0dc08495a78395e0737cc9fc4d4a623077d052cb98817d099ed7369e583718ab965ac5fe758b9e2ba002e2fde453b1d8557579f71c939f463767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53597d90b0f5ecff4bcdc114b6681bfd6
SHA1b8eac167ab115059289acfec8ab6e278d6f5a580
SHA256baa8f4aa0baad9ca26db693adb041c0928a806c70477a45e8d2b424caacd1410
SHA512e133831ff4d1842494db6217b743784806d36a65b181dea2b6e8fbdc0c64e1478892f1356178dced8cf3063b7960e97ceab7b8c4436eaf46a7c99a2a723ae59e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f71239e18da9d058d6af34e1eea48fb
SHA1fdf73af8f625fcab2c59298482647a0adc6de309
SHA2566f143c043c96db750f65ff4db896392e40f8a7db3bb8cacd7c68894a32fd2f53
SHA5122a0ab8c08aedab8adbe33d84f8ec0f04dac99f64573cc9caadce2b2fd7870a9df0e1073f7dfdf8174a8f51a919833223172994b77c6432d0aa7d389cf20b07be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534ca9a63a6c718bf8b479d47066a8a15
SHA16716473b8569bf7c32e08555aded2b65683aaad5
SHA256536ffaf724d418bb46802ef8559fe8eac0d3f561ce13baed2e9a7e3ecbf97a53
SHA512a3b687fe00b6f4c1a33f84d3fe7533d003f68912dc068ee3606da020faf263556dbca5aa2aa0d5bb6e5d46b4b8f421ea5198de2837eef10ccc3d2aab23503ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577cc0ba31a6c5de6513d7cb3402d7a59
SHA1bc9d5c28121e1d02a57f8db0b71eccb335512b2d
SHA2565a3031679be2007a5615a098ee00bbb8f83d36f038e73c3d81c44c81d7e08272
SHA512be0d145d40f967329e1d691bee32eb243ee2c2616a9b2ff365e99c6560325ba91ac2e63e05fc020b755b9ec1e395ca428591ace1cd46fd5e8dfc11822b78717a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e75b1cf0ba887ee3f02ec0d1dc98834
SHA1903bd6add5665c254ecbc314e2edc8ce87ff17dd
SHA256565c4e5cf096ac0754b17f46df3371902500ee30ce25ebda018cf79a42ccbe1d
SHA5120d57067ffe080f6d0986144f1f3b0dbb12640f6c318b336b589f07e4f995f18348e00fa226e85b5f99dcd44e4b4455f895b7a4ce23fb23316a5ec15f435b8182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b2de24b5735d9fbf0d1eb6eeed23cc1
SHA13257ccc49102f19629955e816287e17a0da0c130
SHA2561494c2bb2da1bd107263313c97093692609745123f3b0c70638575af586d9dba
SHA5124d5b51519d7786dce87dc71abebad78b77d6d49fc2248cb79992dff2670b00d522ecd103484fb3efdfe797f9b4ca1abc3c14c08c0158df4ae14b871d4089ad8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5220b027ef183012a6680f8aa0a3625e2
SHA14cf539b2795dd0f2c7cc84ad3410b23ad8726af1
SHA256dde4bf604f28170c1a807a720f6978d950ccaef9594dad72b1639e4d9d58fa29
SHA5125aed7f5344da0d70ba13ef85992d1cb0252670c45a4487c321b7503faf91e857384723e32f7abb6f84a5da945ba88e135ac36752ae46db72e12ad71b8956aaf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56239fc49aeb4271eadfdab5ac92c7204
SHA1d126c9202452dc472f937d03e73c615c069971b8
SHA256701ef6b38b37e6a771936ab303f529a3885630d4831aaf31eb7b2acf91c646ab
SHA512b43c71a55fafd695b2e05bca2a066739ee11b4483711fba66a5cf33a388034b32da8c711deb0f9a5ab0b659c3421abf2896733c06a93b2fb2c311c74eb676a83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5f4c27acdd015cae5bdaaa3da3089cb
SHA19453172c7f51cfb2bb798c55a3ba3cdae2b9851f
SHA25670f3cdf9b18fb57d839ada3354821363da17b7800e9d324001597c2ea3415459
SHA512750940452928f5847160563c83fac6cfd77bb2dba52878aa61b0336a43e1ecfe2b332f6e50446e465379ae3c96e8ba30bb76ec319fa62d4273e39a9a4d214ab1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b