Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 21:23
Static task
static1
Behavioral task
behavioral1
Sample
c7acdbad2cf031394cc0d034299b363c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c7acdbad2cf031394cc0d034299b363c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c7acdbad2cf031394cc0d034299b363c_JaffaCakes118.html
-
Size
139KB
-
MD5
c7acdbad2cf031394cc0d034299b363c
-
SHA1
56b18d4d72448a8ae89debd95c4db5ba04a90bda
-
SHA256
6bcb43ae38d9acc214b6ac35e91eab962d3c0e6ee24fbafe24f120816dbf0db9
-
SHA512
b8ce4d3f3dffa19b681f55fe45642b7fc8c74f26057aaa6f7abb11fecafba95bb3ab8d11c164cfc51fa288d2ce076ba889dfe2d4dcc0b0af294eea848e55427f
-
SSDEEP
1536:S4vjXdOlHyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOZ:S4ZEyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF215A91-6583-11EF-90B1-C20DC8CB8E9E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431042067" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000be649dcc1ac5efa4c1e5e1e229100b1d18d5605a7de10cea91337e3169e40dbd000000000e8000000002000020000000d06a2315184cd60105d8177cc188b5aac78b3c1ad4bc068b3d0d53998269992220000000419cbd15450692230aaa331fd9b7f6f8b1921d474d2ef1369fd6b3f1cebe01154000000056138d7b8f9dd39f9aea1928e3fa75c7761b182c03f17624315ba65ef25c54375dd50016a750c8e3dd21ecf01f1e4801aba8c22f965872e8562c4fe5ebf8ed4f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a02a79d790f9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 816 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 816 iexplore.exe 816 iexplore.exe 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 816 wrote to memory of 2444 816 iexplore.exe 31 PID 816 wrote to memory of 2444 816 iexplore.exe 31 PID 816 wrote to memory of 2444 816 iexplore.exe 31 PID 816 wrote to memory of 2444 816 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c7acdbad2cf031394cc0d034299b363c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:816 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521887386a4b9b39f4f8c9ee1783e7019
SHA14b0d5d912a0d9eb401e024a9a29e60a8271292c7
SHA256e6b6c6b5f81d3cbb6bce87be05c0e62fbf81e7109520beadb9c13d6243280326
SHA512ff9d4a70b86e7cf09b4bdb7ad8b5c36ca04c21b9388b8f56754bd0d36b22cb8d71229b37dd38cf5ef7ca1cf02f8e988a9f8afb3cff9d57d9f96b729ee2869cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518effbf60a3afcf6f2ebd50771a7045b
SHA1c123e00e0956978010c8f7af32b284af6a8a44dc
SHA2564b6ec27accbedfcb11150e610e535899eb313ad537b765d8813f187a8d05e0ad
SHA512e89d4a6c67a77491403a890f6e6a69d7bb24e8453b9fa53e04d5883f307610c9108736f2e9b40a7bf9024fed2ec4771bd42b8dfa121b290a28a0d1639c555987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a5f172d15b2b71db78544c39cbc5508
SHA140ccda0153e613995cd7343d236c0abdf574b20b
SHA256e9bca53c3a6ec0b803b2a6b7e959b29e184fc5f1dd66a6d153f5df9cd1be9991
SHA512955255a35fe26f806c06a485703741e190a22c8716753443649b9625a4a6160c92af73098a96acbb98d17e40853743d2147c66040794bcce4a3188a334bd92ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fefa8139496e781beb65d8e34fdfe71a
SHA1793b7d2550f981e3951f6fd3cccdcef439673b2f
SHA25607957893332acfe6917d4a51476da90b7c2c328a45f3aab10c84a489c346a539
SHA5128cbfb77147734e03d2266c186acdfbf01e2201f64a301c72f6f34cfcb60b549e7a233676f1a2a499b2c4282923b66bf316fca1df5994e240acb28b362b9f9064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cfcd8b551b9b869b456976102c9fce2
SHA1d911a23d9d8e60216a545b2108213617e23a5509
SHA256dd77dbf95f5f38fe61b855de46994792895b7883bfcdab669a00c32036b77983
SHA512e702b03caffc2124adb4610025437aa7188ec40cc7060b404aaf167e67ab2131a167e89b3ccd051b40f56dbfcc7bf3945a0d6efa6cf305fb3b4690fbe868f173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa5506544ed2f1762812a86202b49eaf
SHA1fe4d19e31aa98dcc9de9796132face686d31ea4c
SHA256490d8b9ed3545a15d43aa5b78860d5ad7d4bf4725b80d22970060bc67153f556
SHA5120e74c11b69e9cf7164dcfff79df604a2d1c3d479a4d8ba285cd7689bc5728c0ee0c90693af2899c7490fba4c110c16b36a7c160ce41a6d191091e9a0aafe204b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55035d44e288efa04dd1559b5daace5f8
SHA1379a33c95aac42070c00434185463779753d9f44
SHA256f44f5aca5e9fb06df8e0a99b3317d4919f6bff9320711b8703d26dca6cb2e084
SHA5120517b3b43584a527f308d07a1fbb43d8504b0b69537660b3a6d6be6e04fc5bd19460da6e3b86bb7a154b0fceb7e6cd0a3a900745970adc9832aa8470103c278f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e430fbf6b65d15b5656684881f9f0805
SHA1e00470cbc40c931029543180820705e9426f929f
SHA256136350f1497010883d9b1d5a15780391bbd47befa6be32ec760c14c53c7d51aa
SHA512161a64c8dddabc5b521d974ad49ea9597874d2211c1377c5a4e6a97eaa756be79e549cbd7d92227524751f48aca8654db4ae064bb15062059f391fcb1296e638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eb71a418d9f35da3ca560315c574061
SHA15718f8efe5b27b0000db731c9c1811255e9ee149
SHA256df4b738cb4e7f4b583bf20e17e4f59bd04ad8dbc891e855d1a972f7e116d4fe1
SHA512e45b36c28410261590a9bd534a3bb8b393fa83e761988a10f767db5434268e95ad98b60464938d2dbcb0337f3e92f22fb311d3f192b22ce01a68bf1dfe138c36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc081522defe7d73f5f1d494a7cfc4ef
SHA14ef84da4eaf33f2b0aef2d865d1002f6e70b3d52
SHA256bc87f4dd893b5cf9b30d65b19dbfd96bc6e27b833a90fe3fbaeeed0ce3831f7c
SHA51281ff0774eff8a77f1682ed76ec6baee7edec64a03fea4ffed9d59387eb56a6c53d120a177d08e79608bddb1f3b129d3bb640d3cb4470ea44843095c30e0d1330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2258d20a8889b3346a033e7beac13e
SHA160c7c9d51fbab695ae335f1218adf1fa35ee94ec
SHA2568935944687e38ef831b78bb6fd77a526bc4c5aa67f31eb00045542152f254bf4
SHA51243130d41207d28fc6c2971f9fcdbbd61fcd2d1857166412b2c9ec740902ea80586a307426db505905ecc8d79e05feb85f469a9b2afeed59e01649a59b1940816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5737aaa8b9c48afee19d4ce34976a1079
SHA10e4b01a74650b0059ae4b2783a104194ebf32356
SHA256f45a4ab4dcffe2246d8d467a7870382253ed40f06b8582f7dda23d5db413c434
SHA51229cbf7ca4aaa49add0389635e61dd557ce1785ae288adc36d1f5921577996fc139b1235d74b9ed41170f0ec6a9578eafbb07fde4a82c67dbf7cf2cdb6e57dff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513b8ce67d96a55c215591dc30a436d5e
SHA15456bf9b700afdaecadcdae1946d0d6d72722b72
SHA2561e8d6bd0320a5e42c4c905146644f3ef0cb32b113e96b67004514b85ef6eb97f
SHA512be025ecbd1341f45155e1b5aa190945fd84119defc0a5859d6d672f98b816c40683ae8b936d6fda18e9619cd9361126f15c1de893b5845acaeced1b9405a09e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d380772adc53d886e4457c3ffafed39d
SHA1008f4e37a4a8c4c1604106579b3c30118ecfbf95
SHA2563858dfa0dc43588a2e11933aa63b680d195f75a37fb715090eebc02bb0e4580d
SHA512be998de7e1ed021dd6dc9ef97e6c5cb6ae88ee6eb430e274b6c2bbb056676d673b506d688346e6f2ba156dabd6010b62650f781a34e1ddf33b4a2d34649c78f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542ee1058210b56a1db42ec791d08488e
SHA1e4965ba797f48b2a2c919cb1e68195c051e915b5
SHA2569f4559fc28adf0ee8a84758e24576db22bec930cea5270aa028ea39f14d62b30
SHA512afba7acb5e6b29fd897738125a883f41f443a4a4faf232ca8ab24456f1ee0c29c89590b736f50155cc65d3cd9c57c7dc8164fdba12fe172899881d853d7f0738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e4aca9aaa33affa7ae319029e5e7f34
SHA17eea2774ba714c8c2e1e18037aca904aca9054c9
SHA25655e95f7806e0956d333168480eb508cfbe0a1286259fdd469033c8268f2d92e8
SHA51244391b7b6638aab15f3e714c9354eff7aee971eab735667c0697ead01e824de0e6fb4777086625a370133f6582a752737222d5c1aa0be101008af444b95a4cde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4a39f7af53d2588fc23e6207dd8f7a1
SHA1b617f7756b6a8533f45fb34c985d2d8906387293
SHA2563b3233ee962b84a7e03637c951e16665cf442179c116ebc765f35cd43886e3f0
SHA512de8c84aca29979569250c76e76cd372a9a79774d70545fce4fc628841f27bfa280abc6458d3f8acf1ccf4a81bc210ea5b968e9b2aa3863e1d6e36aae90203ef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569d689ea2b3317e0aac9f1868c9d5b9d
SHA11cf43855d206b055131270c3a9eff31563f64a5a
SHA2562ef73ec3fcd879d91b5d8de23e4a226430b20bbc768f189860e1f6d605ee9c91
SHA5122b58f46d85101209c92919b8a5010750eef14db8e9e898026030a5310c26c3957c90045e7618c907c8baf69fac6961a1ca28b6cdde013a04fc5ba424e8ed934a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b