Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
6fa6d8419c6141a013c32d54de73a21c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6fa6d8419c6141a013c32d54de73a21c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6fa6d8419c6141a013c32d54de73a21c_JaffaCakes118.html
-
Size
1KB
-
MD5
6fa6d8419c6141a013c32d54de73a21c
-
SHA1
30461f1311bcd9a976d54f4f4f745efab368cc20
-
SHA256
9f7755b93a154263b2489424220e06a92a637edb1da7fe5d45ba27470c7f00c2
-
SHA512
b2e98e5ae0e927238b1484ff24c184cacf42a6be41ef39222eb36aebb04c6c1ca076fb9cc5766f4df0a12ff66309115ab842a0b57da081ebcb08e1e46fea2912
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C3CA99E1-4A84-11EF-AB71-E6140BA5C80C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428073826" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000f4bbffd6709a3d72af1468603bdd33ac4b682c60ab91f72e095d517f2fbd3348000000000e8000000002000020000000a55e9e875197829e829b5fc4947b3e081bf3080f516e5bc77fda42ae05a263219000000031fda6f35306520861e7e45f85c7393a684d09fe50bf5978898b208169015ce4c67f26d4682e5b423fc7763c638b28c2e16740ad70facc6c2d390364085a0e63652fa479f34f702439525f9f98cdc431a95929251ddf8c78c1a7d93c9336150d38c215a0245a71aa353bc57dd113b5b1814b3b9b7fd91632c98ef70323734975a825c9862373a65d4a07aeb0c673d06340000000b700e57e5616bebf3c565bdb7ea8c6a17149366f86db94e52dffff2694c0b9dd2e04c9b18736cc0df9a96127ac4ef2c4f5bd87620087ac5c4f4f93922e270739 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e09ef89a91deda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000003494cb122e3fcfc07cbbf0e4d3fc0aa6fb9066aeca479444d229385c2234646a000000000e80000000020000200000008347804aa1de712ebf244f5d785a4e2c12ce6c90b7c95a9b9bb0d7bc2ac9144e20000000cf13dd3edf731255c4ef23e019331178da616a030e0066ca0875f772ce68bff5400000008eeaa0d960e436baea0b1ea5b6ff807b09af1e7935d71622fe69bdfedc069dc04bd4bae41b9e4cc370e9557481f26653fa8e6b7d113e4e735b98e33b455aea0f iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2304 2280 iexplore.exe 31 PID 2280 wrote to memory of 2304 2280 iexplore.exe 31 PID 2280 wrote to memory of 2304 2280 iexplore.exe 31 PID 2280 wrote to memory of 2304 2280 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6fa6d8419c6141a013c32d54de73a21c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5341ea32f60998448b33182d37e8d822f
SHA1b6e423a2bfa6ffd9e16250ede5ea245a68fe7fdd
SHA2562753eb60387c62a196529de936d40e012aeec39827fc6000cb90805449968b67
SHA512f9bf5fb5bcd6d8d3c2f173237fde1660a6dc7ef40bcd74bba61af2c2824ab55de417b1f5c0798ef45ffaf4c91d71ffb3785721678af3a4199fd2082cdf97c0d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b45a501f284949b458102f05ba37c1a8
SHA129739c7ab1ffa0bad08d4af1636075f0c66b6bc8
SHA256b94ed8fe2b065161d6c6a1eeb00110488dabbb0e04a173551e3b920d4449279b
SHA51275bd27012f998cf46da54d992bf8fb6af74e60d3a2dd462a16a25c908eb9bf873f7b3813b26da66002e79855755b1085fea08f5f7bb72adfca07eb33b053dc4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5897bd0d5a6b99667ea537ddc416d70f9
SHA10a2b32fc5dbcf53802e00ccbf30d48b9fb116714
SHA2563d861fb3717119c10f8a1f4c93cd3339c229f46e37cffcfd5f4a9d2146e2aa97
SHA512aefb8c28ea49129d0fbd49d8239c637121279d5a68dc8708dfdb490954a197cdbfbb4ffc97d85f6d8a82bf3df3f5d38da59f8a790c518826717015136e5a144a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dd26af7759b2477937b8b04951c3919
SHA12c7f273ac950bae149d77da3f630bc47238b551a
SHA25676e75f3b5aae18bc03a9fea288435833f9bfe214fafe883cf1699cab8dfdb88a
SHA5127cfd1dd6f707f0dafaee9b8dd9428fe32eff5df1266fb057c131e6d710da7648ea25284106c992c82f75adaa2ff2768c5d28e323abfb7e79b4e1da9f7b94c4f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1f30a8a864c7cc2cdcfa24f83ef9ce0
SHA155276be2fd9610045807891671075414b24d1e49
SHA256da168a914c72e7c7b2cf3db7139c7b3e31dd88716a2953a7a543ba08a624aa06
SHA512479fab6af7b4d59670b2bc7bda830fb0f8b91af8d7f89ac80d8cad05898b570bbcd0922cd97ce718c3b860e1be9e87b46f2d0ecb6b1a114a6f151cde1e986e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f0a164238fbead9cb29a88d1edf249e
SHA1f6e8be289cec778b4c8ba8c3e9897340a228626a
SHA256ff300be7d0613a1d740c8e044a7cae136e7f22a210cd905a2986986b718fe24e
SHA512384ea0a866527f142b8016ba26376749589d8dad7b9ba847d79abbcd0e13e9205a2d11cbc72729333f468c88c919661725ca90881183ce93b8daae7ed62bdc49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b1dddb927fc263bb7764c6e8dc712f
SHA180326efab2dcec3e61c58d93c1709d102e582e36
SHA2564b585c07d409d9dbe9a6a69cdeb6ef939b26f3ae2883fb64e502941ba84e51c7
SHA512e936b4ae932c532e3ba2338e64045e2fba557729901c2cbc262a8edfdf7d2e02636c0293e480d86db14a19127a59b70cdeb39db83022fe087eddc14d4f432231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506d1c104f03cf7bb4f60ee521c095c8e
SHA1444d0f50e363de70227993678e993bbe6e0facbe
SHA25629a1154ab70e1a985e5b89de33f1d394216e426a16795d99b66584abeda88bcf
SHA512fd186d71c17a53534d301e44d61b997e622448d8bdb4a2da11f9ad36576c1fc6ba9d1285de270fdcef8cce2f5098f1898b54bd8713cc88cec5843c2fe724250c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab901543783007089c39484beeb83d72
SHA17d865ee4b350ed62d396ea0473909a9d83c2f0de
SHA256468a62f8448c191de33e2a30218fa0adb560ed7b4011d6eb1e4ab413e809197c
SHA51278bf3db9d1aa9ea64d2a31cbc0a94154f59ec7222970b1262bcea456fe9f080e7957c03407fe6390a1402108303de597fc3ce85120f73609d8c1b90432ac7d57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5053cb274dfdcd8cae1ca0bec11d77146
SHA1ebd6ab75661bc74922608331c8bfbae05aff4216
SHA256200c0ffb7467ddfe9f2eaa516e0034cd5bc519138aeedb449c1dc0a4f863ea1b
SHA5122c67c6b22cd45b3060675405dd0d475d15ce8022557f4301d50dbd27b7d90cf7ac7cc1af3e648d2e291fb82501aaf0a148c1a11995665101d64b141d21a07189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9d08fe84087d6ae8614ee06aa81606b
SHA1a7e18b1479269f77d8e40f733b3085eec503d1e2
SHA25616a4e765c01beb71b054906bab7e064f91c9ff5b81ce2e2594273c516442753b
SHA512afb3cfcf40fc9ce2f8d162d3be516315e462c34e1255c857b60fd2ceffc6c7bc478e93ebce3aaf2d5910a2cc7bb6967c459d7aa1a5b5680ee7f6214aaf7b9926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5539d83f4a3564f2b5fbc518114f440ee
SHA1bef50942eb8a61b71861a8e5adf999a5e970a657
SHA256e93d66b02322ad442da2a53269313f6a82d8f56b1a5f619f00fe8500e3b2d0e6
SHA5120f2abd07ebc83634be555b8828332534232eb606594f93a61969528ebea7bc89de7360f1380c203d8c9511fea875b1226b69b156ce3a7dbb059fdcb6f30cabeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574437b67e6f521d83807ed819f78065d
SHA1b6b38506d965fdf7a55d0758aefc3f68af1993ec
SHA2565871c087b84d332c422d0a05df04044ddd2e511ad74fae57ec6ad0dce777df4a
SHA512e8b3bc35f46db0c3eaa8e9302180da37b2c7a931aff91ba8dd0b4906a6e59699b5d8f01ae3976425fdf54b93abecf5bad04ebe6362901aebb70b79ee3b1cecc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d64b0574037066b98753c172bc90e1cf
SHA12a04bbda54a428b63d7f1b6651c8305fc3857229
SHA25692f3c471e2c7f2a939683c811cad29b8e77ff908e94daa5c94c13fe5925c383b
SHA512dc1d5baff1431c0cd15d07ace4fc310bf4e0e9eff3ce685c723843600ab6e17e311ec618af1c79b357d17e307ee2e199061bbf0c578a1c9b10263c904b739dd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570888902c9552d48b74260b22050649c
SHA1fb155ffa2661e0cfca62f84f33f3bac95878a447
SHA25642202b2bce28bd8794dc02d8be657657fcdcf4a9e3838fb7b7e09d15190642ec
SHA5124d8871f3e762d97ebc7870070b0de7c99a613b1eff4a17f472d97bae097477d0f8499bf133ce1b9a692e0e0c26b52298273256fa08f4048d80f33345617e52cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e384826f5f74d22591fbfdfbfe8afc9
SHA1e73ae5054801adf00d42c8d33baab9008d6634da
SHA2565d4a41fae21ca6c180d8b55838e00797ac00a3168830f0f81a88a8d701939969
SHA5129ac65ad3500b505eae562897a5a4122c67dc7d5bf0a679fbba73c32fb74041566f0ab13c1633f702c7cbbb8e0adfbd88aa73a012cc699f25dfda92e4692b049f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dacf9c9e6424aad33e16872ce81c5e5d
SHA12fc6a2e625010f3bd38e2b36dbaf0cc5763d4421
SHA25631bfdda2ea0d39bf872f63529e7423cb1bab503da10c5b89bfca0384775b52f5
SHA512f11a2cc28228aa9f6808602eb9396d8eb6a3002d8db64ecc9d653817448a6dc811ff71f10c8cf7b9aa539431d789206b9b002bf866ee29352c958a82c46ed11b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5711c37541bac8f4dcf168480734df111
SHA1e8672b255db3c88cacb47d19e9fc0556b4571763
SHA2565f451ec5382f40ca569ed31d07e789bfab6bd749384869dccfd20383687459f6
SHA512b29635e175f59a928f4ae3daae48b72b36cb5b9928a47e0f47f86c6aa467ff950a7e0252da43d527537eac1600eb7ab21583279fed12a767791072eb61a92ea5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b