Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
f52bfb4a8d6e22c93138a2069b9e5c30_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f52bfb4a8d6e22c93138a2069b9e5c30_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f52bfb4a8d6e22c93138a2069b9e5c30_JaffaCakes118.html
-
Size
912B
-
MD5
f52bfb4a8d6e22c93138a2069b9e5c30
-
SHA1
1909b4e1a483fcf826e21641e0115948ec225541
-
SHA256
f28bbaaa252a24e09dabd775bea8af3205cc23a35b6e47a74af141d1bc9f18ef
-
SHA512
3017d154bb323e615b3c6ffce917b3a55ff6739ada255ce83b262857b0c0eed898ee2f27d810059839646b85beed0b225372c6370a50fd4ffc53f3b861e92c4e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000000e8f306cde3c69076227e6c375fadcfb0b23646127700bff2ed40c9f320c50ca000000000e8000000002000020000000e96310fdf91985dac0b2afb9654b996e22595c627482d268153faf2263bfb4b120000000fde8e2e8de0bd351e80c29baf3ec9593d4424f0c1c7fc61e42ba408ab4ba5efa400000009dfa651d90b3cc81416ea931df261f3a69e44416322b66a83edfb9598178741990cca65aa6922a4e987dc0d6a8cf0db3e1a033c613bcc2139ba5e9807f1b6c8d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a008a474020fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AF929C61-7AF5-11EF-8A1D-72B582744574} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433399977" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2016 iexplore.exe 2016 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2560 2016 iexplore.exe 30 PID 2016 wrote to memory of 2560 2016 iexplore.exe 30 PID 2016 wrote to memory of 2560 2016 iexplore.exe 30 PID 2016 wrote to memory of 2560 2016 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f52bfb4a8d6e22c93138a2069b9e5c30_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5353995de2f5b7cf9970c24d9e17612c7
SHA196d211bb08189dfb756f7e086b8bf4aa6384520c
SHA256ff2529e894350798969bfa96976df6b4c2d067ab729f1b36ce50a6e8e0e85bba
SHA512a9e69736f7256de33e78b48100aa0780f5e01e1298f803aaa016aae395248d7da1c34ccf9e4a529ba48e667226c07622b618b0b05e5a765c487d65022a49f497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e947288097566094c1d7bbc27f85adda
SHA13aa2b26764f8098ad58ee94a7cbab43d3750ac73
SHA25635ad8323bcc1bdfb7cc0a63743aaec240af0a70c5a560311ce241296fb6dc332
SHA51299d06f689abd74c4077b47bc5ba89f20cd29167bd9fe70933240ccc5177846b2a8c860a76dbeafc186136ee37575568b7e29cda813ed3d0e15778130a2889a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da3812f1856596fb81afa33f9542bdfd
SHA1821e60a5f7387bc9cdaa718d182b410698624d07
SHA256815406c6dc1c11aa70cc14301a043a0c1c84386920d68f69a5f242a713710c5d
SHA512d779b67b6d02ed24bfd3892854f3bff0ec25e5b487b5a05dc9aa2a0716e8e61bdee5b86a15e6c2b5ea100dadf00ef9ffbc8e762f5c9343cd6706774fe8c52696
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59419b76610cbb3ce10cfa118a1510791
SHA16606cc969bce591a7a9a4d465e79b244998ef15b
SHA25634e48d6687d2fe612a608fd13fb3aa5fdcbd3a97adda0d1204c32821a620eb14
SHA51292104f9db732b4c44f407112096387381b1530d19e4c33a142dcdd2b17a153f2fe29e1afdcfbe291446357d864577375fd0cf534994eb2d7973b0a4f5034f954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5872912f75033fc0a4f1d5e5fa7af787d
SHA1bea2d0842d894c4945ea5b76420227a3b120abf4
SHA2560431ae8f8df1d3103389ed92686421a368cd242b2b7985d99f337417aed65f78
SHA5120c7a896e8e4d18c2300912bbadf169044c8d1ead35f97ffc6a4d295a490b4e866ffa7737ebc1a9175e495d211c081fef8791e115779537ab7794287cc5b6ec82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f1f1cf2e509c96f2211a7ea9427cc20
SHA1de1e5b950139e64f2c8492efcd8d08a0ffb69e80
SHA25666dd4091047ff03a81db7eaef2958b4a5958040c955d21dcfab7016ac439783c
SHA5120d679d74458b5e3436cd143855198977175f36dbf28b9ad11b39bcf29852b9fa5b5fbeed8707034029c39e8100fede17f7c8d3b7ba790d4118e1eaee6c064f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cee4fcfa63d3a35533d9d3cc7ca21271
SHA18772c50111d5cd33625063b48963cffc87ecfe77
SHA25635735cc72a0d54e8547961c4188d73439f483a88d6372c2bff492c328f741c0f
SHA512899520ed8827141d91c787f19b5c9429fae4dfd282b313c5e7b5c072b76540d952e48f45ae41f5a4ebecc59a54bfd46a047e333868527784e7a096dbee686326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557e4aab9a9d199c0cdd15d46d8702d40
SHA10e88c7d3f47a4c12803694f638dba96fd62dd037
SHA256c7f2fd5766f04523450280b788a4b3644d3a284f76ea37102cecf490ebb8c801
SHA5126d9aeb1866a9b52db0c0cbb440ef40d28fcbbd09c3319a63b1cd2cf8090a8f6ebe46392b93df712cf09843de6d7971107e8cc146b287f199fb78321f0a32a237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542680e980bdc50d70eb17b048b29bdd9
SHA10d9a11cc28ad1bcd3147130295eaf39ca126a418
SHA25624fe468f488df4e805d29ddf51f201b00ea38e3eaee2f457e0c4c067081eb542
SHA51223288f7f61d55666a24e307fd4dda19824ffb236ce9fb88e3973b7c281c50463baea5ec54ad9963c43006793ae35454bff652add263842f1929f3aa1efa9428d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5380bb4eb259aff6741c22d63418b8d46
SHA1d7ce5bca7152e6d1e9ea8a56c59c1c714156c3b8
SHA25646bb3b87c942bfd75081a6705e5add427f1cbaf3b4b653f8f2b925a3e0438f3e
SHA5128af40f889b099cec5e910c57d539ebd622234a43506e6be592eb35f9f1a6cd331cace91978f7f24c02e73bd739e1ce88afd1db11292b4ac861b267f17ba341f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8a96dc16d5f4adf2c301e377e414285
SHA1a6b9d39cc8cfce8b735f10512848d7bbab86d453
SHA2563c9935902d0a9ee2fc69157c62636363b6a019931ee68e8c7b3feea4ee87b236
SHA5123d10bf598f9f7f3dbeffa5e817b4c80b1b3fb5dce4875c69f128d33c96162c03b4356a171e43e08e02faab7d9f9e5809900424599135c0edd346bb862edfe43e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e7c35c00348af76738b645a256ed840
SHA1e53156191ede6061fb6c8effd112625b0d755bf2
SHA2569cd61be064ed41f4344cf83e70a4a93e1b4cfe0167da8f01ff6e028cd7a51a73
SHA512243425aa5d60f9d519e1177e8cad3192a318d1e64ed38f96ca7a4d741534057bb5f91840be93620291e66e41bddceed2554ab2c66d0af8db34d4dc9b9b05ef18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553da15e18e1fa03d465127f8159385fb
SHA18115f31867732979bed55cbb3a6968ef493dc53b
SHA25640e2590884f89e5b359b661b774f6a0f3e613962eeb6ff6e247c46b6b82cb2bd
SHA512a65eb4c16be0e3a4055bffd4620cf2c50e3398a3ecd971b5080ac1a66e2b9081adad34876367653d1ab7ab80f3c7d1399121dec4de2d9962524ec7e850770f27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb3d8a8a6909b3b3501214b538ffdbdf
SHA1a7fa6c9a8f3f56ff946c32e3f671c5b45380890a
SHA256077996d9f8304ac709b33c443982f7cc14c657a856ba7cf66446f759d557d148
SHA5121f5d66ad0a0abbe979d64b040ac7756b047622de3b68c60c1a356942bda8e71ba256d41344bd4e41b5eec82ad2b879de31c9933d70a6ebea52b5501daa2f8a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5173d9cdf2ee301ab4872fc2a42a5d510
SHA1c4dd580d4bac95f68fedbf160c79d219f98bfde0
SHA256da371e55500dfef329e0b8b33c50280c511171d68a38bdb87fb9c3aef3271e2e
SHA5125964fa13653054d856cd565211f54981621d1d746ba60d87b2edaf3abeaab3dbda4540e16cb9f60549c7099be3e308cd912fc1d64ce71f7d9f649256d65b564e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3de91dbf51c2f2248e83be776840923
SHA109927aa093ce1e844cc6b2d6522b11b8e49e2f9c
SHA25669ccfcfab2e7b65ab11293c3bd175dfae5143480de61e20276f1fda88bae5b7e
SHA512d3b241565b56dd491c0a9cb54d4aae8429d90420cbf8384a8b16097fc9b07bbb73be24269d9c1ec7c3981516d9d2ebc833e67981f263f991645a0ebe2f9a09cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ef1dc81f460320d2e02a6d79680a61
SHA1080edbb8962ee679d0be744d01a3923297bfb7ed
SHA2567462018c32c936127d9bb0dd9dc354286c56584eb68f4b46a878a8abb4fba04f
SHA5120700a0ad472ca6d1b15420959371f43448a6677dae1404fcac93039131e728dacfecfdf9d88f6171a31d0cc92da4e264a8ba73af3ba6a7b5f404556520e0b976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54009ae7c9489054c6b134ee9a9949bcf
SHA1c61b86669b99b93136fd6ad24259b03cc7065166
SHA256334ba38d70acbb705e1a668dbbd1803d792401a8ba34156693b8718989d6ea8b
SHA5128a8823f0826abc806816044710edc3a14dffdd0cff9af623bca430f033a6a116918cbc0ee1d2e80688c8fc1a5257ce7c0e49076e9e87480998d0cc0381b44e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525a18bb4c349f91491780eaec1d707bb
SHA1cf263d9273d83deeea6a651e476ea7e8a8e9eaf2
SHA2566beb93f88e877c6093e1ce17cd287e0609ac731e588e64a88ecfe8dd26770ade
SHA5122739f6d4d94f3b03c71ae2aa9722d811b152adedb30485e9e9008700cf2df24a20b08ca596828c7cbdf0b3f4b6dfc8297852a3860ed49533f947a6eececd216e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b