Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
c2a0718880a3469258efae3323a64ae7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c2a0718880a3469258efae3323a64ae7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c2a0718880a3469258efae3323a64ae7_JaffaCakes118.html
-
Size
3KB
-
MD5
c2a0718880a3469258efae3323a64ae7
-
SHA1
c3fa09960cd2cf1ffadd161ae0834d2152ed7539
-
SHA256
5e48a738da6a0bf03a0c685a25a859f5a094807a4952e671b57d8e13ee7e04b7
-
SHA512
46d1384a6db61c284ec48dd5cd2b51fb1ef3bece7e77151c72216fc1a9b61d32d8b9243887e84a321eaef682a12afc801728008df2e7900b4ce55d0b793baa23
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{420264A1-6385-11EF-960D-6A8D92A4B8D0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000000cd77be9dcae6ee46667352a5c8ccb568782f611325ab57251c61bebbf1b04a0000000000e8000000002000020000000f570b91932106868974e81afc617f4f45c8eb0954866fbc65de73bf8913fd50b200000009c3027b6851b2c8f55185cb6016d60227227333fbe3ae9bb10b80b7c46b7dab940000000655a27773d096bec1744d48ff0609754ebe5ed4e7354cddc7aaa4d28cbf40eff17a3133735d514f8d96c746a5a45709121c1dab4f51da0dcf28132dbbb68f89b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430822816" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70da691792f7da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2740 3012 iexplore.exe 29 PID 3012 wrote to memory of 2740 3012 iexplore.exe 29 PID 3012 wrote to memory of 2740 3012 iexplore.exe 29 PID 3012 wrote to memory of 2740 3012 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c2a0718880a3469258efae3323a64ae7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b14a2fabb21883dc1294e8904180082a
SHA1e9e2d6f2930f050e08c7b35424eae15cf45d760e
SHA256aee4cb0ca29c3446c91562436401413c0efdaef6f411625dfe1a01ddcef1693b
SHA51232f96bfff2456a697d28a45fae459bc37277afc6029f6dbc361fa0063f6e27c0f3110985c9e57270aa6c4cec4c451eb89e4f85464b6989ca79763fb306c36a0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5354f3eeddc746ab5e39b7a19ef695f12
SHA1f097af0d44e3ecb8aebf46499b420693c73ab1d2
SHA256fe168e5386b0442664aee2059ed4ee630e26ea1be4c93a22653b68adfd15fde4
SHA512fe0f3dda3670eaad3b5aad1368f574f67d5459d4c0d0308c6fade55ddaf63578a6275a8a8a246008a3e558e05ca5de44f288ba32a7b71a7299de2f5e0508b0bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539ca74676dd2bde8cf09315add7213ea
SHA18a482fcc8b587e01e8d38599762b65c0ac97bc35
SHA256b2fe2afdce79d975dc3e0a36df86d7afde7c54fbb84bcae31c7bf277ee83e1c8
SHA512db9948265ecd19805484c9e4a8724a49abe333cc3160c02a25d2b4987500513bd220fa332d808dbca3625beae69d04bcd755b2de0eea2ddd6cc763b9c0191be8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5deae4af2795a61e02016228cccfe3d
SHA1704802e587c70c11ac95d733a0c9efe7bfbab90e
SHA256a0ab2bbeb5034d7120d574e71c50bfeff1b30520fa35a6c1345c274c9991b3e6
SHA512051b3cd9065cb89465e150199c6401671684635de1dd4b54ffabbe614b1a3af001a21881b30af72d7bb7eb839f44300a1b04eb1823e630cf17d425843000ea71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50795e1930e55d5ccb4a41e70fbc6a81b
SHA1eabbb04fb2b7c44eb00b6e269a884a9c2f17780b
SHA256dc234acbaee38ea4dab709edc16260b5cfbfe0777b8f367d0d47d6a66341be98
SHA512d10d302b6cd5e1e8ab849ee3eba686f370ff3ea48535055e79c0ac4af08fab94cc6651bf8dab7c64516700fa74aa74017eebaf88160ffcf7013b3e956e9363f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6b25818d206fc26975613a61ab739c3
SHA13fdf5f58460ed1ba476e3f3455a318193c38cad4
SHA2567098bc2aba4f0b8f13fc91c3b214022bc95f127c5e0cc124bdca98e0afbb9e91
SHA512180a22f96e4c44157715929b3265ea2c851ca60af6d639694a880e6000b37aac82be07bcd264ecfe79f96dd226999168e22eed76c7dec0e8afbe9433ff076ac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0c50c325d4b59c7d17b400ba70feba7
SHA1f8794162e09a6557c4484576fc54632fddcdc381
SHA2567ecd1b7daf00df2f3bdbbc44836017c384ebf075012888e563857814b03b7bc3
SHA512d7678bb8ca1c473f79a0d3bb5f1e8a2ce7ab2f0f03f7de8ae8162a467498752622e9ef7334f5852ae36b08284681c388d311e5dc1984fde760c2b715bec9df94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53faa944389e9ed64eac64d7db5e5bf25
SHA140ee74032d6817f970f13238f7b4ed03651f9e73
SHA2566a981242a7784cc6c696e116fb0f8e7a2f9be52a1da7a7138afe5cb85ecaca8f
SHA5120edb1ac5b3b6ba14e48ca58323ca93fea48d5843039a055b40f8482d7e60fed1d74c24305492ed439412a48e4abbbbed5c9c9a5243e221208446acd5232a5ac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e065ca7e75fee2537ea664878603823
SHA16769dc9a5251bdcebe7ee7d1e9a8ad451324ac05
SHA25632f1259da29c3d061969fc68d04ffb777dddaab90ee5594bdb031ca8035c1c60
SHA512fb53d18bff0699f86fbe50858a5a94811410eb227e72d13890dcf5d0106e9b060790b5490ba29b1af0eab1a867abb53877a1e2e25712eddd857875404596ddaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d17ebefa26cd835d499a02da17950e4
SHA1da3e8914cd0cddd1ab16581e63b0dc31273821a0
SHA256abd754cb0e8414b4f6c043b6899b0c7c32e8749c9aec83ac3c574925e7465a8a
SHA512f8eb3e9612b779f1a385bc7e2a266a8ca84f7efa5c7aab7e77b6ff31522bc2542f982840531229cc7b61d7a9fe2f715b64672948a64a69839c041209d08c5605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564429cd7f613071e4dede24a84c9a4f7
SHA11244667dbf240a1706c6cb93377f8493b5640ad3
SHA25694d81ba2e58cb24420bd1631cec551f33edcfb86e77321d851b8bd4b43e63920
SHA512cc17df9c4f3f2669059b594d6cb7618b5bc679754cbf0b048f8e787a7d3980aedc7e14131ffbbbeb4b7e790784b3a004b3e16206520b7feefecfa6e134efc9e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51311c2a5dd7871a3aa91862614188715
SHA16ef54cabcc1dd7660f0f152206d65622b3df129f
SHA256c59f9ae50ba1691ea64ebf43bb8c014958fec45ebf8fb5bf4a07c53a59d7395b
SHA512d5d2b6dfb811751d8246acd7dc3475ad9a5c62690196bae81d2bf12d68bd0e1c71fac3b94d47befc8b766bff40fbd1d4a9ef823ba0d72f0aaf914ca9cd7807a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58117081114cab982b4fe60ae8c962c89
SHA18b85ceeb9b6bf4528f0109bf070565d3ebceba03
SHA2565abb1eb92c7c98fb0580febb8f8e6d09ecfdc1e8939b63eb3002d738f7b5dbb1
SHA512cc6abcfa7ec80f6721af8ca07a1b6b804f1369206fb18d9434da473b01677f7cccc3cb392cd05e33d34c2d53eb9d0c099aa77aaf5f9436129db1e056762971eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d28ff3d6284e1fdcab1df3fadbbebdf
SHA1f4e656f74eeaf00062baa6b5ef39f3fa79ca5a20
SHA256c85d46d9e96b0f27efd2e3d47825bd40cd09fa6fd57947ee328d2ea35ef84fb1
SHA51252c2c8ee02dcfd7b761497bfa0512b93e75bea949ca62d32f3fcfecafdf68a3882cb6dc946a2c2650eaa919d2c0341788c6343b95b81e6cc2e9d01a9266d8ec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5645324cfecd9fc576a93fb93a5eba945
SHA148723f010f512a0d424df4c82a19044d82eb114b
SHA256c7a63606037c9c73dbc6fd3484b453643ba7627b3d0c68f6109d214870d0d89c
SHA51211b1ad6c2abcfeda4535eafd483de103c64a02d7b1aea412047c6b77c88076be00ecd8e5af82ab6dbec8bb8c4a960c2605db1fba2a19719094f1804b669a4cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cbaa0f1f65f9931d78051a9e100113b
SHA1112d09063d4741aa818adc5f6a02beb4abe634e9
SHA256f87eb8372248b40b22f2af181dce2a49436708e3dda6942cd31d5270a07fd603
SHA5122be438e3a1c2671418967b9302481321dcb6f82f0f5f126d35ef568c37a81508d0628917312dcb54e05283e0d4fb3af32aa0ba86d8a323afa583f3052f47259e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e6a6de5c7a6ae96934e6e573ef1628d
SHA10fa50565fc13c693c8d610ece7b309263b07bb18
SHA2564e47a9515b28e4777fd17e8181d5858a8868a0bebdffded456ff80e128a0d523
SHA5127bcd95009eaa1a41e838e16b10edbe4466065a9fc8b3dbe9817cd214475f5846435ef7d26ab1bfff8bd84f1a45c14c0d8e255b09d7dbcace3c65b10dd1151125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb75369683a48b76d0b2a054fd39c55b
SHA1be6086204e6556fa1a31c0386c6a1fd4cae015fa
SHA256d8a32ded0d2cf1c5f20fff217ab5cec94cd3582f8d9891ec8ac4cf10b7338555
SHA51233ad18a4b83066ff484dfa58c1a9232797b13ac1a7b663e52578fbab86d15769187597c43194a02a401840fc6fa0b0d413591538d68b3b068ce841ec4bde9f6a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b