Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 05:12
Static task
static1
Behavioral task
behavioral1
Sample
c259c329315c20c678c49d1ab9221bdc_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c259c329315c20c678c49d1ab9221bdc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c259c329315c20c678c49d1ab9221bdc_JaffaCakes118.html
-
Size
919B
-
MD5
c259c329315c20c678c49d1ab9221bdc
-
SHA1
b4d08a6328884703488fba6f31a6d8a24bce7520
-
SHA256
7638fcf7f8b3b557807ca6a96b36f0ce825d5f03a13c778232e0d355b05ff18e
-
SHA512
0fea8a1d6e63471febfc5d86b5c7730cf1abf219b5d32fc075c8b996c0cdc98b1b445286c94ee7c88e1107fa3e40a6dc73dcbca16c84b48c82d4b95dc9a7d04e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c010bc9676f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000089be96f2a84095bf69dfd69a09ef8f9f081feb752f39aec6680497e64f6d9dc2000000000e80000000020000200000007624877c492da913a627a6918adfeb231a5f286e1388a979fc0f29035b02a3322000000017489a597dccf971522c17072c3f28c2889ff31fe2504b3e22446ee18a9a7bbf40000000f16943a72d6eddceaaf525035e4dcbfb901fa994971f21214ef33e817fa571024e220805fc72c9c690b0098a29194c4d0880693c834cabd1d033c11b40daf3e9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430811003" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C23C62E1-6369-11EF-8995-CA26F3F7E98A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2580 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2580 iexplore.exe 2580 iexplore.exe 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2580 wrote to memory of 1936 2580 iexplore.exe 30 PID 2580 wrote to memory of 1936 2580 iexplore.exe 30 PID 2580 wrote to memory of 1936 2580 iexplore.exe 30 PID 2580 wrote to memory of 1936 2580 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c259c329315c20c678c49d1ab9221bdc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2580 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b41936843b0c7f6b4ca2d5ccbe9e4262
SHA1bbef55ad6052ab135971c4549384f1837ceba3f0
SHA2563a3883ac2237851d38c51d0da75d3cfc64bc1d2f4b7b26f55e0bf075258130b6
SHA512b21ee07fcdd8d7a8da9480f57b4459c2f29de6b4010cce18447906aa875c294d3635698a055c34315ff7df481f23948a1a6387d8e471fcc9d727b71a96f5d5dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5945ec686e2e66b6f88ec6fb7343b0e8a
SHA1d7b4b4ead6fc2868c451747c05a8e8d5edfa71a2
SHA25696ae92c20bde7c2ae239a68115d2381b9683f0fa1aaa6dc50ac01f2074bbe145
SHA51253f221d7ef27df80e492ebef3c333c8d5dd6a9312261615f6f511d38b6e2e160fa5bec86a4fc22b5d04e544361af7fc9f02ecf234ec75180f4501035e4960299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0ea1d27b7da0fe8aa45adc008d14e2c
SHA1d4c35ba1ebf7cb6df606d005dc9aea72f706e435
SHA25605117e64550967539c69c6a3263c072515e7120f246adc7754e0d87df2ace23b
SHA512eb37d9a86606fff117698a0974621ecd9872e4b14af5196a38b2b2838752e02eab8131a011ed8f4c78d36a1384d0ecf32164fc7cd33c7f2b20cdcacd5fc34c0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a890502344b4ca7199d8265c98ae407
SHA1a0eaabc48f1cf8707da254dc54f1c62b57a80d1a
SHA2562624105b700b2a13ae40a66b386d35e9ba33874400fb848d0fa10090b913a6a3
SHA5124e8d54c7b896041705d63dbc73fde4e3d90babdfc6413cc11aed2d28a8c9d45cafd544111358e060f28970153138b205971f5a616f3814eae4cdaa8e4accc97a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee02e4f8e467e748e745797168a31382
SHA17164b1594dbd96f07be4194553fad0322cccdc51
SHA256861d926fd51f9d9ff121d83a5655031ea1ce189c88ddff6070ee2d4eb5c2be70
SHA512eb211c13f7132fb46f70d91f97f89a9fc1d2b1d3ce70e4ee588426a4d3e1787576728e6a52d0948c894d9c75f585b9da7d32bf0b3e4363afacb3b98320741390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543d41bfdf249f4433d9f73a8456c728f
SHA18221f9c9985620dc5ab231403621ad6bdcc25a32
SHA256263fd2bf48118d174e47d248beed08ebaeda8c069d9ddc8107f8ef6ab6447f39
SHA512b93f2731aeabdfb737c640f3ce6de4dfcec28d0257af3e3f94d637e91e7fb2291c3c3a01f49ee02afa971e60e598588ed95c070c6802f9abb2a4333a21882146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e56b7f933925599ad6766a5e271b49ea
SHA10e9e5dca5f75d2a1f10e3f9d62b14f799e726e9e
SHA2566c1c62ef5c3f8c826400ad43a6ad6d46ff2b812b89c6bff1442ce0639f8cacd9
SHA51255f42a7696afcfc44d2ae59ba33b3e02d666c095a2f4f7f345490b3297ca791f5ea9a3015dc020d84b9dcfade981b754ba644076892535b870084685f1214538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524cbd7b754e83c5c55bcff1777a5d9ec
SHA184d5281e735165ce8813a02aa5c7093b314e34c8
SHA256d5c6183a4fa9acbbda03548de115df8f6dc1cc2b1f31c75bf589756afdf9a0c5
SHA5125ba8b41e9124ab23ce451173f887ebfd234ea702a5b363a5c9b57fec85f716806e1d0e9c0b38053f96e69a3be7ec76ffd434581f7dd0ad5ffb9a8b36609e126d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d80c73b97c63570ce8de9dcc2bdba32d
SHA1ccdca38dba28a08e8ac39bec7b3064ab3cd24d19
SHA256be5a7afcc0f11451eb73b10b707de67e4194011614abf208618ca993c3a391b9
SHA5122dfbfa0da23cb9bd09d7af7e0491bada65278a03710d1b504d998a8cc2c3c81687fab75019f65658d0786032af07debdcbb1a573e5733ca0367382ded7d1cb7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd6c9a8e2fc1fa59f72e6e6e3091b591
SHA1d02e492b66a98636b125d021ddb393388a3bc275
SHA256cbd04f7f50fa9ac37fd048a88ab5d8f876b242b8bac053591971a50955daf107
SHA51245917853f0cb49a2e2b73f46cc5da3ed3a789fe32329d26330f0773b80ecfa9aea6703b2cca61eb9d750c43e56510c3521a277ab1a7c3c679da9ca60dfa5b86c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5f720cf48800dd034cca9c2f305ec70
SHA11ccd7b4e006d389be7b3cf45b2cacc610300cd16
SHA2564225b224b39bb2aeda735fdcef2cdbef3a76360791155d39f2038678c5b84437
SHA512f585dd591b3f119c1c1f7f8c850a03341d9d493f4beba13368fa4428164445c1c64f3ab94052d58e48003437d2a3ca1a704290b23ab0afd121a68c506ab20e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5252c08fa4ccd73833afccc1358d1b210
SHA1dde8482c50f8dae6dffd6ff79ceda291d6483ade
SHA2567ff9447baf3316b264eded08a1a2c41861d319eb99f625805ea4853ee991f70a
SHA512f8a70f2d9eb4fee6c7b5fcbb7b7022c5131d87181768eb06c62fc5366b2465c2f5dae2d50b410938709e6232444ed46a7364d47b4ff1ef087161c4880d61aabd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507864129f9f06c0f9ed09c374d7dba4b
SHA1f3e3e04ebb1b7a5872b5f2b2c241195fe5b6a509
SHA2567532d22241d83d90ba93cb56a4efa3bc80dc14efaa0cd74d45e438cc64c0bede
SHA5120723be6805c3fb9ee178d445b7b2b5532ab28a1cd23fdc8fc70d00c572da3ee4a8a61eeeb4eb31bacd092f0b8afe2b2bf309baeced0f04506d14c01ed25ba2e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b9a158ca352a8ad72afa5efa403c703
SHA1c0c4f8f5e167aa0fad540a4c275b1c837d5ba72e
SHA2560df8c6696eb1d150ec87a24712b57e3dc6c24df33e5182aea36c6c6afd949cda
SHA51243bd776fcd99eb9237f31848e7d84a7162c992cdcdb128b04545c5ca3b399746f630d24377743826d500a794c0d29a6668614253c060c3fea3a42617e82f0bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59518bc6d6afe912527082b603b3079fc
SHA1891ec82b5492f499caadb3a957fc5bb5546c8fab
SHA256c5cf2d2f0cff7509ec12d8a397016d213a30a5f58f80e9e60cf058a459fce33b
SHA512a1a3ca1730da3767f5d7a069b712ee803ec92d53b859e1469b0bc47a32a91230b2cfec7fbdcb3459dd0f1d675f8f54f40866f939e6852a8e3cc3d1ed505ed0a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2e1a19ec46624901349cad8e1ebdb28
SHA19492dc9c014ebeb3ddc865071ca9f4cd4b36f9b6
SHA256e0fe610e180035faf8004b642e8db99711ea8e5efc3fd2e949ae8c7f2cb11d89
SHA51219cba719eadc10b256e7c520679e1d1d8925f5a3d1f1a71a1f3e4cab5041ac12025b226943322554506d65fd26e15d2399cfbda3dc920430b4a4c84c6a3b8932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e08244469306ea82032248ef1a0e3b7b
SHA132942e903a403839755dabfc30741bce5830931e
SHA256df1504ba31df6eee6c4f3f98c54a2bf39657cbf60d8728d50185c605e5d5d1e3
SHA512260ccb371a68b7d96d4c8bf5ac9e659b991b9b3e5e63a66464f27a9d391a6d4df81aa078eb6de0d704456e707c0ef167f931572e5eace41b4daff4a373b9a13c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f86b070e7033c45469df1bb341a7ecb3
SHA15dba8b8cb46663af24d84908424b692cf6780f4a
SHA2567001a8a9f6b875e622d3cd80f1c619965ef7550c7ba7caf7799f50ab43c65328
SHA512761cf25ebfb05058ac632cb4888da9381abb7e45a1be95cd7df588070a0ee394a207f038f1bd0305032ff945895d3aa6519ff6bcd0aef34d01ce7ec439c7cc37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0419e9df5f8fa706fa715b0c3f06118
SHA1d8c1e8e6a70459b98e4bc3e0c48b0b91e2b865c1
SHA25697b860550ab182b8a9a8cd708377a946263200d4d833855cfda239b5fa36551d
SHA512c94b65474b414e17d34993018052d5d4b42196515332ef3e2587bcfa5c9ff2bee1e347ccd19e85e3bf9f7894100c844a21e496dcd2bdd341a09e7dfa712863c7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b