Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 16:35
Static task
static1
Behavioral task
behavioral1
Sample
c933a4fb4622c327cfe2c1e985fab71f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c933a4fb4622c327cfe2c1e985fab71f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c933a4fb4622c327cfe2c1e985fab71f_JaffaCakes118.html
-
Size
49KB
-
MD5
c933a4fb4622c327cfe2c1e985fab71f
-
SHA1
82ea5a9a2fe62f8979265839c81e6677e17c9b76
-
SHA256
914639231b11c60850cdfe9fe9d6a0c82e220f95936f2db82da3ab711d63b75f
-
SHA512
bea5fe1486bad21061bad2dee802e84c8d6ef2567d7141a56aafb66df5cab68745e904ef8408efbfb223d4a170a217d810bbc7579d399a303312904798671106
-
SSDEEP
1536:5GVUnICRElvPf1CaPjIrbZg2dL39d1nMtM46tRJ/qud5ea9hLtMchAfVuiaK/ms:5RnICRElvPf1CaPmhV9d1MtM46tRhquA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000059c4936ec12e2d6517862d04d8a4159898bdf988753b8c67708337aa97cca7fb000000000e8000000002000020000000255131c92b6ac707beb6e9771481bfed2ec1b72e55bcc061ee19a4270c4e283220000000b2d51baf7e6e5bd18f10e15098e29c903096c2d47452bb83c9a12c332dee736b400000004a95fbcdc1994d8de3b967140e41ad41262bf02f84eda06e7bb962646b44e0ef73b5e00612809559cfef1041855d36a0a8db9e4162317ce5ea6cd0adc440c08d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C6E03161-6624-11EF-A5E5-DEC97E11E4FF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000bdfe8b3d9b4891a39d85a8a00f53935d75554d67460b4af8b48381cd66c209e1000000000e8000000002000020000000556d154eab4d9261177a1c5aab0bd3dbbeb571e626ffe067277e651b8bcf8bf29000000031a5f69d6e3eeba1733fc39e49aea9ab1cf57a1a97fce323cc2ca1207ea2df3fe0fb23c25a28c9c8ade567373867a34db08b1cad8a7fd32cd3ac1a8bdf3947b29b35ee407f93f1846d91bffc672b896dedc86c79e20ad70f4084c600a4c183e02cbd4e37339b791536d8811a26c620fb8e0207fa35a9b4f27951c45fc64b2d6bcc9c1cbca1383002ba0bd8f841bf54ce40000000f67e9aae78cbd18f80f8a2229db8e97c371d2d4a050ce39b27b41220a4413c8c9f16288987e07c18ed5959ac60408742d4312f35f4765520f08b35d1cf2a1fe9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05caeb731fada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431111230" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2304 2112 iexplore.exe 31 PID 2112 wrote to memory of 2304 2112 iexplore.exe 31 PID 2112 wrote to memory of 2304 2112 iexplore.exe 31 PID 2112 wrote to memory of 2304 2112 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c933a4fb4622c327cfe2c1e985fab71f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD50f60cd6c9ea2e5e7d3ea01113e2be674
SHA167fdbc1f08929fd0de521892fe1862b1e9ffe45c
SHA256c1c8c323527a0f98de75f893b58b1612e87647d86afdd77676180a4282bea2d9
SHA512ad22f4311ae304dd10c4ffcbf59dbd3174dff6bce3f37dbb8521aa9044f7bd7aeb0d4908970c2c0ed4d12b4d28ac71f54aaa497af456626552942f24f953c6b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526662505af2a91a75cd62bfbc5ecff9d
SHA1a097a2a9582ec84d54e7b3318fed05f7efbaa08b
SHA2561635753f871cd311ea4327f091a73d4328910f102e7e109da9afd0bfff6dd4e4
SHA5123bcd31b9987d131a516183b1e6e17230f0fc6483c0687823c29b4945ea70e9e66b55654a59735b54fa40a2f2f169bcd70574ee79c14a1a0916954f2482df1f86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d6daf5c1c8f7f26b9fdc4010d9f36cf
SHA18217b2a0e8f1e6d2bcb16d7e95165593dc41a622
SHA2564878bb42cf099f004e41214feb806624a2ebbfe925e2c9804767f111f61632e0
SHA512061e2bac2d324cdc305476caef35956afc53a1c1c02d88e8f805bc147dc5cbf085cd03982dc3c77181a60219f88fb73645377a1476dae483346f3311b9608d35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571ec193fc3de7161c346fa4032bae0d5
SHA1ea0631841edc7804221dc18f50789ca18f3ec6f6
SHA2569006694052cfab7561fd439583ea86265af753902d29ceb20bf2e1d3e3199b59
SHA51299ba90ba36ee0fb1eb19ec536569979206f95ad9b82c88441a0210731d4a7db636d2627baab5784d24a298a45550410938184cedaf8b4a60219398e566b74d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa8847f6867b67782378cdc1bc95aec
SHA14bd0c595ac2995eecbb317f3cd9a27896a0692a1
SHA256e47d9a934d871da06e6d2ab523424bfb0cb070864d0eda2e5cae737749f9e6be
SHA512d3566e56d1cfbfbcc7a023c5f22786cc6046752aa8fd3e84fe6c160ef06ab85a07016272a9a67eb1d221bd81afb0642f3e1b8d3d965aae5ad54f1fdfe346fcf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59329699fc3fde31d658c69c80d488996
SHA1699fd72f04d702a5dbb2279caf09a9e6c8096458
SHA256b917ad29c710a0c3411896624d10d6b6889fcde2f0b48c5604d1e086a0fbb486
SHA512fd10a091dd24d628fa46ef25a6ca214ebbfd20a5824463105738a3688fa61bd3c221a6f74730e7b9c53a719d3957559177aa306d4fcff2c4c764f5a7bb919fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51491437be93aa2d160e0f2d94dcb64ba
SHA167b591d30a0ce283d4a28f30bc1de4a006daf27e
SHA256a5251d0a20455147f1508ef52fdc467c668809e0e22ddbd393ec060a2fbeea71
SHA512b88725d42c37ba6f2a8f24df6c90dbb82958f35a5cd59a0448e8feb16922ac3002613acde5a69d94b03a43fe74266cd2c7f1cf698d8a7961f805d692dd191d55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c6be42afc92edcafa1b67b9b1a9f69
SHA1595043ee4481f1d6d07944a7c31a0e6fa7d6a79e
SHA25628b2f89e6e36def0d62b57064a31318ad94cb3a36d6bac0a610fc9f475d631ce
SHA512a74412449121125c807584e22e12c236ae897d581afb658b5455dab4e61539aed58c76c9d27b0669346b8df242007896d8e466f15e5c75d6b7edc8751276bf71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ebd3f942a8dbb4caa9d62280a8d04cd
SHA1e343730e6d54524f27a9c713178122c3c5813d6e
SHA2568adf9169084efc6ba79522ac80f4a108c83289ad1e52e43f1df63f949bc7a1c5
SHA51209023e17eb4d74ed118d9ca2ab80cfb76076fe437a222dd684eb1e56d7c35436924d50597129104a9c34323d32e511a9465e66d1d8566f6fb29f982a10b7594e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551d54eff8403455a14689263247e9f67
SHA1cc623cf43ba16be78789ae352de8d2bf770d5205
SHA256b4f8dd85ebec556da8a768b7110df415983fb028271bd224618207e9e1e0b8ae
SHA512ea80eba00e7d260ecad095bc325b090a04379187e57e51ed1be8fca6924127b8b633d45d74633041b1e14c9c41de26a5d5b16e9366899b974e604cfc5b8eee39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7d1f85f9f5112045eee15bdac8bd7e3
SHA12ae757003d13df70ce5e5ae860c4494fb06fa9dc
SHA2564399f8a14846957c7e97685cc72064e5b72e4bc6b96e31b192eb05e0b479c797
SHA51235feeed9dd4135d58193c3698e31011ecce072fa0a13c9396e6a3b8ea82ea071a963f9235b3bed5552c7239a103b4cee51af5445815f11f53b952860054ff9d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589b90b0d26e5588059777406a966d84c
SHA131017a4bbeb7d8203070cbdb38136a457287a6e7
SHA256e4ce78790154310cbbc580780f7cd492ca85208bc919761c3775b67da747015d
SHA5123e87df94bf552801be358cde8429483b9f2dca423e43ded146614a387e301898f30a1d09d40a6d0f9f43aeeae6ab34dc40999e58e85e0d125b2f8107ff35837c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548c2f19fcb0d0ef13cbc94143fab9c08
SHA194b4baffb79c8322fe433bcbec855d555f9e2ea0
SHA256df90ad198aa4a1d2fa1db853541d276c2bb95420c02403263b80ff5f2f4fd22e
SHA512209f5491d8f62cfad4aa7f9713db8d284d4595e0cb941a3dfd1a5b91a083c94736396da035ee07fe744516b65b2a50fd89c3da7c02750bac300aa037efc57da3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52377019f0a7803253eca29a557c19213
SHA1d6f8e62b517ff1a79728df3314d5e078ec7e4b06
SHA25611dead1a9fa2fddc2bb37fd6d855af68906ed6931a6bb19cf3e0cf9e3a3e7429
SHA512b3fd5b30c3b8e2d61ecd504b0963d1efe2eb5a68aea63ece5e5d048aba090e7a411dd2a9a6566d58d469e0e96d523252e6935ddde7de16fa44139e78f899332b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD50b9e38cd277a19f1f946c31000812b7f
SHA1f4bf782a1f4c587eed1e852fa72cb0ef5e9de149
SHA25663a95cbb4b189984477e636f05fc17b2de1cf9dfe33331849979c20eb8776ff5
SHA512ca17a6aa114aed0cab4be3aebb757580c8214e0b9c5f3c4a6ffd03cbb6a10440735b41f09ab3736b5fcecc4a1a76ab533ad8ef12bf7e086a2dcfac6ecf89ff9c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b