Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 18:18
Static task
static1
Behavioral task
behavioral1
Sample
c95cbe65c00bcd66ea03a80009117b29_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c95cbe65c00bcd66ea03a80009117b29_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c95cbe65c00bcd66ea03a80009117b29_JaffaCakes118.html
-
Size
8KB
-
MD5
c95cbe65c00bcd66ea03a80009117b29
-
SHA1
d70d8108470d2fc7cd42fbf3974840c9333f0243
-
SHA256
51a880e956d7a147c7f9acf8bf83771ef99312481993dcf2c896a6606b45b438
-
SHA512
3f8869cf09801e4061559bbf42cce196c032e2c71c263dc64aa9fb8af5097bde6c3efe3c8bf77a996313d1d9512ec59ed99cb7849ad9cef95edc3c594c8f00cb
-
SSDEEP
192:CQHIWKj8YeS3uM8jKgDOGoK/z0OokGk26m:1HIWKjzeS3uzmgqGF/z0Oa6m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431117387" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000fc3a070453d02c3f36381a262155ecf4893693d3afd776e5ed6ad5312a4db711000000000e80000000020000200000008e01eb75826d70c8e63521ed434f7d2de9b0bba6d2c46effd1e3ceb8fb84aa9890000000c681cdaa4bc05929babd145f6d6a6b40d06e2a6704bbc7f055224d2e2fc42191e47b3139ae0a8c00b0dd9d9c295e95e2230440b559b415f51e6916b1f4bce7493a2b4bc0fda41ae56538b9fd10b1e69c4f81bbbc32036910368bc4bf2e5f98487ca1fbc357f2c373719707b4e529a16528f812b16328a7454ee00cd68d68dc10ea1fdddcf9a4cfccdeb3fa094aa108444000000044b2bba58136f63bf292eb4bb1d7f0d1422cfccd575844e286d065f84d7b09270d8632033a6b378c8de0cc6ac8bdc919130cc1fead66d36d01bfa97b6a481671 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 707b0df03ffada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000005559ea3f152f2b8a6649217cdcaf53670d6cd74f00e0e99130b5cfe9ff7a50c8000000000e80000000020000200000000709dc0be1f0c8f58763154e47386f496c039bdfa60386b5e268fd4a43d6e45a20000000ea7c5094bc6182c4fa892b8e3c32ae047532127c1d7a6443eba9ba22ccd20f2b400000000ae552ed2f3187695eb2a43bb4cb51d812072c357ba8a93c5d312163a60c549c1dd6d5c0f9350b910d42b3bb2dfb4382ad3687032e701f96fad76bfd800abef8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1ADAF851-6633-11EF-B137-6E739D7B0BBB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2300 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2300 2240 iexplore.exe 28 PID 2240 wrote to memory of 2300 2240 iexplore.exe 28 PID 2240 wrote to memory of 2300 2240 iexplore.exe 28 PID 2240 wrote to memory of 2300 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c95cbe65c00bcd66ea03a80009117b29_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537f5491e90937064806592223e397e00
SHA173a64f897c7aabecb36dd874eff2c88a033daab4
SHA25647957686b822fa9d9631b0ff4dc13eed4067f130cc1ba5c18e846284abc0a1ec
SHA5128c8247c15a1af20b48f3c315bdfe7648cdfb21e32787181f06906ca45761eab262027b42991af4efc1367a850fafe34b0186287c95391bd6f9498f72425ace8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a285f93068c2faa65fe45de95b0a0639
SHA1813c932c375af2dd7c928c1743b35759d563ca22
SHA25699c106a9d3e91f34f7f427c1f3e2e361ef31ae29744e44793c540f8b29c6db6a
SHA512c8a90d87c820e5d56511e4021ebc931094ec06abd0a53558ae5d91fd983fdee7e1eef32dfbaead89e2b2933a8735054bba8e9780649aee41d51d1fe8c5361081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bbe0532cb5c41733c372439ac0d40d0
SHA13ebb811e07beb4644e25871e72e9ab6638368b81
SHA2567b50f50b504ece02101c3491a8c548015b54209be9537730519ad0fe287b7039
SHA512330506b8aa6b01ee25695c2c5c8dadc48f138874a362263c412a08854b4b4f8d631909849a7ba1265320f698d5041eb54a68f640daf83cf4851e6613c94cab12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b90bffd12be62afafba4a07edf1e5d1c
SHA11aef9fd23952be904b014c50740c05c686e1d746
SHA256230cbb8c2107ba23a9c2531f26ee782654513880385fdc0a35f5ad60b9e4146d
SHA5123a3acbdc4e01bf3005a9a6e41db5b3056a5e863d31f08ced6db3c2b58657963cb814688da4a921e50abe36af11e727a31e65fafd67f836c8bc450efa4b7e33f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f606b2cdb7a074a8e2358e5e4dff203
SHA164e5381ef5e262950d06fd8074bc39664fe381cc
SHA25625929f2bf593094fe63c2b3f8059b0ceea66ccb5f0cc62f0fce6d828771251d2
SHA51236f68a61c7eae0cd8a98f0faa563918824830f96dcd2fef36dc71d39f43b9bc8512251033da3c80db935d7a1cb3ef5410f922e1fb281ac565d48c15d5f87f497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5eeada335eaadb4cd3c006b124e5159
SHA1484e0da8a69bedf9dcdf09bf4d5d386c1aaff375
SHA256ac146be832b2a4b5740b0480c17238d6ad29f55ef37b7305e82502fc30edc27c
SHA512b1a0fba2860aabf5da143c4e2382a3f9feaa462b461771a26cad967f626b4d5a8563bcd90efc18e374a8bdb90133e978f37e598dbdcea079259f375a7db59d8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582a58b6badb63d2e3c355a6f553037fd
SHA16c841548148069913969bc65fc08db6f1cb73c8d
SHA256ec3ce24f33c836f5dd29e36a17e74e7703258fde822c6973412b92ecc0a3cc12
SHA512e86599d35fc5133be0464c7c2bcec65882ef6305d142b702db8347f456506f399f37cf4c3ced76d42c3a145382f8f598f2b3c9b60ca98e823e839c2fb74720e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ceb858445c44a84d81b245aa855466a
SHA17ebd50f65f4048abbaffb398ec5eff19a41edfc0
SHA256e80be8d63b3aa44ad8618662b03f4be3ef0eb66255f0152a2f7f247bafdedf8e
SHA5126294c44362dbf379e6c720443a7aa8612c5497e0f89f8d1fae7e865a24f4545ec0bad5d08fc574f4c1be09176ad614ed16f581454c1fd48e1c2fbcb5595ac479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fd5a21a576a53a93452fdd3a400c900
SHA1337f690e96ba40db3a3be8473c44c8f43efde5a8
SHA256787f004d1ed4179808eac9e277fd8cd98b78463d6666b142cd4cafa2dc096b5b
SHA512388aa7691863822aa148ba2df20b0bec36f7b9afa97c4083ef7a611e4ddd3b7f506b4193bbd9414c7517f5d54920088c81e4350f3ed3dabdb205efba02774f06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596bd9d14b7d36520ac217d43b834232c
SHA17a8b957d80a28a795cb3255ddcb67b90ebef761d
SHA2566991212949c09d5c7ddcc7b72a239afb4db5148fea979890bafdb200271198e4
SHA512316747b8c1883d65ecdc3a3be7f9df50ba7a73dcf025331b991d2dbf99f1bfa0237ceaba95cea3b154ebc668bdc506331f699cdb3e989ed712f4b18d04b043a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5801554511f15a3d73f9aa690ffbf746f
SHA16df8d86f40864e1ac1a2d416e36a6a34563bcbcb
SHA256c17224453f1ddc217b4bbfcc351fa773e56517f59a47a672143e2e9ae49cd0ca
SHA5128bb279cb8d37d6654160ca59e477f6e73a3a857cf39bb36dfc32d6dc2ada9803b548ac6d3d8bac2bdfb2c7a3cecade452a89cab6ca59b1637e17f2bd50272c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5104e4a61ae967d92783535bad2812ff9
SHA1e0fdb5de73f6997f92f53914a90f742481822600
SHA256f79eaa5b40780a2de4434de63982541e387623c3acf8645a7a18c3eae50908c7
SHA512e4cb1c400b5e3da200773ccb39738f78f0fedd2e09e245b8c5901ad10f7ff7c1d0dbc0449c705ed25c3dae72bd46338c64ec487e5b9e7fed6916c0234c7aa244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552a3b906b633c92f01b07a324608be54
SHA162b76d5d214a3253043255d4f198133bed22abb3
SHA256ba52e0b3a7153a5404061249a583a4fc8c4c413dc3a59af55a0daadc01e69c89
SHA5129811e646b25724c787e78b219a7dd6d2406918337888cfad044c7c411a72f88c8d459b038335465c598541b1f6c346a0847121c860e3aed2dfe485f5d67fecd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0a82a998b7d8a9a55817d3f39474206
SHA154c3d544e5637115dd666c56c6fd3807650716c2
SHA256af13616cd4de5801caed0b8d7ac95fae6cf403c291c69b84a0d2b00e77f65494
SHA512d72ee4d0238a7da86d3739d99b0aa1f5fd77b768ff5fa2c5904dd80c3712836cfb10419d6f9aa1a366aa910e4ac97240cc1536369bcbf1ab29b9210dd2706422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b0f99d8afb1581a9f9bdf8c1c3fe1cf
SHA1afe1a24de2897c5da107289ea6a998980d3b5c3c
SHA2561cad92a8eec13c29ad5625df086b09587665bee6902f98e4092a9a6ba91d3e16
SHA512c7cdaae8d0b60640d33c2d78f978d696569fe07a7939c1ee6f30c830dcfded38c98a553fbb6e382d5da1a178d9ed13844f7172cf296a35b71a05f3d9c9bbe49f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586573b60b29a931c73b39c451fb8e6cb
SHA1f67e77a0e3f900fb89a4729eda2254fdd2b89784
SHA256952e9348ef3bc2c7305bd262a92387cfd28b4ee00e9447ab2ae604d97db32c00
SHA512c5f67b0dcf68afbbc3e2c0aa8c2020526fcb81b6e19d941a092125daece5146dd06e7a602370658597089154d00e8c4bb06e9f560ad55e96fd9cce2045343cb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5e6240c36d7eb062a5a0168bd5da31e
SHA1273a40cd7059a149d46247bcb1bb9a73ac0c49d7
SHA2563ee240d2fa19920eb424b3484eff682b05c980383d492196d8a420f329495c5f
SHA512ab02cb24edbe82155171916c444daec7c95e1c7e0d7ceb7cebcb6ce43237bfd2f214425b32f9942faad84b881fc6e4598c5de813b14f32d012bf01a2b8c09e7a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b