Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
71s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 09:58
Static task
static1
Behavioral task
behavioral1
Sample
c89a8d3e1782c61a66ea739a77fb80c1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c89a8d3e1782c61a66ea739a77fb80c1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c89a8d3e1782c61a66ea739a77fb80c1_JaffaCakes118.html
-
Size
6KB
-
MD5
c89a8d3e1782c61a66ea739a77fb80c1
-
SHA1
7d2cf6739c08a373cd9a55425271c40f9ef19a86
-
SHA256
b760d7bfe3c7a49d8cb499e40c0b0f8d19130d4cc6813df1149613cc7b38f666
-
SHA512
ab5ee9d81e708621819d5d8ca43d82f3b858f83ababe8a1f954754f5628b944e15846a364dff3fe126b6c92776b72e2ce6630cfe1ac900ab3693af3646a2030e
-
SSDEEP
48:fyhwf3ERHfvXD4xumsj0JBM/1wOMEGSM8rnOm/2AF7uQcRm8ahBhpoN4uqLN5ikb:qhM3sHfljAT6k18h93n1bGEWhWJaz1E
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000006086bdf2160833f7e221af6ffba6201d53c4993f6d6a97fe28951e5dce706362000000000e8000000002000020000000dfc71563e4376b92c9633537fc8f0f69866d2c5e64efe07df4763ed75ea53cec2000000032f2600ccf9d0fea771986d31affba4b276e50272171f6130f0e21a8da84b52040000000699db00e013851242db1f5683f74da45f5fac37a08cf257c14fb01982f73534df07f8e5cd5aeb88380d3e0c7f17f534835dad4f1d55738267c78a5682cc0350d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506fe421faf9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431087406" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4CDE7A71-65ED-11EF-A74E-76B5B9884319} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2844 2992 iexplore.exe 29 PID 2992 wrote to memory of 2844 2992 iexplore.exe 29 PID 2992 wrote to memory of 2844 2992 iexplore.exe 29 PID 2992 wrote to memory of 2844 2992 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c89a8d3e1782c61a66ea739a77fb80c1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582bee0a5df2bfa82205dbc8cb60fa0c5
SHA13fa4b8d34e772a5c6966b9841d8b40a194c6b9ce
SHA256dec30c0935ca84468f05c4aae3c0713eed72637efec1092d2c132bf5115a3eac
SHA51291603ed2e03f46917cada93faad4887cf5bd3dd7140f738b55bb4c879dcffccadce2237ec7757b6dbbb5d6f89a8af5b88644ec1bd7dd72dca2797814405ae71b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501f0174636ea9e25e09cbac6a4d3fe51
SHA15da9d3680f560a1e7c390ceea0f5664ebe164acc
SHA256397c5a73622d08f90979f9d8aa48ec92f1849111c3262cbef39638439394517e
SHA51238df54f792466f2911ae1c093f6b5d33aeae07057b626e917bb507796c460fd79dd19067d8ee33c39b9172f3c111349f378a0a5d27487936c14c35644f2014d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514ee05f2537cfc64d626b2017fa520f0
SHA178a9dd85189938afaddb03b86ffd5f5fcf2528a6
SHA256217d8d0859b8c5807ad338669d1e905ae058d94782f9e3ffcbd492b773f8bba9
SHA5121ee13f7b0a9196818fbc1a7f93b4feeb15e20dcaa2d135881e9a588af836124c30f45871341002c8a7ab1cd2f7f89ef26844e8b3e8df4fa53136cb5310f24faa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d1dcbe4e5e47875802f5cfb0c252ace
SHA19ea29ebd25c952fceec0edd97900642b5fd4ff53
SHA25602e1bb9c0285d6e0d3ba03328e8c79c573c69d1df9e013fff039b61d96e09354
SHA512d40af31eccf357eedfdecdf259c37d00034c19a16161d962619580dbe445dd51a93d02ca992c151f66ad1e3fb441522110bc767847fd2aaea6ebcee0e1c390bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a1855f15e5b5efb9be044e12b9b4057
SHA1b5e0b58f3ae1ea8a2fd17e94ca39ffb30b0e1f79
SHA256b2b50aabb09acf48c75a64f8dc59afa904f25aaf5426af8c974e6a8cdec437b8
SHA5121626fef9eae4473993c5d5047f1450b128cd0f65d511df0266d5a74b60f09c4ea4401e84d22b9b1a5f14525924ee76708a6afc6e1edbb7faa7b192eac4ef5880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeed95125b0bf8fd94d08f53cf581e2f
SHA19b561bc6613b940090d6a70a9f6a9c7cb2cfd9df
SHA256474bd3090b41a3405e5a5852a4f12ab7f6761349a8eed93720935a9d536868bb
SHA5128dd941f69090e37c2f83482568878aff75a51800efceff22cd378cfe1bec4e40661e83c1054aab82c874a279a72e66d073403f2003dbe8f02d962a136ade0b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eb7f616f86267f8103badd880cd9bf8
SHA190d7db793e0dea934365de147cc8832019e579cc
SHA2564cbc829ed6db6427a8c57e7a2bcc165b9fac120436d83c58aad420052f547fc1
SHA512b1267403767204c9da836bbf3588ed378bdfff1d8163f74f54b004b7643f86173b9aeb94239b1550af43020f79360095e94fd68bfdbde59dba3608da56f2bbd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e4e67d691084fd36e449902d5f121b1
SHA12c657fa0642bd35ee4aff43bfde828b456503a94
SHA256408760596834469506cb0c9cb1d70cc13b31a974d0021ee47225bf8f1c3d63ac
SHA51260cc1a67b12754bbb7c8685cbf82a8687bbb1725094783fa8a67cdd74701d2581cb92492794e9a2cc66b7f467593b8d9ef4ec84420555f1ad5af9ea22e1dbf52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e723a5613cce58c64649d4763ad77998
SHA180139274caf235f9d42abce7f84516cb216540a7
SHA256fd2c929bce9bc8b85b15e7b7e2db52f87d67b606ec4c5384009e0817efd6c444
SHA5125efdd071d892637044874814322cca137998724ecfac25a63c7279efaca4d76bafd91e68386d2a1c00931e35e3492e0743925228415ab32a9735c13e55337998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fd80b160e9e21cf368d07c264f80caf
SHA196852a5e9a47313009d13f818f1dd25da6064a7d
SHA256c09c70658548bca25fe74e58324e18eab420d6939ed9f23ec5a8625a938b95f7
SHA51209bb80d77e95cb106313c358fce358c8b919ab293452d64839f209e2d516f446a228b3364167413599e6eb7daf16600150ba19d0c53b60f83853c69c10880bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aef073a610af462cb6c1f6ea84ef003b
SHA1dbdeb8bc712d3dff5881ce5e75c1e465e1f5916d
SHA2568102506c6f4a332b51f8db51f9c8b8e39b72a3419de67e131c59701df6e83710
SHA51233bb1e80fc810f01d1e90db2e607f7755b8fc5ad7f35035cdb4a397dce9ba785449e93aed2f15987a5c2b0ff06e570ae99f3bccda36d7335710593e28774e512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593ecaf4b866b7d067f6f608911b461d3
SHA1c47208df07665bd33472e47ed33b0b90db702f59
SHA256aa8e42c48e680becde5e44411d5d510924528a22b866a120ad6e4c9fed854eae
SHA5127bfcc58edd4239c28a2736e3d21dacabdc54d6608bf3d306495aecfe65b6b764ee876d0ecac17a419234566a63da96d44f847fa680613f7a638ffac71fb24c6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bca2f9eda2552fc70da832daa401d617
SHA17da0d02ce7c715320041d6dff9e017d7d1a7f9e3
SHA256e43a0b96b910bce398488a53d7dedefb89c3d45375f601ff20b1973bfc6d4354
SHA512dace70578e143b3d3d0174e2167e28ec3940a82e3b187915a54e1aabe64940f2114621e06a9e242e8fb3f4f4477947bee6ae03b5e2f41ec21adf19d991db6518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51af48a3386314a5c9af6a68c4bda8fb1
SHA1f722db6b154766a88d77057c62ae89f95d189894
SHA25613bd83fc82c795d9d18baf4218f8cef40815a7b63dca7019fe31adec8369b118
SHA512b27e056a5dd1a20e6f0eb43d6d34b2adc4beb2b666400d0e8a497fbd44289b2ba4bc7b0a1af0f43d5cd12baa510209db93b6b4bf36abb729a2b9993117d0bc11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c49a4c6001463948a290801825bb5ba
SHA1f12fb36345c11e4a247e9f5a5ca705cfa095ef40
SHA25616e5d84c06260a4e26697c52fd8b55551f2279403ef67144d04bb7ca73a6e8dd
SHA51259acf5c80602995beeb31e9bfc9ae2dc30151084295b89a9434bb3eb1592e4ceb9ea94b2e5aedf587551ca835a83822830a1c4a4ceccb4a73df80cb49bb25c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50499c2c4dda0a02e6006dd22c690648f
SHA107d59c029841898fcc375ab1a6f1b7f82c6e23e9
SHA25637f72c0dc7e5f05369b8941a000a37a995fd34378bab0500da86e6ab1444bff4
SHA5120a0ca615c2925dd3dabcadbcfe2f6aa7a014a6eb93c6c4cd07c21d4059c208fb7d2261488e724a95123981d8ec8d5647ea2c3d6e0b8690ca6aaf2c2869654ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59787472f702ec370454c197facfda26c
SHA166106c465c3a28c9fdd30508b822f1193037e44b
SHA2560d39ef56a0411d7d98b5d8bca249cf56b91e4565372e79fd35487bb7bcf83ba8
SHA51296bb624316194f92ac40d2813aad419af51a02788990afecb8f49cc1789c77dfbd592a41498239dbb0953b02b86f3d3edbd4d6ba02fe6b821e7ff965dcf75a56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2da516e4a906233085c0347b663408a
SHA1a59270d7d7f3570b2b21ad390cef4b734bbc573e
SHA25699f124900e1be530c78b64eec499ca5aed95c46ebd29693f1b2c63e716cb4333
SHA5124aec0dc0b435cba604de8e4cebeb6673628eec9b68b07588384967f2b426e99406c7ff142cb9d1be8536360a00024d3e5cb471688c3fee036e4b9e8bfe512391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a641cfa9d47b065ca1973e15a8341358
SHA110f1d2b22cab61cdee3d604f3e61c0c03a7a74fb
SHA25649ac7168e8cf245efcc1224f68164280616f139bcc7d70b98cc79ba640bf448f
SHA512bd2f4636984283c3d6c9e1b459630aff170576d8238bbba82972ceb03e489158b53b5604cb0f4071814c45cadfd9edce4c575338ec62f541da07a1afa20e17b0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b