Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 16:21
Static task
static1
Behavioral task
behavioral1
Sample
c11f8dafe615e10890ba4e962117434b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c11f8dafe615e10890ba4e962117434b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c11f8dafe615e10890ba4e962117434b_JaffaCakes118.html
-
Size
2KB
-
MD5
c11f8dafe615e10890ba4e962117434b
-
SHA1
7da3ac27ba5ffd729114ff9fa833ebe3e752b6bf
-
SHA256
09d5c5bd4f53487e52a0d10465587b53d4a5a882e521004ce6d0d5215a26308a
-
SHA512
22ba512e4fe7862e23c7e9b0c1b199a9841392cff595aa9402292c57d009b1b376322f69197a37de84e678cd9bf9150297fe8349a8b698a6a2b0e7455c895b3b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0f49ee30af7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E596EA1-62FE-11EF-B39C-C278C12D1CB0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430764746" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000f58825f3d10c6d204b2792c4fa5bb7a8bb19de2e7af117cfe25161743dca9756000000000e8000000002000020000000fb8f8e78020ebf97d694ce9be162db04ec932c8a0f8fcfb0108985b9d201679820000000007776780293d18e6669767208361f35ee88d3ef20dbef46cb7fdaec68f904a2400000001479c2fc207dfafafbbd3ceaeaeefb60968f2e7dab6524f3d5bb785fdc2fe2774087816d3a503dbfdfe512425a47ad65afc30857eec97419ff5d23735c75e932 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2712 2904 iexplore.exe 29 PID 2904 wrote to memory of 2712 2904 iexplore.exe 29 PID 2904 wrote to memory of 2712 2904 iexplore.exe 29 PID 2904 wrote to memory of 2712 2904 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c11f8dafe615e10890ba4e962117434b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5925bfb86cedef51e765df8a6fc6c5339
SHA1edc95aff4675ae5073db5c65cb4a5e45dbd7f5c8
SHA2560abb8481f93345fe1a1cd1d9ebdeb6c6bf00ef3f61bf3feeb75636f57ff488a7
SHA512cf742b6a0edb5de5ba4f1e13e5beb154124fd6806ece27a4baccdb6f187a5974e4b152d2f752862806ed6da1d8e5520fa9b2feb958320c0edb69babb54865ccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56370435cce3314b4301cf91107a4e3d3
SHA10aa0b4cc01d79a820335e235bc3840fd24f35de4
SHA2568add2f241806cd219ad2c0e07341ddea8c99079aca1d605dd65348f3ca383cd3
SHA512784ab1b4042742d4394ad0bdb57b8291d99bde19f0f1c68338c43f752200be32bb42ba093576d37fa7ce4060c7b3597a781c6a89658c1e75e082222493320cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b6fee3fdd628153e7f728cb58b9fbf4
SHA1d303cd0c97b059dd7b5497a9588d6215e1eac5d8
SHA256bafc0c4354fdc05422a771261f2847022a49d3ae1d016d6a406b2bbcba9851d2
SHA512aebc93f871ecf00fe4202611d617660073713cb9c1c81518508de24fbe007ab1ca1040ac959acbf12e9a4d5f7288f6fc7204f2cbf5dca4add5d9032d9924bee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed18eec95ebbc36a52619149964c2ea8
SHA1b52668782545a76516c745e2bbb438b25f816e46
SHA256c86ee25eb4cc841aa3bb5c1dd69d0ef5661e8d620ed1f0536c8ed8a013ded06b
SHA5125866c447ca50b4713751d9ea7c380abd31fab66e9fe6e1ff16c7091ed04d05bc5210d44ab4c931c418749f39df7b7f3df29b731a5041fd9a114690ca3e64ff1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58980e3f942eed71016b7d437f6a383a7
SHA12b2527dd218ed3688cf27caf2f0fe390b44c43c0
SHA25615f02c539c2e674a64cd7055a0a00bc9ec21935266262e84d38fe279acafbd5b
SHA51260c7edbba818268965ad6f6dd4cc9a7a22d6b6bd5ab3b66c3a447a840df05627b09cf2b924a04ff0070b6c0a501e4393ff356bbf6520fa328d64fc169dfb7b42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2f590785c81ff7599c7b2253708148f
SHA1994307911c16d07403b11893668819ac66fbaab8
SHA25690957a16b79283ea19299e185b00780bb7cb855e37cf546caff7ac7accc6daa9
SHA512b121f571098bb4ed49f6fb6767eb0bea9f06f1b65c1b91b97c863247c13cd57fe4c09a1f94ce6e09f816095cc30e97365a411d0e58fe6daa64bbb4caae607269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb09af85318892d8c4c17175db1ea079
SHA1029a06e10b31776b1feea9ecf69862a230a46e4c
SHA25660d1c077ff08590736dbd9a58b29ad5f61b8bda03c0a8ee13cc6ca5198871543
SHA512f01882e2a48239a70e17e2c7221150d779824a13109bbdc98c4f4954687ef08c64c95588070023882d09576d95ebbaa680e6cb3f01370e239dfb5d9cfab0a1fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a21cad137c7eb89c12d786bbc5ec3f84
SHA1bc37ccc2ffa727dcb9c0241df916ecc9cb10d636
SHA256df62975bf3afb892474f46423005a94a5183536244a12d10ace88e4d916efa8c
SHA5126314ae3d7507f11a0e334d1083eff91d04f5375e6b85ba4044580f4d4cba58836872bb3ff46b3370cedd4c7b248a7a5fee830e0b14f3beed9392642b4aa90bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500e1f45cb8f0d12313983390b88e43e0
SHA122f0600f64781605b0a801f926c3cb15696456d2
SHA2567b76ac7435083628f7017e56f3adf75e85eaa89f3ae2d753bfda4ba70eec920b
SHA51214f3042ed1a6592053991f98210e337564a2e4e50b050845e25a8e03f19385c3ed01968a93dca517b03370510ce0cd6db97afc0641890cfc24d8026caadf3a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595ae0169a9e7ee83e04f18a77a0dc201
SHA107171a6d225961e8adf86dd046be696128a028ec
SHA2563bf423d580ec2997ebdd6ac54f7183da2957cd5212466cffa3a8b2c7dfc1ed2e
SHA5125d42bff5a877029ec1519a46dbe15bcecb435d15ffe20ce0a9fc8c2af749dd5586ecbc148d82840188481e9826792cd91df0bea4fa66dba87d6104a918840120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f96b8f89358293292b0203d8cc85477
SHA140f5342dd90811e83f2d720fd52cc5e268d6113a
SHA256a5a139d05d6dedf76efe98cb027e484c8009a76fb6d5fd5112591139781ac1db
SHA512bbba0f0955819829ba1c42a2ab4abd9e9bca682a0fbf5a966beac233b963be5c9f92de917f1eb2b3b19a05d870ca2984ce9cab6d7665d232f86338708d9c6d7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b022ddb6147b12adc87e8d9ab835c1dc
SHA1a32a2312091c0154a73254e8b0ec1ce2886185be
SHA2569dedc83185465c66effe6a8486dcd5f98a668ef650b9662fcb7b7c9188e98410
SHA51229d922f010886db7134a6788ebc306b37972d7c3f78d9dc4981be01ecae8cd0522fc3b9c4fb74c4879896686e93967ecd1b1a3ae698f617017f96ab0c09c1062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a207be944043791f615c51dd3d030e4
SHA191caecb0c8a17fb5f9ab3139b80e0ea9cdb8c709
SHA256cbb6e7964d872ae2d234d048ab8c654d52892c23a0cb696aa082f2b62c7a2fe9
SHA512d4e78906ba8387f30a94a24e65d8643c32d7eb4a1fc243d3e14bb4410187afed3ab4896d5a75419cee143c975577ae626868f77003d54fc3170da1c37c178489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5155a52e6824bab88be556892f54ed335
SHA1397867afe8ece804b77a800773fb2f6728cef886
SHA256814ec49af436417fd4f5e6ff9cfe93d609acc7bb26b053054dc0c18086d9c0c7
SHA512f0e56a63ed375a1668195eb936e91029f06e307689e2a75bad13c3fb68ce9831c37eb8cd375780f7dafd22a05f279d154f0d039d5467e01434693c2292b161e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a121a33329c88c5370c1b6c3fb5c1820
SHA17dc0e86181d12fb17f23e5cf323bbbf7d56b38b8
SHA256b237c47a181efa999d164fa0e9cb3fc5e60289df61cee1aeaed8c99f1215c6a4
SHA5126edf080988f215dc240e8cf7731177d58a68210a0ec832500b1a3e3572eeee5bb69f80569ee35e03cdfc931836ea0c5aef890adb92f3516c8632a602d969a1d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f12aca432f59ecce45ea8668bf9c4a87
SHA1a31f427fa7aefdf4f80df0b01d230c5b94225480
SHA25664fc165a274425e2deeb2498403f7fb8ac8436bbde65b787e8817a2ce1a91c46
SHA51260a8de7f609b8b2dd0f0ac8b167e165d5faf049ad5b83cf9cce6f2c9635d22d0e12b5528c78cf35068684d70ab5562efa923b271f5ed05408123019e4fac96dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5175038918fc9e17ff29b4c39023f6852
SHA1188b26a695e256c59188b477e6e534dd03a49045
SHA25610cd13524f3c75e869c50d27de6cd008cded888c2d9ca76ba49541e0221e8650
SHA5123292bfae076b6650eddab51fa6b80cca6b15f5ebaa88e93b3459b76a556f668827cd2e7b767c1c7d0069bc5d031b885266dbb9a2e49a5abf0b4252eeba5be7e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba3d96b53ce9e94603853e958256e3db
SHA1f48d2ad7b6e5443be32153f43333b7cffe52d08e
SHA256d4cc1c348e611519e18538729848b3ff94256834c155b7c743e71b14f8e9186a
SHA51245e571078034fb09264090a743bd44a15aafe51a3174d545d5e1a00d69a51494e64392766ea72b117a06d91f259e0b2e67c6690be978b2801a308c2a9be0ee7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59262a9b50e66c8f0a0c0b3d074241160
SHA1e225404a8604990d46b8bfd9604344493cece5fd
SHA25689b6d5b8bf058f7091344bfc4f7d5513bfe7275a0d68201eb8b0bf5a0557597e
SHA512962d8ea1a8421aada874ab079f4d662c60afd21a3c5b07f537bbd25e4c5894a261b59bc8c187486d3842f7a87638ad99af7b8883ac68606bed401d85e7a57505
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b