Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 18:31
Static task
static1
Behavioral task
behavioral1
Sample
f69cbe2dc90a7ff755645c2cda3eded9_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f69cbe2dc90a7ff755645c2cda3eded9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f69cbe2dc90a7ff755645c2cda3eded9_JaffaCakes118.html
-
Size
94B
-
MD5
f69cbe2dc90a7ff755645c2cda3eded9
-
SHA1
865f52c686ec83f23c0ce29cd5613f3a90d9168b
-
SHA256
ff9c85df8682232f05b030a7a219d72cc8e1a00207aa68be2d930d74ccbd8b5f
-
SHA512
0697383817d50e502d09a489ca1fc3fd56d620cc87d91f1ade43ab0c62f4071f9e6fb268e1e7857102713e1a92f1ba6e44835581fe06410211fa780135e7968c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5CB3E2C1-7B6C-11EF-AF94-46A49AEEEEC8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20ed2e31790fdb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000042dbf22c0fd91f0906304e399643c6262c8a0850c29b5ddabef08c1ad4ea2531000000000e8000000002000020000000544289fcff5d4c7abbd7b2699a915cdb4212a287bd782bc2b00ef5cf57697f0420000000945508e455453bbcbda6401452787cec0fb051a7b42b521de08a69dddb5d1bd140000000e70adcb50f2124d19dcd15e3e902406963c3835e67eadf36e75e384d2e8e2ec342512da29c2e2281b26db2e92b216820ec97cf2a60d7cc10ec639cf263c086bf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433450949" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1648 iexplore.exe 1648 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2592 1648 iexplore.exe 31 PID 1648 wrote to memory of 2592 1648 iexplore.exe 31 PID 1648 wrote to memory of 2592 1648 iexplore.exe 31 PID 1648 wrote to memory of 2592 1648 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f69cbe2dc90a7ff755645c2cda3eded9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1648 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50be88a61e897127622bbcab5f81e3b0e
SHA1a80e9c133b78cd0e390a60de56a1f96d041269a2
SHA25693e30052f6cafaf40c20a580bce03fd1f04d57b36ea1d587626ed86f782acb59
SHA512141de1dba9547267ea10cf048ea54bd614eda2085ab1f865d67be38601b4aa2fb4aa8140cd63afffc883b94f7f7f037772d5d5bf7aa7ef89ca76f79a9bc2c932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5388926fc4d2e94663fc1aeb65211a899
SHA1888650a95ad2e3c801078d6dcc8ac6180a0c9ad8
SHA2566b30206b7a172aa6b0913994dd48bb2481364390c2b5e9701fd881bcf80a26a4
SHA51298d46be9883f1deac835a608caa45821530d92424e4cce9c9325eaacc7b92b840f4ec517355e4a66b0bf51bf919df96c8c8b36747a7694a5d66c1251d7d91f64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5129764636468fa9f63006e77475cf504
SHA1e5d8ba996e7db3129abc55f68858ae61a40c9852
SHA25669cf1dac06bedf39a47c0b291f21906e492195447333c7ca35f45634e7d5b78f
SHA51219b8c0f68f9d773060fb459500644e51627cc3a1c0a7797c65d05f20522be3e76be98ba881601111337d1470ff776d68f4f87ecce591990bfcb1870b3d09005f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553c06c4b7b0968a0ac48dddfeffaf926
SHA11d8e4e6bef005d7010b42440a0e5b23318aa5cd5
SHA256c9c76169e3e28af24909b38df50bbd03f58032856469fe313b029e7e001d92b5
SHA512be514d6999912f517fd2807fdcdc87363c3f66d4d336a85eec1e92ddfa5c6c6fc8662859ddb5a81a8d2dcf53fca840147198dd7fd1642ea143c914c647c53913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551af91f1629c14867e2b6fea8d0773bc
SHA181a54cf6e983daa994578318452de162f612e393
SHA25676282b234d82df375aab3c6ef0c068489f91ee1315dfdc66d107360d1b588a60
SHA5123dcfe85084fd3bdd947cb12e699aba473db8971f0b540f7ac74558475228eb543cb54eb37f45ce4976692e52a2e4755014bd4325183695386f79eb177495d1bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a755a9ad44f152742c2da975f5b2ff41
SHA1b7a6f7fd7cee0ec1b47dec715121ddc2f177446b
SHA256d484a7fd6e868e25ff258ce1d762c907c1d7bcec9e43748cd238d1de5ee86d8e
SHA512a264f23ea92b65f6d2b329d6660e36cf7b56d8b3577ae8310775d3b134819eeb3037af757e8c90a684732f910c06c7bed83e5d3c73aeadc9447a5a8a2da3f7b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5704887bfa031b01800ccd60d26f55f80
SHA1d6de080b56b1b98cc7ad9961a91ffbee82e6accb
SHA2565932d9f65b2d41d541d4f874029c836733d1f9d4fab2a34a4deaf9d996034366
SHA512eec7a661558ae1fac30e92a47119f9dcc906aba04eb0cafabe854b9208e6948d4c40681bb157f373c0e05db4c33967a460ee03d2b4ac546f8b4db6e6ff8eb325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1a0ebfd6dc7f45eb7d134f668211e0b
SHA1d975a5d661267040afbdcfa77efa84615a895569
SHA256d0e90648047322ac6c78ec37d7cce9b64dd70446f3d03ca6e598d5d8d302f0e6
SHA512c4e2828424325e6571e169112998b6aa8b225537025a9023e8b1a071d38dd2b3ddb089d21de7d35a532012a78229198f8f350ae1f3a36aaa5c3b1be5b9f1184b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515c7f7eaa98990af556da562c71800cc
SHA141d3c604db19296bb2abad6bc741c0181389be31
SHA25688bdde69292bc82a9b9d925657120f01a96f6e1b6b9f9f4f630abf09df789f62
SHA512eec0d4985c7007e6024244ad85c1dccf3ed60367d1740f29eb26f5d954b47bc68f90997b74d0a25c8388597c93ff29d1ea0700b6a668f696d06867787bf77ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58207964bed1f90e3651e94b64883bc25
SHA10710513260827ae4e1b76c27ca95d117ac901f07
SHA256c859655c2c214dbe2abd41d68b12313978d0b01e408e73f6e70c482e53295009
SHA51246aa957941fa6b99fcbed28acab01493023ab0d96e823be4413be7e8a78305ffd48aff05f5eb8ee3073ed94413901f2418c9edd6d8be23f0f1ac786514591264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ce7d255f234ef5579fa9d38cf5f20af
SHA11da165df3d2d20e24c8198f7f454edcd318d2e5d
SHA2568c70681a992a88b4a846af5120194851475e69d0b3cd6d0aa9006007770889bb
SHA512020deb2c9c0688f8c909f476cf672ac930568b2c626500fcb931a06cf90e373e92fe82ccacf77ca9b48cf856131e64e26087310a59394779b7852d9edf435137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5513ca7267c633d069086376545635c0d
SHA1a960e4fa15985875eef055a5d9fc52545c01c135
SHA2560cea0acb6d4fb5eed7205dd38ae77dde382f1ac63ec19ff512bcb2f8cd7460e6
SHA512861bb082644b55e9f48ca921612ffaeb211eaf5675be6e5d377524a7e396b1e5b0e8f8544c55cb9c9d2cc9315cb6f5aae4dfd1610a1f8e430feade2f822485f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a80355a72c61ef41b9d08ffef5a649c
SHA17c7899195eab052415cbcd14975876cd43fc0a3d
SHA25653cfdd792f03e4dfa1e27b7ecd3f98d8d73d1f14d64cdfc259c126d539702aad
SHA51261f1378029dec0d065e64c6a28a5ba59f402071458d3d328e74a5ca85827c63be87a296bf6a6cb160b0b7179ac26f6794142ce209a5323ea2042bf64a62aeaa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2412ac6e1f8b04176b23ddee2c4635
SHA16b127a386baf4e4c15b73fd490f20ec9798a44a6
SHA25620f2df0f0ff7dbb20f640dc886829ac64eac19a0e86aba92895234465b596b90
SHA5126569861cd049136ff2ce5e8e0a5ddf533b2d5c8b07d47d00108552311f24d39640fd83ff4fba2c0d47b83a04e3d607bf8632d0284245bac9020b0e9c07adbbff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e715283ea117981c6ea12ba2fd342bab
SHA17fc4213fd5e1e545ce257bca8ba464c2e6ab8840
SHA256390df8645ce0727a2e344dc8f419383502c366c9b97e649a6bc0838fa4af8e9e
SHA5128743a2bc05b2c0174ed19972438ce65f2a33f9e459cf112e485c78e0803a6106e7a4e8caa7b34be12705ba9be3b1113ab453de2c14d1c6f362f57af93e98d13e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d715fa1a8ea8bdca3cd016846169032
SHA19141be0d537cf2a488bfa94136868182415b745e
SHA256f04d6e40f3dfe41e1af915502b4ffd6b7d27ff72058c4ed484d27edad6ba450d
SHA512bd478e52fe723f5cece757a26bae46b03bc5999d3ec4e3dd673b5a440e02a9664c026aab81abe7aad0f0d17e1553684f7f3dbe46f44909ab21d219d1338b43a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4c028fb2b859a84c48c6b879017884f
SHA1b9fc308c66d2e93e1e1541327b9d586176c8d9f6
SHA256f5e5f28f4b1acd0ab9200bcf60abd12af3972478c2f0094b493904b0dde0c071
SHA512dd648e04a64db453007cda63876de2a0a83fb87301b1fffd96d39cd838609ad7237175cf143e417d05f94906c429de01a3d63e9428613198d9b3fe517aa670ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e539fe1bf6e26a286fc4175e518fd8b5
SHA1f9405a492111d8136f1df9ab0acce3d0bed7ad37
SHA2560b73ffea39a9f74e83f668589c12ec2d29eb3086f045f3b40c429ec12f3747b3
SHA5129ee4bd180ae9635a539f8e3c73ede582f87934f92ead2aaa83dfebbab90c5ef34b04ffd350f9c161f3e94ac01f455ed5e07e60cf4627c5568fdf527e60733112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b5c9b50b180de82ee42511102dd70a
SHA1f59f95bbb58c5e10f89b0c71edbe3ee190f09b8e
SHA25641fdcd3918451f3f738c05bf48d28e3c9469e46bea9db421fa85d217222e32a7
SHA512a9372c7a0840648398a4fcb4048e4a5e87ff9378bbe4e11a64130e13b5ffdc0a034f18ceac6ba293fa76d7675ea795d89bb0cc9e201e5e7145434a70476f659b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b