Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
6a1a9795473061665ef4c543e3bf5bfa_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6a1a9795473061665ef4c543e3bf5bfa_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6a1a9795473061665ef4c543e3bf5bfa_JaffaCakes118.html
-
Size
100KB
-
MD5
6a1a9795473061665ef4c543e3bf5bfa
-
SHA1
5ade9e05c3b070d022ec99a7245d1a66f142b0a1
-
SHA256
6b7f06b0726d24fc58ed483a2ab07d7036a120b3445f83e26552ae8da845bcd1
-
SHA512
8501b1d08e81237f5a22e2bcbf017b1ca11bccaf49072b8accb4d3fcc1e4527be64343cf80700f663d99e3d57408cc8cda7c8641bf064579ea704d064273af79
-
SSDEEP
3072:jTmyH4y6hLIx2crUg1GzeSFLoIN1KMPy92okCttkNxH:+IcLIxyHKMPyQ5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b00000000020000000000106600000001000020000000f28530ee3b47e46cdca4ad50a974d3048c0a77c60b376254feabca65b3d70932000000000e800000000200002000000086f7fc18208d8ebbbbbc86986203f7c6ab13d0946f4b598f1fc0de1f12f4c3e3200000002e4c038e2a6189458c20dd0af2be6e13681491914fdf522e8337594e601f388f400000002d2ff178aa30e6330ef69131234a031e75b552081f1737e69137bb5acc6fac9bcf1fb6a25403a2cf59fbd6daa6925bd0933667e1b04c25ae7150864419cf2a4e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427954139" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1A9D18A1-496E-11EF-AC89-C644C3EA32BD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0fc3aef7addda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2492 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2492 iexplore.exe 2492 iexplore.exe 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2492 wrote to memory of 1616 2492 iexplore.exe 30 PID 2492 wrote to memory of 1616 2492 iexplore.exe 30 PID 2492 wrote to memory of 1616 2492 iexplore.exe 30 PID 2492 wrote to memory of 1616 2492 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6a1a9795473061665ef4c543e3bf5bfa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c15e95ec7fc3a411f73c2544d41fc87
SHA16885ac8ae62dd4c98f44d38695231aa51f423200
SHA256949874649f292745b3e800ea0d0fee24e6ac4882a2ac5743ef50f835b86278f4
SHA512323e1a3165871e65a7570d1f1e9ee764dee16e2cedcc22c893808de6ef86c69fc1555f4487dca7e4254df39c2140812c7a01e960d36ce271fa6401eddb9ff2a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575810d59a5a16201a3f5623849ea4a5f
SHA1637ab87c59ab5b8921e913f1962a6cef5d3e0994
SHA25670c9049439de07e1e341da711354c56fa76b3903614e65314d8565305e150694
SHA5121b55f3477a086b7876fb180e893001210f64253e766d1d1232a93f7aace8e32b449902d9bbbcddc53a5dcb7222e18be5e37ea8a4f356eec44b71ef99c2caf39d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bbcea8c522e92bb690166bbaf9a762f
SHA1bbaf81a2bd358a3a821ce720fa235a38144c05f2
SHA256d2203aa68b58fb3d57dae37498759a2c137ec83271ff04742772e3f3e48abd46
SHA512570ed2622b877de938f814f037c29bb33da5524d6ccc93b4693a83373453ed7635a14d4b906c05d6dfc8c04dd377c19dff99829b186a44b0a82dad62303bedf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7bd66421226f7f2fc2ec04ee3b01c55
SHA1004b6f2199e1a3c93b5f0afed5abc207e95f0e2a
SHA256a50cc38fdd378b640f3eadeae46a996499371482adec4cb3ef0afff4c7b8785d
SHA512897e8b756623efeca0c0740ce8d98248e794f0d105caa041d60d1d0ae273ba1026686428cb1696b43b1c7dbdba45a86348e3fe9f6cf44ebafc9178a73af2c650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edf767da484a820fac1ca57f905fce69
SHA1047ccff46939937aff165ffe685142fddf1747d2
SHA256c6e2e2c899ab6a41031d4888e9063b45f6ade5137cab486c8a3a6925c9189c1a
SHA512210c93ee5583d520a527d0fe1de67c6b17c318c7a65128274f85fcddfe400b08824fd822886e1396bb2b2ce2c2aaae7d045e6471730811269b95c9c12a56737d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e50f6f1f35b7d1bec6118b2ae5bfeae6
SHA1e57fa52d72b4bb3dabcea9581a5215dafe074987
SHA256b0ec69c06483ffc7682a7c57585eb18059d99b853be9bd6d631b4f05c7036263
SHA5120b7c0f50a41f6182d669d16f0952f76a02fd633ee9e971f1cc2af4efbbe6e826521562f694eaae4a8f6b4fe8d937cf10a8910c53d6d67065e56d35416553f98d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ec818b8e916342f668c8425574ea741
SHA1b1230715ecbc063a0eefe70c147509bab6939737
SHA256239e468ca03eec16e9525f8cd3a6c3bd56f41dfb56a93c11a77c23121a4d8057
SHA512c57d2d10efc060fcdf875307e8ebc47061b0f583ac280c8686fa66d15280b8e96f5c35cb9114aea4bd92d95377dd6ed68d6cbc4c4276a96c27b79addb2e0fac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec5c3f1f259a8a5020ba5310258c9b34
SHA1b730ebb072bee032ef36ab4d6753ecfdea1fceae
SHA2562c251fa62b89ec06595378db92e9d8335db4231237cb1a00013974f4580d99ae
SHA512bf15cfc2570416c99e4cebbede27a9db69358bbab2ed240dca125cf2b749523fd971dc9b093c59161e7622d7d465f11cd7890cd77969383e9d07276289b2587e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529b92391ab9da26f3eef68f90918988c
SHA1766bba68faa25700cb7d5dfd4c07b0d2290078cf
SHA256d8fbb0769fe66512b26bdad1092eb860b3b5463ad8bb917974a368e4cbcc0e84
SHA5120786b9a15bd2a2fe32a7134d9d3d114691856d3913d93b8b9823963966a985c78e0c3795a2c4a0ebec4f5fbf79e927489d2046ddf1b2c0d815dca56f2addc855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51867ee0698d805ecce1c32fb74351518
SHA17ec7c8d06ce309b38b9d802aaef25ddfe5e5543d
SHA256fed01cb65d156339affda1d7b2452148d660d94f31cf348f8f2f025d5a991353
SHA512519dc0e68bd68f6b2cee4f30b3ed2db89af87628a544c3369a68af9a295dfd1f3f0a97c762a17b160cfe14866fa84cd957c87556f2ad69337864c0c1da5b70be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5363bb9fd76d8a3ecca606ac562270a20
SHA1a3d13885b4ce74e1300e545ece740f3e6ba9f266
SHA256f58534fb057bdd99c9e5c1331e8d10ef9ebc73daa6f2394e198a8b4dd098eabc
SHA51274c77a89a684e719050e2dcc9eb6aa2960c682ddf7de7b76d7585a30b6668293849161a70659a92355e63d2b4117975c7fb90949be75aba87c276bc8e86fab97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c698132bb5768567e87f8db1c270d728
SHA129d16c533ff646dbad53e1b3ef12ddada901c7c5
SHA256f9b78c6d2ec9cf8e6740683810998d29261418ea6621cdcd0562f7e7ca3d2994
SHA51254dd1efab8b0b967f28179222502d21aecc6db88fd59bd0d0e6b26245d64fe27552951805279ab30195013f6947fd5bd9ce53959dc0da07aba0c7f9b605cb3e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546cf16590d870a965b14ee4e3118263c
SHA125ba7c0581cd7722e301cf7e9576c0ad3a9af13e
SHA256b2864289aaa8fe51a741f297a80ef7a575aca8243787c16fc7a789c700e2d3e1
SHA512134f06252fe6fde6e66f88d2bc7f61dcc3bb697d9464b625059bf9684c5aad0a6bde44baa2fe3537f7d5f29d13744288dc9a51af07662220aadfa8d87203fe52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b365b42bd698e7ab92212dcaed61ee5
SHA128ee7f346fedbdf3d5f8bffb00ac9c3c4c232871
SHA256514b8ec6a8738c2b31ec588a4a608e37a8ae0ea9aba825f2fc9ff958e7f3422d
SHA512818c0e5cb8751f6910eff7f6b5db080f915bfa1cde8abe68132059905d8fdebe47384fa8c4843632d0ec3ff57218589b46c989c570540401a99498ca0a7e324b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e80e84820cd0868b4531758801e72e7
SHA138a43ab48cde0f7a88deda94a96f33ed93dea1dd
SHA25618e7d7209a481ef71d0350fc295e7aea20b8212382f3c10e02c1ea2c707b176b
SHA512756c2f7f309fd51d52e35658c2243ed210d1b91f28db409daa839d1554db1f3b0d68eb30e53e990e9452c471bb9b1772594c32ec908de2ca729d29058717a62d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5061ccab7e9970b9c311934c6c823e3ec
SHA1e8fb49e45f31934631fe83d98e907e06a25497a2
SHA256a6d9a4ea0b03b8bd4e4268b2dff7c0c299303ab37e70671b9479515c8cb42cc4
SHA5128b02993d9b9870b5ad5a1054ede0b46d78bc4d0edd46b8fd1824044dadcedc3a57a14f44d82cb205a4236bc269e062fa6da55d0f060dc0f2dcfcaf89b99bdca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595a3edfb53d34714aa0a425b67f43912
SHA1bbf296e1650a4f42e2d43a2dfaf9a2750db3b747
SHA25610e4e5d79026d7c95410bd151e305df4ffb70e302e9aae7e0ff8851c56cb878e
SHA51215975f0f75882b4eeb03cd1827542b518b4ca773d34edf0d1d72ad3ca25a84bdaafff1bdf92d345e7b43d774ffef3a4c6f3e4dd43f9fc80547174ae710201ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fff773c91d482ed3a3f1b8c05ad5cc4e
SHA120a972ba476336ab1e5fbf93c121cf979cbfa80f
SHA256d9055a017c731e38ed9a30d051679bfd2eaeb7f51a9f8f7191d9413f08490d5e
SHA512bb2d766a168d34fdb201a010a28e74459e35da666fd4dbf988f9e4fbcbc91679e6e9be88b53d06522eaba71222531daa290f302c6b8432717426277f69ad3ed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dac50e610e0cb582aac3f8f6bdd2e7a
SHA11d1b3f09cb143917b2dbbd1f6b6c208848ac9102
SHA25681007252f0a15ab29a0897bf0752209cbca781ac4eb494050527da1dc65baa58
SHA5127a6595c4169b48281ead57f57cbf5e763fdcc4eac55348c1d03aa3b844d6c647bb972c69b1c7e0ccdd1d7c523e357700e0c9f8c1238db82496fe2c5455d78481
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b