Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 08:12
Static task
static1
Behavioral task
behavioral1
Sample
6ae0b2102a5b1c27f4f47669a84e6eaa_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6ae0b2102a5b1c27f4f47669a84e6eaa_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6ae0b2102a5b1c27f4f47669a84e6eaa_JaffaCakes118.html
-
Size
18KB
-
MD5
6ae0b2102a5b1c27f4f47669a84e6eaa
-
SHA1
2340bccacdd524ba09b51db91fbf16e94ec43122
-
SHA256
9bcf6d63d795be6016895ed15b91f5c8f48adc1c36438591ef71c964f3c1e804
-
SHA512
0c62627408ab4ad7423bae6cc6f3b9d2b8a41274750d0f3b77c7b5466c333eb71c86362f6892f9371ef715a87fc695cee9de032e7389be78436da0db73e8b7e0
-
SSDEEP
384:SllpUeigDx5ZURSc1xAJy/xWscRRR7q38qx+Zn0kj:8pUZ05ZURTjAapcRRR7tl0w
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000cca62a04c6bef725e2c6e26e5b6b8ef823815d4200e51fbd5913290947d1ccd1000000000e8000000002000020000000931ef047b652e0ab4d54aa9738c747e529e90d7767348945c078c40247390e6120000000c563a40d8575576346223757dcd3a45c1a2adb629084d9aac7c8c13c08b887d44000000036f6c28b43da2b0edc738acd9aff47c9045807ec71b0ec8e42a516485011018cb3f94b08d39f285173382b24927cc91c1cc56e16af1a134a77b9222b0755e22b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427970646" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9039185ea1ddda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{898F6BC1-4994-11EF-913A-D61F2295B977} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2820 iexplore.exe 2820 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2948 2820 iexplore.exe 30 PID 2820 wrote to memory of 2948 2820 iexplore.exe 30 PID 2820 wrote to memory of 2948 2820 iexplore.exe 30 PID 2820 wrote to memory of 2948 2820 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6ae0b2102a5b1c27f4f47669a84e6eaa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b78de9c7c11839dbbe170afce043d38
SHA13d31d1210b8dac075fd3341347f0df578fd46f01
SHA256f6a0db151b50d259c40113da74a1214b57582414951910a2570de7ba21e5a874
SHA51280be9f6eac90ea9e36ab92bd0469b702f68ad0f9a1038cd8435862daad86c0df8f3d12987401c7c23b7ba10ccec34b83824ca2a5f02c233490675c9982e41449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5410c4e4d20f1c668524d075862858c43
SHA12a2021004023651b241aa577a3baf4a56ceb48af
SHA2569e6bae309e62fdc0fd4958606edbd6a886aba605a6791f815b2290ab623c2245
SHA5120d645c491c5c0081444c06088d6b666a96d6886e56631a88caa5c73ae8b5a33f10a6c0bf145dd12111cefe96ebc20a8c134bfe76d86bb26ffaf20587a316e480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d75833bbe87f56bd73e7314594f20689
SHA1865af9f429699800bab47ec9262c1385969f9c2b
SHA2566d81978fdff002f17367769728a71f8e0f1e687b42cd1d4fa1e59b8707952cf2
SHA512c705fd655a3e03c7fc6e8aff38500d5a75c4949ccb9e4f4ecd03f2e4c146cac4747642cdb34fa2ad424b5a0cec915a4decf2d69e525a6291d14d60824b982543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5368653227c4d08ceac1f9dbfb163cb16
SHA11dbcea4b477127416ef56aefba0565c8bc4f0bd8
SHA25670033a3146e096dd7e73615e2a1cb886b97ddd305f7108f9c9a962cd1d56c578
SHA512c09010c042f6fb07fc5394dd43e87f6bc1aa92606a5c48306954454b2f7e4096b3398864e0d08a219448ee0bf92a29d617407db6678046edac2754ff636d9645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8464bb881500fa6036f91d51b477097
SHA12305e543154bedf8ddaad2cc85b8481e73c3ef18
SHA2560a3ab0e2789fadb46e6e69e97d6d43ce5ea6e90417c89593aabe587401eb8644
SHA51266751f28b015fb3eb586907fe6edfe72e6118dce95e00f503c63da2a45fdcc0d70568cd36084feb1565219962f0ce2138de4ff283b37a81f4af4291040e255cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5558b2b4965d33f2cfb273ec4ec0ed260
SHA1b55630b20e808d045198763de88d023f2590eb1e
SHA25675fa22707ff40055a284594d1b8cd0b38980a8edea3708149e274da07aae29a1
SHA512f3705121379b8a0407289f6396538b866e8f20cd954360202865b15903df36359802b7bed0c5df24dda8636e8a8c6e1c645b10e3cc75b864665b727751a8bc6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daba5a80adaa49093b3b68aa94aa51cd
SHA1095e43e9830479c19366869dc6894f5dd0698db5
SHA256fb88be4c4dee3a2494452bfb0e983f044337d80b702c103966a7eb14cb0fdffd
SHA512c362fd9a5a361e99138d97ff948c2a60618982b4b39990eac0fe8f0eb95ca4a76fd48861a92b98aaafcf18f467bdda11dda926dac625719da077293277464e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5decc160bd893f8571338b72b82cf7471
SHA17bb4f82c4d1be2df13faec862a10b1de36b4a3c2
SHA256f16f9de3e2974dd133bc977d27aec9e1ccd2fae366e791a6be69fb1b030eb9fe
SHA51260fbd0f5bf6959ba9da05a0b49a1bcc476a87d1b62ae79b0b7dc411d0c51919da4985422f94c6bd0cd815ba419b7d55f74adf6668363f647664aff3ec6dcb7d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ad810f3fda0d47fb0cd909b190ed56c
SHA191e4ce13463c1e0054ee58f3daee55ffa2b43b2a
SHA256324072401b30ba2ea333dd9dfdd226af94fd737e97d716cd21957034d86eebf0
SHA512b02f049b3ed0697f9071466d0c9f2d8e1c8511591c73b8fe12685e3847c9396a9eca39fa91bfe045d5f97a389e467cc780ebd599436f33dbe2c0270b5a255fbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529d1066569343c89c51dcef5142d4e03
SHA161726f5b7352ddbdefea90388f600e1bd5adbcc3
SHA256ef6602f6ff584dafe1ebe1fcf9ef2aa2701d80a77e34d7d9c74bd6b20cd96d92
SHA512f1d17977a0907048c9d13e842ad2a88c651cf9ced01aa55d4b579e063dbcb62e2bfcfdad9328291e39a6590678cf0984cc678319d0016d6e530397224b8f6624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f8cdac3d6fdf932cfc92e0dc916aaa7
SHA1d8d9b4073ffc7a06eb48441203587b3e89b7bbce
SHA256469b435cb73908bc28f245ca3499962a5e761543e2ab37fec4e7d57bcaa27b4a
SHA5123ab2fb59ca25c023a4ceb98cc7e11c6dcb9244fbbe5b3fed87ab4fbb467f9933239d7f010216b3bb359a97bbed3a1a30a4205011af102c81ddf915abddd0215c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5252642ad9b5fb6dc91c920c997b75c47
SHA10f7451d0b0b2ed629a5d810efe8b7201570cff9a
SHA2560ded2531a7d50611eb8284f133f3665ba54069e6b828704f68c4dcde52c0f6ad
SHA512c82ed5dc618509962aa0e2657b859f4d59143f96d7d5d04371b64ba2f9fd42d7a4a18b102ed8f5dd7b6b068756f41d3252541fdcabf5fc2d1c8dac3ba7198e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b48322d7860eba8aa593cb9590cc3f24
SHA1c7f0345a85348ad1ff163e7dc5d86b7e3c625662
SHA2565053c361bdce45f7445f9d29c5e2f6ed5536060f44c992ccce52a5d71c8c498e
SHA5125b73da391d09df36ed01959d21fdb9ab4b7df9099fc343988aec04168844b27e713c80c765984716f54eb5b936ef4b96bfb504f822e2d53a12fc54dd01c4b9d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598eb2cf25562d1db4acdcd2e1f9765cc
SHA1517ac9fc8ed55160d9d6f63022d4b1e8ccb9d7e7
SHA2562498f69afcf1cd2109668693b1784609250dcd459b37c8ffbc1db14bbc69fa00
SHA51283434701c5474f584392822ddea82f8c0f2451f6d91ac068b2f058f41fb77575ef6bff3618407c4f95030f9cbb7fe75e938f08ba9144b63b36b532f06750e0d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ce5fc0255f4f13381397b99ab404e90
SHA1a71a0ca1ba992c75e2c392210cf53db9e6d9e353
SHA25696a194ead48a8a8ba0528c4a91c27818abd15b17863e3a654cc023ae9ff033d1
SHA5125e84c8204d3c5b69e099f0c08176521ae157e00af488ce2ad642c23550480ad9b5cd21a1b68c51a3bce7cac780a136ed9f3ae19f98c3562fd53b2da753a1390d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3bf31ca518b6273472c5a6f14b2c325
SHA10afdc79c474b8c18fd35847a3e486a19d21bb4a7
SHA25602e9f9d1f16ad8eb44dd3c8a322f7d074c5ebe625622459c2460a6e738d50728
SHA5122ec902e91ee5b3489fd53e339e484607e3591dfd529e346feadd2114a3d049cb030d752ce38a61656cee9b59e0949b2f142e00b5fa68625b331ce1bea950d49c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f471dab3aa38f561e1d97deb65201047
SHA143d5fbdedac95ceefd3799c2fe44f5193601831e
SHA2565e59dea737b77f72d68159d4eacadf90c488079bdcd2052ecf6b72476c588908
SHA51252e44f17f73fc854b25cd19d8db668264647f11fe80bde8007870138f6c39926ff9af75e62606ce0d635142d36421a5584b719eba3e7db9924205d7999f09c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b525cc3f16ca686ac01e61faf346941
SHA100bd5556772beac0b340978a0ecda820072d8bd2
SHA2561fc2e19d745291c8b0a0fe607cb0afac19622838fc71395f6c3cd29457d2f36e
SHA5124b6c1a5ac893331780792dbae7616c528590b78c3d1eb73fe3f311cfaa3f3a5ee0e19a71537a2b94bc952a724e77c70405649424226c1f9f9a19ffdb935ce11f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec4247e07cd75e51bf99d536428d5937
SHA1e22e8ee88951f0f1402f427ef37a1a2cce655509
SHA2561c86ce4fca45f0c9805ebbb5fc7d4dabe1bdb931906aa47d789c90d77faec970
SHA51239c43f1112257204166b63d0b38e42c2f5309b631e5433134b9e0fe901c2bc5566002f8983f2a92de6c5714f73a0873bd95c565da2cd3574f6714e6d9c55ffa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c3487ced62ec3d3a8075eca42fd35c
SHA16d2890a711f28c547b56a4d21878056dad1b8b2f
SHA2568a4ea476aaf3cbca95fdf3bb80e20ffc512d38ec83ae924e8641495e2f404b6d
SHA5128513df4d919b91fd2b04e2bfc16487f4912870ea4f0e1ebe8ccade0949b086feaa9930c2e9469c4bb79dab539a3234ac42f80815751b30e05e7cfb66ae668ddf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b