Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 09:34
Static task
static1
Behavioral task
behavioral1
Sample
6f0923fcb5321c533b34ef81256b5072_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6f0923fcb5321c533b34ef81256b5072_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6f0923fcb5321c533b34ef81256b5072_JaffaCakes118.html
-
Size
73KB
-
MD5
6f0923fcb5321c533b34ef81256b5072
-
SHA1
b1c1a0d6e90a00508ff1b60a7520cf2465b0bab0
-
SHA256
d66e62719ac7029dd5c5735b2254965009e7eacd73df428c3f9abcb293dbd416
-
SHA512
380f59447e98aec0c4e18fe0bec706e9814946f2fcb1d7dcee9e8861880fb6bdffb52a762a9166dddfb0614e1456f0e68944197d3dde7de6fefd8037da03ace1
-
SSDEEP
1536:D4QtqXbKMp4pSe+1MOv/nzsA4VZq74c5izd:obPfX7m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000005840ec4266d7fe8a74d84b981df3e7e1df26c3cf354f881e56483a8837257706000000000e8000000002000020000000a2b30f71229fec2fe8c3e7ec31dac3d6a7adbea3807da9a64b8c9c048e67572720000000cf1613d1df3b4a0fbdea031d13657583675ebf1ff20a32afc2a431ef709ed09d40000000814664d63b21b56a1f11e7839cb67abbf0bcc1508709fcc7e53a7956f0efd0a52c5987ec5ce57ba72bf3021f5bd3812a29b87c1d89a3e6caed97fa9b0bdac865 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428061958" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{233126E1-4A69-11EF-97BF-72D30ED4C808} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10ff08f875deda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2880 iexplore.exe 2880 iexplore.exe 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2960 2880 iexplore.exe 30 PID 2880 wrote to memory of 2960 2880 iexplore.exe 30 PID 2880 wrote to memory of 2960 2880 iexplore.exe 30 PID 2880 wrote to memory of 2960 2880 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f0923fcb5321c533b34ef81256b5072_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff150b826c453f7f4772e284bfdafd93
SHA1f643c2d1be65542499199e5f89d4734da6f2312e
SHA2563a9bfc2ef2e36cefda556cde8fc6ad7cda390dd87fbf53eb8ad9771abf9b9421
SHA5126f75699da853e67539e904239d47a28e115335e4cf8fa3ba68facf1ed5aef6c1e1bc5b207b3ba8e5dba16ca40be81a6a493fa6103e8a68252834907a4309b6aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2a8ae92dd542d1318637ba0a0dede6b
SHA10713b33239f7b4b4779b9745c2e9ba30e106477b
SHA256a73f99595fbce4eeb7ae3f706385b93005224645c16f183be1beb4fe4e843728
SHA5124a57e0f957183041c692447f72279b95bf43f4165a3e1139c2a171568a0799f5c2deadb47512907e47a2ea45e0eeaa80f2e5f661211b8a12ced7473287b1bfda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510b7cbeee343b5580f995307e41af769
SHA1bb7a60aa0cdd575727592dc0c667df36bd5eeee3
SHA256d4b28d50b889ca27da4e490101a1c39d743592dad85b7b22f5a66d4d0d098053
SHA512a06c7ba61d654aa95c61412743b1e8a635c6fd9d71dcbb8f5bf834f44c78e259e9093ab191f628eee2b812a1c3b53808ba90299cfb10dcbe646a0dc2677d22c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53adcc56335f07372cb577dda253d0c32
SHA1eee22222032b3698222991bba9552a6630ddf347
SHA256ceebdda6aaddaeca6b3f25aca81468c709462a26e229472aee365e5f4760c0ec
SHA5129d697469858047574b7e38c44ffb70c738182a222eb41b07b0c38bd673e7a4c9f259587b249d84d986b83c6031fd91b142e4f2b4c5fd2fd44bd546b79e63d2b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59654802ea6f044fda5e18e27d61870bc
SHA15ef97489321b55b163bc5dd064750ec03c63ff0d
SHA256c3807b2e499715807a26213a0adc00059c179a5adff0d0f7e5e1b1690e709e78
SHA5121f2b9a5f115d2bc3acf88035170ba6160a15fd75d47b311b13d559dd140feb977c30a8ea49ef86785fcdb52bc9c5dd47f64fcc05c749374abdd8cf5a56cb5ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af10460066c6f2c32500b17163d40934
SHA17108bb3f6a262b0a100e5dd5399719c77e91cb3d
SHA25644895843b8e409f2ae96dd5c8c1d84c2ffe66b176cdf0d3c30b5c4114e053c10
SHA51260d04f6060f3f1c7e0d7672be03097a03456aff57fd9ae6a9054128a2309b544cccb707cf2f20819cf88ee01e9ab3e60773a773b551e39e93b67aea3f8dd09d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd3237e6e3affc11a30cbae8747330da
SHA1193be3abe4baccec08c21a49cca930a099979df3
SHA256d6372c1361a8d2f545fdf8bb3fd491b76eda8e289eb4ab5fe78e8e4f1e2bc5eb
SHA512f883ad091265953827485acfb3336f222cf03c5cf55c9634b91cae64c67fc0a632e057c6802d0c88374c2c798a47dcabda6c8e41d39696b7243ce0b1991a36f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b05acdf44ce211c37c18ceda5d2aba6c
SHA1844578d92829a159f04318b446377c81553200b9
SHA25611f910b3a5f6a85b51f1fbd25dd1189786756f02f1d4efeabb5c09470103f690
SHA512f2b41d3bccb1d4e0f20027881d567953bdaa3ad3c20843aaa4eb8c432f780a177b9c4dae281fe39b693146be84ab7ea62dc5ee5de46e9936312adb2e9e56e90b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5ec69f45b9d1df2af7b4fb3225133c4
SHA14cd62474e27849af1e8874ac337ed5595e5a968f
SHA256cea1540003bb3ac67f33e87ca0975c68e6505b7716562111d214a7c43ee55d80
SHA512d7bfa14db0ed07c8622c73a484f4efeb82cfc15b4688b066797ae336db336068dd72cf8a0f33f2192c55aeb1419f0e67d8b19bff2c62e9f3f32b5a757d96ffcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf6cb1ad135c4314cd077e5ada947e4e
SHA10a73d7cad8a0df229c605d4dfdb122f5ff826324
SHA2564971e006e8c6d175c6ec7327bd277591053b9e0a500410520139a794629796da
SHA512fac51ccbf7af87248f0f2b20ad85b366960a1e42a66a72119488404408123c34f07004a8a8dfbb84e17e32c24a4c9ad1fa96ab56db7f5da12145f3f6ec287ad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9eb61ed72efe807d7a9ba9c8c4ae41e
SHA151461977ad461f1ac7dc9da337f881b485a1df79
SHA256c80175f384b57e56f9be7e2629fef2aa07ba9f56b2b5cf904a0cead3f2917eb8
SHA512d0e528eceb54e326aceea5d0f8e0667de00704d76c1840724d579abdb0ad0c895d8b436c5b880899915882fffc0476df800ecf9dd1cad06414b44d6e76d1f981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5756c33cc6df7726540629d00a7903070
SHA1c63134ab096e128feb6f1aa0bc5035fbc00f8fbd
SHA256d7a4c76c4bbad08c5322d9665d1d976c45c063fa8cd56bd9d9feb0bda26a7067
SHA512e3e6099a7e4f06367e60f591471c31570858643f77c7e20ec0b6bb4fcd62eccf0a4cafc4c47e856e4408e132aab09771e4234e8fb28ac03d71804dc373f565e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5047829620607a926ce735b0366cdc4eb
SHA110852fd15a0fa00efca919711d6a2384b66df5a5
SHA256430c8243c6f32cf972d30a3f9526111a72654dbd2a11a6e0ee344c02982730d4
SHA512691ede5ca88fe679398f2ce88b977dcc8c4befa07ccfe812ce06f2cfb3815a53e60aa7c1f09c8d1488292253b037759afd06f2242acae4fdffa6815dc0ea4f84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c0efe10720a0ac86f4ee9467030ddb7
SHA1fa4d165de139c2a6fbecfc54c81f6bfb6a7b3ed8
SHA2567285416ba3c01f2beed2beced425ca755e753c2ab898d7317e9cb8e5cfae8eb2
SHA512f384fee2f8c2fec78e5ba2efd942f8a424108b29a672ba9f83c38a9c892b1b4085c96cb90b8fb6d827d7559d3f0973836551cbd16e8341fcfa0f0583076e8c34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bacd670c358987b5460062f5168438e7
SHA15770b25fd443463ac46280f6c95ee5ee62d004ee
SHA256f1883b98a8dd3aea6190b6b39ff010a636027c917566b3b04fc7eedd7e0f2351
SHA51204c4b660c2b8a2702722b83bfadc4b657e31e7a09ca5d767c4b1016f89ab245a94cbbd1d2e9efda1a7e62ecd046c9ee4b8bb66c41317c6db754f512a5c28297d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeb4b7e66c5af5f431ed44a9e1d00f93
SHA189fb7886022b2c245e8f5cc3f482da88ef0d112e
SHA2567a238269bbc14d70cc2143eb2ac8101790bde1662627a28e3d5a257948c5aea5
SHA512902aca573bde439c987204a8623488f71c7a8c3ae65253003cc7e793ade6bf16c5db8a9fecfa0c7b524c4ffaec9d4ea1ab7bd57af3e4283873b9a548f8b2d6aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc9075a71aca7fcfdb3fff39db4cd1f4
SHA10c6a07a842e1688bb24bd47858b10e15a44030b0
SHA256214b27cdc70a0080358cc42aaa60d9b047f141584b08f6849f719bb6f540e446
SHA5123a1c54ac5a923284727ef28b8e52ad5dd72cb19ec8efcc9ced0608a6583e39c56314d1faedc1d220f08813fde3ae43cdba965f424c3a2533e87a04aeb8970b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de42c3abfd347105511be480cf3fab0d
SHA194b5ccf10ff63279b57c843408c9b1b72534454c
SHA256fae98acb21eb082351037374ed1ccead4a6ccb3ad2bb846c16e8aee7620e7272
SHA512175d353587896af27b068e2798c956d725e1ef802f4dfdabebc123913408ad431579f74911aea10bde42a795ba84a45f568079682418b7c5513138a11d7748b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5886f69b990fb8a029348852205732818
SHA1e7ee269de70454ef3e5f5db95f96030a4ef616c9
SHA2564e00ea67ab8aa98b9e07f5a9b88ac1c216b74852711b6bf137a5d47e26f8bce8
SHA512dcb9d6c965d8f95d8340da2832fc787d2b9ade9a4990c80fcca8a37baf56b6c91246a104e4cb45fa64e0cca1cb7e6fbd35c96387065d5f64325ea94a7665d19a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b