Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
efd22af906e7f0ca3999841e602f74ac_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efd22af906e7f0ca3999841e602f74ac_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
efd22af906e7f0ca3999841e602f74ac_JaffaCakes118.html
-
Size
2KB
-
MD5
efd22af906e7f0ca3999841e602f74ac
-
SHA1
52fc272921c87af35bd2ecab41fb44790d987acd
-
SHA256
c5d0c574124a382aa62c1885097f2d15b3cf2d4303b38d77fae3c63d4aa42f4e
-
SHA512
634b98bec67c07f8109e325d7644623e0d2ce45a9b010c728dbec85336b298c06ebd966258afb321d3c64cd20e21e071dca8853a9db42734deba30327c08fc07
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40044901240cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433084505" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2B041EF1-7817-11EF-9204-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000f53be4ed8a4c04c3cb0e660621f8494e005523f29aabc2e2a69ad9a7325595c0000000000e8000000002000020000000a66a28f01a1b3a51d05a87bd641c7b45c4a9e38088192363b5121e2ef2a4ecc82000000044141bd26fa5b557b1116f41a692d8eeabe3785cd88436099a2fc059ddc8885d4000000075b50403178846cbf5ae4dac0dad5e149ed71ebf08dab6874fbb6529ac09f8415972020034de4466938a5bc0a1dc5d6146e98ca20efbdf7e976e392fbbc122bb iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2004 2340 iexplore.exe 31 PID 2340 wrote to memory of 2004 2340 iexplore.exe 31 PID 2340 wrote to memory of 2004 2340 iexplore.exe 31 PID 2340 wrote to memory of 2004 2340 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\efd22af906e7f0ca3999841e602f74ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b8178e7fe36b62e96b6fbfacf840b03
SHA1883f92371afcbaef644ec1737fdc45eb6910459b
SHA256c151a146eeb0e924220cc59e3ac8c90e2acbd8f03e8e02aebe1be3422dae4d37
SHA512d484c80ee1f21bbd5b9396d5530925812146cf1511d9326ade2221737f734e004b99db12d40b446c5374d1ed267b5e8fcdc1178bacab61355e6eeebb676fd36f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deadc0aefffb0ac99edf3c1723b18dfc
SHA112e6f6b1b6af0c9a21b479366ff4bd61d11c8b97
SHA2562c6277361207efa1fe633d88824c006242b71abe08d5a74412bb310e7b94b8d8
SHA51290d8d58d07eff132ceae533b63dd6d1af6765633a18e7e2ed2586040b2a1c56d460752fb1e328e6f39a896494b99ecd49ceeb293cd0cdb5842543993e5513e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55acaffbe2f96c437c92e3c2e3f377664
SHA1869bd076cc1648279d1af040cc14c6c67c71f4ad
SHA25606b5ef4d11ad857fcaef8a038a8d659ccd5a07265edc867d8bce34c9105265ff
SHA512610d9627fb4286f3e0986827fffca825633ec6d036f15464aab92b8890253cf84ce1d5ffad937a34bef2f89090907ebabc6ec014eee1eb13110da443478c56f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f2087c18376b1d599c9033149278903
SHA17057106289f63fb069bfc68fc20cfba2bf1ee5ab
SHA2561f188abf95cc976259fd4f23df9680fa435fe0c96c39af810f68d76e2d152feb
SHA512ea55bb5fac1ffe7d689cd65b41512d77320ee69c37e04614abc39e16c06d9620085109ad2a33b61b917504ec501c8a33ac734679f5a9058ac41ddf335d2d62bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2b3b7967270f9d4e14ba0b4729503fe
SHA1869a91b0f625a05be314db575dfd111510ff2a5f
SHA2564da9a6116dd28fafa575797a3cd56a221fd34459ed8237022d13ae629d7c788a
SHA512726f33d1c41e239b3912446fb02d2d76ee5fca67470c2bd6ab3755eb98019ce98beeb12c534cbf9dc72ed960d1bc3d6500e698145de886405e6167950db5bf40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c36a5cfb498636e377c14a3250c51d9
SHA1d973acf3880153144fa54c8d76bd9082db93f1f3
SHA2569c85bc39da820d8faf1ef3eb5be39b3c187731c68222fb1a5d198544f9a3acb4
SHA512684ce059297cde3a66c9f34c0168c70fdc7d4075a19c5f444d3e48e8d92cc999868b06eaf79c9fffa45bdb03ae4a3367fc54287d40ea734606d505b8547a522b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efc18210c020e6d511daa24c7078dcd0
SHA18ec95713c32e53e14d2da3bdc1e7af00412a7bcf
SHA256941849bf44a6debfea0869fb10b407a165d00924f4e7cb00e5e2c1c1918e3185
SHA512c231a906d3d75176406ced5ec40850140b3f2ebf4b76dcf3cfd7fc4ff7dbcd6ca31bcaa429e7b4d24cc6fad82fe90882b2d2185e7817cadfcab967163987d674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa83df57eb1c5ca90d2b6b472ac56352
SHA1ac937eaf67628088b5431a9491223521cd445313
SHA2561081fe7f4f1fdb1837480fdd7704507f8752fbf22361129e852ef7039a178fb1
SHA512038deda26acf3a7204ad72ba67e5c157e115b7bba074b7531f6f31628b47df370b5e7902b96015de7d69cd30d3351d06f41858ea5d8b76ddc44483ee5fc63302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2ef65b614e96b82fba6febf7bbed00b
SHA1105acbbc0e54eed3a17a3b480ad4d4c06f80427c
SHA25674d93c31a79ac9c7f7e6f255ee7918b6c41ee0e4bb053b89b88d5cdb7f532701
SHA5121cebfb95bb3e049c1dcef5918c9f47073efe3a72bcd676d4856bad0cfa78143dbb854e565b9da7e5337642b6e46ec40c418cc60a12ab6c6e788aa6c24d213981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baff0cbcad3f16de6ff735605ead145c
SHA1f38dd571fcfbbb4c1d92578636cd74a927800342
SHA2565b2484c1b51e0fddc23b9e8c8ac59c8282827671a893d820dace65521bb39911
SHA5128dd9130dcd56e85cbf004326e481156b8d9bcf64a7ef7f9b7ae410daa1c7b82b565adc60e58346928d311ee7539ac39c899eb7c6d247432b16e711f851f10709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549afc49780550a4ffeedf6c27ecf23ef
SHA15944280a3f1af6ca7c7fcada8730547aa4e0e057
SHA2567f1a1302f7f135b8325f5c5ccbc36edfbed63e8849f1088607a5aa049145e840
SHA512ed3471056cafe5c6dd4d0ea8e323aeeb7f0946cc7293183bdb7cfb71bf62dbb81416509856268100486c02663c3f2ffafcc2a64f5622d5e524cd50d62ab34bfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513ade5d2b776d23b634cdb16171b9f4d
SHA1169386ce14dbb3c7d2af150610bb796edcc29d28
SHA2563ebf438ac4c0a7def836a79f2e970a94b0340968162d29ebfe8d54f77c0cfc0c
SHA512ee3b9c595d60c505d49571cda20aec5e65b046135aaa51bd62e78f286cc699a46dbb21420f0d16fde181a412dcf4b5ede2f39f3d76f57920940733fd05c33bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bf6ef83d3db43cd13eddbe7821985a9
SHA1edcd84a185ca5d7a2bdb920d0d51a9c907054adf
SHA25651bbada3f5c2b8300fa2c2c41ce25dd7c1943684dfc8841d85bb65145399347a
SHA5125ad613df0c0a9b535cdd2dd689208d3df2d121d901e3fc975758887ba5c05291af8bc8fcb64e8eca4edfc3877c9875d8747f86c466671833fcfc9717ed906b9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d89e303c9aefb1963091c02ae012be5d
SHA1b7dba615150a1fd800c1bd5507ba30ba35bf9e46
SHA2566d381d772d8237ee6f2414f6f7e30f6beb46a82c74daed93c8a4e4dafe9a8b88
SHA5124f5d8e6f3f25365dbea56397d7c8e439614999071b24b85f82f30316df28e99997855dc600928d5d775757c15f07447d1ba15cb10403fac0039062cb5eca3625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac8ea947f084411b59a5a228f19745c6
SHA10c3b047028973db73c9cf948ad76fcac5d7622c3
SHA256d51a585411f194e2fa68b9f10d40700962b8e54920849fc7988a06cb7625b573
SHA512fcc4936488088dfe55042a38d8ac2eb215eca97de754cabbf379d156249fbe930a9688c1358b1b9b07bb1dd666048e8268dc8033f409404a281a880f7e77a16b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5165fdea48b86ccc58103ecd2017dcd0f
SHA13f1302c3ac5dc44cc53c37bb48247511edc8195d
SHA256a412518ffe06de0b8c41c02eda874ac87ab1d1b2087b994e225b8b41e6aa95ee
SHA512a48ece97d4c94a2eb51b38bef26517ff69b5aa8836fb4e7cbcd624a95c4cc29513acd89274b1e838145067e3d86e0ac64465f542621d323338bb11c46e524911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b9088a51cc6d2ad6449ff2d9601500c
SHA1e8602eb6c7f2eb089c9de7e260a310067e79cda7
SHA256ca6d2fc694fe77790ab8647489dc517108fe2f8c2faa2dfbdf121fbe008bda66
SHA5126df01e764c7d92e3c11ec98238b8e13dff95a070d7f7327ed0d1cdc50b0062befa9da9a95bb720ccd3fe4bc6d5336c570e99d3dba241bd6d765cd135f04e7f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b4cecb81c36fa131a01d4577bbe03ae
SHA16ba937e5fec0bac7aa5cb37c655a9fa5aba64fc8
SHA256cc737f67bd826e18a957bfdb4573fa8c0766aafef5d200c7a969c13d9ed875a2
SHA512b380156c1e177a99f3ecabfb1ba9d851f4ef1bb2ba1f59e4c067a7b11e6591e53bebde4a1f3ccd899c506e1cc49d968db82564c99b9ea9eb03458820c741113d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516724ed408bc2a517979f3a7acca716e
SHA1a8fe9e91d74cf83848427020560ec9f403bf42ba
SHA2564e651fbfa8fb5f24f5b059a946420c730843064613b2e926f200e4b8abcdc8bb
SHA51277d3a8d850031532b6564b55044ef2678fdaab9f058988ed4933aec99878fd36d7f6053c5c5f4f45bc895bdeab26dc443040965f103f7ade75ef16b818eeb48b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b