Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
c953839a0df32751f0f42a9464b8e262_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c953839a0df32751f0f42a9464b8e262_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c953839a0df32751f0f42a9464b8e262_JaffaCakes118.html
-
Size
3KB
-
MD5
c953839a0df32751f0f42a9464b8e262
-
SHA1
8a66d9d839307a8c0da649593d700db394d9c8c0
-
SHA256
dbb655e7e7837f49c1232e2a8b3a6595b2d4892b2252a134daf95b01a09289ae
-
SHA512
eb850e20c8a56b62bd9e483e837b15381743f29649593825954fca000d68af4c4e96991ff3d26d35f6184f25a11cbf1e3684544630df8b4bea344d656aa0c107
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431116083" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000655e2fd05898ba82137a7abd34080e11c9ee8635062bba155dbd2bfd97768c39000000000e8000000002000020000000e804c1c6f83189b23894ffa3113d01c9470d457fca2b19c217a9591222afab6e200000005492e52ce933369eb1397878beac8f07e591381b0b17556e47150d695c45a77a400000001b8a95bbf4cc722be5cc37f0dd2c35a118e985ace084f34e6ed3e530ad4d4d9c9235dfb86f2ce99bb4b009f6260cfdc22d32659947d6e7fd970d5fbcf9e45d68 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 005f07d63cfada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{12DA81A1-6630-11EF-880F-D61F2295B977} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1668 iexplore.exe 1668 iexplore.exe 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2648 1668 iexplore.exe 30 PID 1668 wrote to memory of 2648 1668 iexplore.exe 30 PID 1668 wrote to memory of 2648 1668 iexplore.exe 30 PID 1668 wrote to memory of 2648 1668 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c953839a0df32751f0f42a9464b8e262_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e610cfb70bc227f016301ea10853e731
SHA13e9d6ad683ce81385d6eeae6d037d5b177b0f0dd
SHA256553b4b31c85dd6b3d1988fd3439dade6af34c0e88dfcc6879577ca587e4e163e
SHA512d4559bd5ddc857c4b73bf535372ee8b589ad2cee21983274a7c5497d81ec67ccf434951f3f848506bddbae9680888f118e4dc6f870238618c14295236d680c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594b82ad6a82011e3bd7a89e821e84e49
SHA1cbc6fe768295750993e0b1f01a1739ad23282fe6
SHA2561bf91a061c0c39c2767632332d6e64e449dac1c4bc7fddd571f2f2a9b67b7316
SHA512ad0e337cde996b0b4f4749c93334233854eb6beeb775bfaa063893010e63c89e43c2cb1300ec6a31604870341b973ea116f6c6cae4b6c0bc6dbf518c5a919d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ed1d6c1d645e3b32511c7bf4044aa0e
SHA12cd9bd165c93fe4bd51e46a5525e10191a8e254e
SHA25643e36beb5ca6700a94bd7e59be6901bd51e4268995022bd9382eeb0b46e243cf
SHA5121e7cb7f45e1f00d138961a9679b1ee92aba8dbb2afbd5c5e0eb6b606981a0651fb8acef0a1495618db5dfcf6c2d06eed44219e686aa59bbef9aa10b21f1581ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588e86721760193a03f5693e8d8ef801a
SHA1bfa0995967267bdd24a0b29705531139a52e52aa
SHA2563907c097a29c40052757d90e59f2e2c034a1aa21efd975ef7ca86fb27aa1ead8
SHA5121d2ab0e784b4733964869d987b28e860bc2d15b81b5bdbbecdde03b9c15718b110bd9fb3f8290bdd2ff22cf284f6c1c71ea1db60b38264704612a09ca2bde319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580439aaaf166bebe7516530e42ba5d0c
SHA130310633e58a5f2cdb9771a36de96d241bc295f6
SHA256b2b116e2b169850a8bc14322a4e88f1b2afed528b15ae880b70fdfe6086f60b9
SHA512b8ce957bb936eac1feeccee912a2643df4cedd87ebfd7a78d570e472aed5517e9002a86bdf6c40748a39e9809da15377cd34b03986431e0e764b62eca9eff895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535bacabbc9697bcb548b56a9bae6bb7b
SHA1a70c93397c94d552234c7519506358c174b6207d
SHA256667692f462e9231dddda1cd8e0cb9a1b5415533b4b8f66ee0807271c4ec5e1e5
SHA51218c7379bc2550234e27d5df99eb6dc6d9a2c80d402156ce4ff1233b4f9d064c15c6e5dadac9fa9f357610d43304ce8bbb875e060b258fdd4620b5163d2ca7278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b4b39c087645f1f8f4fcd19b6317e18
SHA17690557da54e3e584198435c453d9ad95397e652
SHA2565a5404e873591ea417d3d32b3db3a00da943ebc4cba912c3bc62803715079d2a
SHA512baf8caeb63a90315432ced4fb267db8862a9fdb7d0209b590fb99d79ba557ace334ed38fabb360c3c30a0483940d9ce16da9801fe00a4d23ef1856fb30387c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574fa6cee5294688cc313fe2e42fadddb
SHA15020484a5d6f5f5068bab3dc59a97318eb3442d2
SHA25672a9bf7fe26a1ba7ab83be02e9c8037eeeb534b1d5578b02369dc68125834862
SHA512e90ee069e91aad3cba2f8a1ac8735941e070db179460329a251088c4b17a9ce4006c7ede0f1a3a8acace4a8812d8ea9a7e0b9741a677b6321b449301e618924e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5461cb101212f51382109053780431a3a
SHA1dc812c7b51d80715c4373e8edf484e257e30995e
SHA2565b9bc4816e5ca94cf550299b83883d569ff0178d5b58ff7b6667c7502a0065d8
SHA512dfa0977e3e513828c4afb1e11cf93d02d5b11e2198b6b37b9cd84d37f802428553a0bcd9c6487931f47a6272dcfb9658ef25cc1307d76ad31535239f48f3ded3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce5eb58ab7585f8cfea11221615931d7
SHA192a5d90e64d70f2a0e5e5ab69ad38620f47464e6
SHA256520d0e92f5cb2c1a6c86a431cb900f6b547a6d4cc215902056158df21ce2f9fc
SHA5123cebf9f01aa926693fa17b6a42ae6e009a842e089213b3d366c8dfaacc5969d6b34e92b905e40ee5b109ac592e40ec651d84cc5709a00cac5b0283351f376079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d4d0ac84091e20b12c2712caf2f53c3
SHA1e02d811a8cd852f9cda316f9ea352ffaa0346c6a
SHA256b5c29ac7423e60c95d44c34aee9acf3c71b5a480dc1ecbaf85e8a68f94242777
SHA512af936ec2814aa3fe49ae8ff57269fa526b46472ee9a6eb6e428b8f1c06ae50d573b0d41efe7a6e370598258959413d4cf08a2190acbd48309604a21e3894fd39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c3edb64c8e6e7e69fc4e0232e286dd
SHA100d9a8569086949ed020f30c3df73f9b15b1e510
SHA256d544b0fddab87dab5ce5c64da5febdfb9b33c2e845f1010f59879f95c94899fa
SHA5120672f184286fc03b1ff04d50bf0b0f0850638936667d67eba0c4bf7b2d2f449928c6459927fdb1f4e9e56e6acb934bc7336a327d5f876690af62cb2a8e6a5803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534597d918ed1c59a96e3abe81c06b9c3
SHA1fc3a9793870857f551d6bf52f8c667fc3e4031e3
SHA256143af3905a21730fb241db97508b81bdbd8c4ec9b07539681decc27cb0ac4420
SHA512f845765e1047ac6e2a79cc2bd431096b191b1cf24e5ce02ee67b137365c8613f1156db7fc6261c2d510723a7fb25f2bfdff6fa31e0e20c74dee96b5b46ef27d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5756afd61f9b2011126daaf687d5ea6f1
SHA1e09adad228d20331e6f82a71e4439c63359d5b00
SHA2562e415887918d14a283a552b238836cf1b1ab247bfa9fa2ebaedcf2eb410f389d
SHA5125fc06347c23432172dae3926f1c77b4f600368f0d3ca8765750b4c03b35e15e015cfc20d25877e0bad816255af59360839e7757a69561641fd0b5b0ad31e5c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7b9a54beccd33199d333add38ee64d3
SHA1b63fbe015011c5f9e9193495397f87309cc58d72
SHA256e18b5406de7a0cb2b789e334f2f8fc11d9b1525801ffa014a1127a82bd5de301
SHA512417f3d73c5a02145ecc3be20bfe4dc885db9819910345f8151264a23bc6faa182b7ff7b3a5f1e2354802011422d178395d9f641dbb35b4f2b716ee5a8057bfd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ae79dad279a592687a3457761401f95
SHA1829fe82eb7bf4ef024b4191cae61eb94a624eb17
SHA2566badf861c89603b380a3fcab23c425291170a0f059600d2cc83ac131245e2aa1
SHA51270e86f12f1cfad3abb1320919a7b5148b764dfd9e9d2acb8cbaec45f0b215d4f0a8ed8886efc8944a5116594087a9dd991977800a919f3d3d02fe5da9daa4aef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5259792b570eaa660f3ddb2fb9c6b6cf8
SHA1e51f55fd73c0ae8d1e2e879eb351a180152fa1be
SHA256a6f31c48192f02e67e923541473b3b344ab9a4eda1b701721f1ee503f97321e6
SHA512362d9573aa3901069f4232cbdabbb5777e4be2cc7ebeb4bde6e73d97e4ecee375b6355797988ccd85feffe8dd705163340029fa855c489f43f4074ea592f8094
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b