Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 17:44
Static task
static1
Behavioral task
behavioral1
Sample
709b2530bd55587f9fb138ab8e452b6c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
709b2530bd55587f9fb138ab8e452b6c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
709b2530bd55587f9fb138ab8e452b6c_JaffaCakes118.html
-
Size
108KB
-
MD5
709b2530bd55587f9fb138ab8e452b6c
-
SHA1
90d16bcf4d6d0fed68b6124a20712010f73771d9
-
SHA256
d0fbaf37c7a32193aaab2f2fa132df60196b6132ec8829e85e6e2a3970852c6a
-
SHA512
60ae4d0ce3e603155d1b98306559d020a3b061d33414ad8d80dfe6bde505fe9f222e818b293bf2d8b04bd1491048f1de293b8fd7b741606dd7975c054662de53
-
SSDEEP
1536:fjOrm46BGax6FQ4mfYZLPciaf5GdDk+Uevc1sVIWlonFnZspee2u6fq9kHXl3TQy:eJW/fqhiyyOsVjQOnQidn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 500f1119bbdeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E1BE201-4AAE-11EF-B8B4-D6FE44FD4752} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000007061ac072e5cd228d55e1ed0694692b1c3118ce1c41cb3688c7a472f2f943e68000000000e8000000002000020000000286038077a501b76b748315a7754e814a7737a45080884819c66d17245df32ab20000000a3172e028a118df647b570e9722891c5f0097186a479d1c2cb6f38ed5edf2ccb40000000e27bd484b9c0bcd1670e82073e89bf607b5b1d8aaf8994b0b14542a8051b27ff2b619294b7e3f77e908f43da9165476dc6fad1a0043d5493e3d53e0dc66ef4aa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428091557" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2732 iexplore.exe 2732 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2704 2732 iexplore.exe 29 PID 2732 wrote to memory of 2704 2732 iexplore.exe 29 PID 2732 wrote to memory of 2704 2732 iexplore.exe 29 PID 2732 wrote to memory of 2704 2732 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\709b2530bd55587f9fb138ab8e452b6c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50746fb1e6fd891b7064693e9d8a74918
SHA124339d6daff3ee8c5a026f63dec9143607fc1d6c
SHA256636657ea43bc8e6402cf020479211fe881cebea2a0ccf2514d238dd55b6e5795
SHA512f5f6b037cd57daac7d429af8b2701418c7d369ed769657a920b8a1cc696f9059401d5095f19b695a81314fda178931e6e559acf6f2bd665c4f14c7a9d00e6482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571ffdee8a841fc5b41b6799cfe1289ce
SHA15f109c0f4aa349f2ef669a197d15a054d10806f8
SHA2564405be182f97a6fec0752a352d283ef176f0597e6bfdb6985aedbe3ce1604469
SHA512d5b18ea345aa24bea5d5d50530a11d8826b51cf773f2e030ce4cedd0e2f6c3a258f469da75ef18deafad877f969cfc6f025db3f4191a86de381d5bfa6f91c226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50145869100d02385132b11193e953b94
SHA1dd6e465057ac59d1753171eed8fc377f9f1c4ae0
SHA256c670c3f2a688b607de5affd21e3bf4866c355e00033b6a1b515cd8dba89d879c
SHA5127ee691855c467bfd90650437d8569e1ab0b78af770e39cf659f294e84ca2b6131648b918f07f7cc322cee816ed461c412eb7027dfe899824e8e32a5f6b665741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5017464982346411d94bc0cf1a5b704a3
SHA1602dd23d231a0ea8d7ce2e33e5432b2beaccb96f
SHA256cecfe0add3e0c6d55a6ab3c90b3ef83c4641feff6faec4c4b094845c31a67430
SHA51273fb6c614aff24b95763d26aa9d9da875405d38ca31da76e2acb1faa920811ad11694c44137a9cd98b5dc4cfd7f1e3f12c57645b5576b83ca71a06ebb5299f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db9a87c79756d5116a8227ec1c115e86
SHA169187cc02e41d195525c2b33262bf1cb26c447b7
SHA2562896ded051a768bc8ed5988bdc862d6f1fccc88cbe029acf407d78af25d55485
SHA51297918915a75c6d239104ca374b5efef5ffe3dc9c4cd1b0aaf1e70fdd5276f822abb5c6e6acd81caf66d38029fe86c40f1efd103f37a4b65941eaec0fa5537503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcc2ace1ab5f9c93375bf6deb7d20793
SHA15f5243ba25af6ac49060a7cf67ec1194b434a21b
SHA25606bba83d5fadb5ddb19ae1a515f667045b0e4b25332f3978c188ae0eeec4b680
SHA5120ab6d8e81d75671838bb4824e59fa74755990785ec311ac949b86e03490b4c460a0c425ecde27cbcafd5907531f1b6684e23b99be98d36d5322cf42ff50bc60b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54abb3544e4d046ab8dd29ea5201e0575
SHA1d38930ff49072b93440db27ba1ac3beaf42ab1b3
SHA256fda8d81dc7e9dfbf35d5e6d5ea81944a292465b9af21ccd4a11d5e20310b1909
SHA51278e275313fa5945089e53f869a9976ec4576373c8f2b67a1ffd58a178fbc1f53066ca1c82666477665e71f2cd2b86b61e7d54790079c54701929ac54a4bcad7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54272c9e588f3afd2ffb7732da61eade4
SHA11cef4cfa895d86d0130d72ca21d0391ecdb7dde1
SHA2568a7cd95a5c86feff41a3838763d82aec5665224c1d0f28da289bced8efa6a1ee
SHA5125621810ba9e81e38b15811a9ce238cb39097a5eae3bcdbec52a7ccb7ed2af2e2c9b1ca518ad7c31231fc4291d90816e74f6968e6e105a14177e57229d7cdc14d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533e48cdc0cf0585c286b6bcaad5119f3
SHA196094b72c4157b7732829e2dced71456fb58ff43
SHA25673944120fff66261013214598d563977b483559544485a95f0a02e9d2194907d
SHA5123500c4bc97eade2db709974a0f5f17764e052abe792cc8c27d352d75bea75d59b133a1917711c1f696e611a65a576992c551da5f60db75824084e2c7129fb987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54970f71ea3cd386e1c87fbfc9c5f63ac
SHA17371823388b43263503b9c9b29916ecb73e1ceb0
SHA2568ea7b9ea9b3b59c1b59dab8d7492dbfb85d61ef8300fcee6122a7604cfd1c74e
SHA5121d2b7a95399769fb636ee0dfe96b0ccf070932eb2152ff5d441fcbad34f1adbdef79babbd4f9d37f894fc9a6d2faef5485528d9375e33775562d7937d670bbaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b87ea4cbd55c011564ece54ee0caecb8
SHA150c639b0ac0ca430d76e26deae1bc99c69ccdf4c
SHA2566bcc4c514309961c798046f798fa385aeb59555fae51128ef99527d5db0475ab
SHA5126995767971d2b1710b7c39cfe467fff4684847499dd587a199bfdcd9995c966181079b888906b40e4de214e34b74de6b5c937c3f4b64ef5d1148704a60f71b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e778e6b78ff3c0c555047dc3f8934e3
SHA11598c0d0ea8ef594fcd847b9f5930311b3386a16
SHA256ef372d9e54f2eb9af6e43ce9535e6accb89b144e6ffb135db212dd4359078974
SHA512e6339fddf7ccfa89a244b7634bc170249355b549a84be8e5ec295e0da8eeb1de9848c35ce7a668f595e1023624b430975951fefcdd10cf3cc1bdd9ac220be999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535c53268eb299e71ca536091c7cead29
SHA1d4df8ed46f771fb694ba4882b7ebd089ea110f9d
SHA25604df1f71eb009e446eca6b1cf6a06dc2afc076c0b2ebd42fb33bcfeb3d203dec
SHA5121383ccb7eb2702b61a3c092a3300bf3d97d6028beaa038ab454317d7fff360fbc73aa198465698f44e1846e75a10f242a28cdc0a1ed947cb3376f141274a8fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c50e532a64b3e5886cfd71fd4a7b03b
SHA15692f33fdf7265d22b95211c6b4da60af1b777a7
SHA25607392207afb1acac4364f12e0a22091550645b06408269f935009020caba3ecc
SHA5126e0521faf16a24c065c6f4404ea611b990f9388821b69929a65c716bf20292c0a093f870faf23fd7ea6083b29725ab7d5bf1da91b504d31745f39188849996a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c63f5edc36001c52c8a43e97a566cdd0
SHA1e15ceffd1a5bbdcdaa69be6376f1783b796fea81
SHA256c1bee06d1acb5f84c320d9a2bfc13094a4c1a8c9dae2145a91097a661ebf69a5
SHA512548b1786cf8e2a1b2bde269d6194b8417a774f83e9c961e52149296263b921134b563710db852bf2a758e0d4c5198228c49f65c7f172ea598125a87cc54f519b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5184ca5032116271aaacd6b6489ee1662
SHA14b52c8ec003b8d3a086bac2bb765cd40126d32ab
SHA2563f68223a8d84c3db6caa83ec94fb4a3121c62e9dd24630d95b2d821871a32016
SHA51245ee6732c8dc93e2bca359a714d4ca4a6dc74efa242849614ae4c871f42e99a9161c8fa3d21aa65380cce64a307e957c45282c6bb869432565ee9c8cc790b8ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f2e66d1abdddbd36b858f0086613746
SHA1b07588e01bcd937648b53e064c62914130c0a5b9
SHA256d9ef07f4a9129c8576b5d7e9229cc5214d4ce91b6d0b67087834792156bf0e1b
SHA512ec39cd1fa421e3c17644fbc399654bc5cc2826832b6154dad1e01d63d657cd74ff1e0d552aee6f38de77784e02bd04243ab9db94d3322aaa41aa0870b848c501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e53d56643e4e00a92a0b4449a7db625c
SHA1692686ec15285b6dfa15eb14f9a57b3b30680714
SHA2561826d1f02ae20c93d97237b4eb7c8aa285afd214dc121257a423a8179d894abf
SHA512f190ab31a762470996334d3bfb376e9e4eb6804fb137cea2a46d6189a623b4e3f0124e4590b71b87d5a7905bfbaeb1556bbb41ca0df1b638f87fe31149b2346c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD58833c99ac8a14e8c1e127d81998d303d
SHA126b198ecca4ccca452329a60a48ba8d3815dca59
SHA2563c5f32c8d0105bbe8c008e45022c773625ee0ee6c158cd456df4d32b3ca69ed2
SHA512068b495147c662be3d26c5b43c9aac9657cfcff4c9a4d3fde72e1f26ff9279412dbd2eff8bdab2e465fceaeb1137924d17207813f4176ec0bcb46045992d894c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b