Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
6ff13fa7787e52ffea1f4f6f1d6bf9e0_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6ff13fa7787e52ffea1f4f6f1d6bf9e0_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6ff13fa7787e52ffea1f4f6f1d6bf9e0_JaffaCakes118.html
-
Size
22KB
-
MD5
6ff13fa7787e52ffea1f4f6f1d6bf9e0
-
SHA1
a2e1d43f44ce07fa14e0455df429431008ce3099
-
SHA256
1527fb1f53a22b31e848c512ade695b727970018c1a7574379044a61828f64e8
-
SHA512
72487903d583e4a50e5754f50475c14ac479f0a95b49e15418090076750af59fd03257bb76d9d91b027a5e49a665cd6207ef646a1d4c1d60d33d11bb5d9423b5
-
SSDEEP
192:NQoV9nRUB/3ri+bK6QQ3ryJ99qHspNKq6abnCAn:qoVIiF61yswKqCAn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d5fe1d9ededa01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000005c0719c8a39782d6d69d2ff341798e86169ce64260b41af49aa8f89104c1c31e000000000e80000000020000200000000a8353022a69bf449ca52c3376039392a782c62dd43b73a20fcd0def02e316e520000000f091fe5d91112dcfffa91a39f8c25dc2d3526ea9f87faa3fb9d1f90cf8d987a140000000c794c30cdc9efa1d2d1dcc32cf083bf43c5a25ff85d33875d5ca52c2af6ffdbc6732c752953d27e995a13022505f7ef2678e7450d0775fcb5a08a0dd91e8544d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428079201" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{48BA9721-4A91-11EF-A432-EE88FE214989} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1768 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1768 iexplore.exe 1768 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2172 1768 iexplore.exe 29 PID 1768 wrote to memory of 2172 1768 iexplore.exe 29 PID 1768 wrote to memory of 2172 1768 iexplore.exe 29 PID 1768 wrote to memory of 2172 1768 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6ff13fa7787e52ffea1f4f6f1d6bf9e0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1768 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586c3990694c40ecadc508640b50a9e86
SHA1da53882d742e3d3f7379d4a58ed81b441c371d42
SHA256ac0d000427e307aa3d5cba04a23d30690f2d478e181373778cda62e0af3b51d8
SHA512aa88acd756734dc7ce871deec7fb31b8cbdb8b6d74418f0938ca22b88770690ce79bd08de76bf5957a9fd9fea924125fc381af5d029d73fce707421d9dd3b684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe8f2976df6e74983dac7e307ebbebf4
SHA101bd1d35a96a6157bd1ff8b6351bc586aab626a2
SHA256992c76b1907149633766e343a196c032bf6dee0471c88db985cad37bb4e63b37
SHA5124a92185adf91e1c562508ea4534015e6333830dad72c58b86f80dfdfd4319d449c107befdc0aa9beb21a4910b71e433279e20702690ee4474367b226a72d488c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f7d4658a119b693e209e911576de02b
SHA187b71b42d6ea1dfa1028409fca603727c93afc2c
SHA256bf11afc80dcedb4b6b80898d799906c07d5a65679eca26ed4a1d64b36aacf3d3
SHA512f126d50c06cf4db0de4da031669834819f1b0413c79a26522394460f2f16be44acc0ec59442cf15a572b84e21d724910a541aa64ed3cb63ba8b69efb932b2dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a337d0ba1e9e18c12a244fb56ceb9413
SHA1451d563f732b9a1994f8f8ffb40ffc196bb6c649
SHA256dcfcc7649c0102c172b3ebac6c8034246ac850ea4a5132685de636b12da23c15
SHA5120eeaf00fcce98ce9619c014f2be8a38adaa2e0ed0c454c741a4e1eae4fec4876e82c5048ad14c70eb990c0d02a214c1ceb43c24d662eb46516d6b416bfa1646a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4e8bcaaac2a428b1c16751d470bcce0
SHA1ae0cb61cc808a8acdec73d19d1e5db29b1b23db2
SHA2567ee5dd951574fe966c10cdf198bfba42dca9a99ffaf23002ad044df301af1886
SHA5128964d9cc03b38eba18a41a02d33a9742ba69afca57f52ee447cdf01f56914b2188a8e1c0c1ce4b0241293b6674703a3c40d817e6e394acab518f8806b2a9486c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5871d5e44c8e09d0332854a12adafb680
SHA140f9d27b1dc350dcd5dfa5a33b66165a5e489c8f
SHA256043f66e2e025f02ddc2397948eb3f20699f31aff61e940374eb14a1e1faa6d7c
SHA512fc11ba44e9d9e8d2af414ef735b81bed3abafe02eb23c676b2d4e93075d9cdbfc897e5cf6e48938c543f1fe1db92f60a3f9c04645aba99f4d0292f7ec35f2e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bf153eb813619951989b4871a692a7b
SHA1842c5a27a1a9173998e48c2bcf7b8bb127b98dbf
SHA256fd29c4e65e88eab096db5181f3329f3dd9ec7ea48c26c230c795991a34df797a
SHA512e36a1a61f96db43484aeb16505a03fef1cc129aefbc75970499af284235d5c2f41c0d69b47ff08e7ab718f0333c2035217f3bdce9c1ae1ee9137a541385c0408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5255c9e0e08db20c3a0f646346dc1772a
SHA1264512faa9107f69477c313969cd58d03702d1af
SHA25606b462f08512eea1f70a03806117847418bf8a49e764975ac949d17417c110c7
SHA5124f8f824ce94fdbaf23da1b14303a2fd352b28244ab0e6e33735e868380e622aadb726967c1235ca42363c81c5c7ae303eeabaf84ff48d61ea1e87c1fd58a4499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e370d1ef00d49025592fd048afe8d8b
SHA14d5d36433a1edb7782fa136b7e6e789bc2b8f8b2
SHA256ff1ff0f92a4e682ad15296a0a29f781756e5710f3d135fd3b08d68781b5c8042
SHA512eb21957c7272493b0bdab16e4852b607e746a5ff741a218e5bdd007c5cced7f628c86c61334d3c1a763c7cb60734a1e204808988de8a4d1bdaa72a835c546867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5382e1f9a88482e0f8b2e01927e2429ee
SHA1edc38382da5c580c6a766413ca45637d6cbe7c53
SHA256f897b53e2ac143b16782c05ddea55a3c89185d867af02186f34d9f8b06d0fdf6
SHA51265b94cb86fda99aead709927524d6cc23fdbde7f468128528167db363e8120c1684b1e5098649342c73a00b6977539bd2d2551e9e2dbf6f0d398c19dfac5dcba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5266d2f576b755b081d14b49bc969c53e
SHA1b67166c455406ce9c41318ebda3dc080121a4801
SHA2569b7a3916b362f9eef532f73d8418288758441dd54119ad2716267bfbec919c84
SHA512e1889c5b58e8cbaf2513a1c69f72aeea04cf4346982cebb1d9d75728d03b8dbbe02d0ebe3012ba2344d5813e8785d6c9388f0f36027720e28d73c1dbf2a2b2c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c59f9a94aea2eb25ca823af07ba7f807
SHA1bc7ed5f1082c4a96cda1a62f624ee37243b87c8f
SHA256fdbf91aa87e952a42c93d0d7e99ba348d18c7b17eff8c7ded78729d4a07b3f6c
SHA5123a47a80884eb97d290ece44f215e840a8f4e68f9990d309aec4f48fada9121fbc76797fea52edb1ea14af5407900724d078607500b1011056bbddc83e6c45ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b8c6875fb475a7a013fec509c786841
SHA1f4737cf29aa9e086d2fab41978991a603ab25872
SHA2567f676ad4c9ff760536790c5cc8ac34417707f549a68e443666e1f7a1df750637
SHA512e45a0edcd5504697d9fd13f74f928b4be0377781dd1fb46ed9265a34566a485bacb598d44dc8ff8894340e4cc1363dbf1dd53403cd588b9be77153482de5e668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfdfa952fc1c23de61400578e728f0aa
SHA1f501f20a5dbfad629a42bb3be2088aa4d27bbe88
SHA25626065569d192dd3bbc950f783dc10ba15d5cf8f344b4bb1b3637146cbc51f1d4
SHA5120421ad867bd3cde30be5d32b0e148d60e8e85e7c3023536e8e33f04a611814d8ab6c60f7163f4f4bc3c41e05e962ef3fbefad1d8e0e2f8c9785538afb74f8ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf1c48a0d891081fb07499e54a6cfbb8
SHA10b4a2482617e16a873d9784ba5da0498d3fd23b4
SHA256d22118c8c49dc3479b0165a81e2a4b3b4ad34963cd6cddac1b776cff9b47c9ad
SHA51243b2cb3c5a473fca922a3a1403d0f5b78dacc40c72bcb77d82c6fc58859d9c1bbf17e5af6f7c923236c6df40df6e91eab83d170d9722b7bc21017c6525eef34a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53acb0c28e941c588bdf2614628f6cadb
SHA19444ba7f8eec51b09e2d2ee22f8dde05d4908c6b
SHA256832ec562fac2f43541a2c5562964b6ae1bcebcea82a676aaa21d885154c3083d
SHA512ae2cfea7370aea038bc4b4e1f8b9f750e68c85571bb450d792b78d98b2fe729b59a5f95168265bb6d194db2b0b496077e157b66394263f327d6d5a2a8926f681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fa17815b074e516255de39dfb861a2c
SHA1b4ebb49203a3ee53cbe0cb0edcad16100428e37c
SHA256adaf5834456f140428cfbbdf5f14377facb1375e112ed545b1daa0ad3a1b8130
SHA512aad97f6ecfaf254d23f754d52383806d1d7956f4993ceca3beac11ed0632bfaf81512e8286638b06524790d6d79c6c1642021620677ffb3c632b9f6879edcf05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c35d364adaf5b152812519739ba58a96
SHA1b575da8bcc59ad3b0f9be1afedc2e0172529381c
SHA256988d4eaa31d68a8ab5b50b46ec41f45e2c21c5a91bbecba1124f55b8481528b1
SHA5124d5bc5c709297916a3ccc23efb1b0a9c54d3b910bf72a5095fbc9128df1b5b56c3b1d7033de2e8788d8f84f4552ecae715b614bf185631c97fc5c571159b13cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561e42bbbab1c4c6a1881f5546a34bdc6
SHA1ef2da8e524452ec9f49aec1e0a9983c935cba659
SHA256a22a5ae87f6de6fee7848b2bb1ff87d138d1ae0f1be9f46d721ab47c3695200c
SHA5121b31432203cce231119a16bee984ca7b659d1b5f315a0f0c0912870ba835a7b3068322ef11c6c3ee6f7aaffdebceb98e189530dc8e48c991d5cf8c0e2e5a686d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GLOK2QLQ\e[1].htm
Filesize47B
MD506b05ae9614bafae9b0b09cfbeed559e
SHA19b087683529b7b89a117b2d5cbb35a93e7dcbaca
SHA256a60692031ce09be66be89784e8b0214c0f8b6f52cd8fd6a36129a635ffe41ad2
SHA512f97936b6f3dc025fd55cd6a9bb59bfd3a58ca1d03e0fbe68bbb63e8a1875814fa8c367bda3b59029b549a5aef20abb5bfccd01cff1546ead70f6b07123be11da
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b