Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
726d539fc5c3006c8c4b1713172acc0a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
726d539fc5c3006c8c4b1713172acc0a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
726d539fc5c3006c8c4b1713172acc0a_JaffaCakes118.html
-
Size
2KB
-
MD5
726d539fc5c3006c8c4b1713172acc0a
-
SHA1
266e19154ae753981069f9741b6084fc16c421f8
-
SHA256
aad6a7dd36a03cb07a5bb76be0a844847d237e899b0ca7d65e5698ef0452072d
-
SHA512
77b487a88d784cf2e7cf9803258eace628d0b5e4be820a565311acf531759d3c247b062929655b3ac9adef0726c256ef1fa98b499c9f7b0ef7d7b2788d4d6f59
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0051ad8411dfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000c0ab0fe42b9022e912f8e61d2b3811c73ef86fe781282e48b491ce249961c559000000000e8000000002000020000000e6f970aa4b9fc52022d0636c51652db4b0039f330c5f9fe3d19121c5c872e6f9200000007e6b30009a685e984542aa6603d8489b49e5c15c44610fa85ff873b6908ffb094000000063fc85bc196fc06c3bbd44f7c9704eb61683332993a4eec0c2b2f46ea09d080f03bcb75f1f9c1d65480fcc36dc1120dfe574b7b49c984d376128a917bce7b283 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE0796A1-4B04-11EF-8E00-526249468C57} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428128762" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2436 1720 iexplore.exe 30 PID 1720 wrote to memory of 2436 1720 iexplore.exe 30 PID 1720 wrote to memory of 2436 1720 iexplore.exe 30 PID 1720 wrote to memory of 2436 1720 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\726d539fc5c3006c8c4b1713172acc0a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b13474efe7b6f675ec22b30a7cdb2852
SHA1cab54633c2f171256c0fba8e2e168e715538cb99
SHA2566bd6f5fbb8f39e2e5896089bc00fd4318d2fa38806eb13ffad76fdda7f651d45
SHA5123e8e1bb168425502b048e3069e8a5b37be892b7119e23f8ac259fd55e731d26fd57bd0b3528ddf07f03d3e923b82e04ce402215bc4d0e6db8d27c8254038ad1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD516a56da6fc78b4efbf206bb669d99055
SHA122c523dd57b2c6f43515e669748c4761ab73f399
SHA25610374a9fc028c43a3aecb23a41c9d2af4dc093041760abef00b407368286b123
SHA5121de5ee9fb3ca5a4b9a71dc492be0318d8f09f4a132ca9b71a9493628435a3c77a92c62eb3d628999e3c8f6004249444f5e68ff09c73c6bf2935328ba073636ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ba09fe3fcb297fc79c50b0af158a5a31
SHA19d6d19d3faec9c70585a87683f07d20f19e5efb3
SHA2562e02a628ace8cfaee399ee5b2217b212682ae327fb43352a604ae6428605d799
SHA512e1e1b62bde1ada77e9b0b53136395c8ff5660c5e76cebef6c5a1c532bc4354b18c3690ee183afb43cb501037e588d37cf8c8051c9721c8e5838a96ea8c46010b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5184ebf356de4b7a5e25a1eef582a0ff4
SHA1ad492de53f752f52ea498349360f29a69495f9fb
SHA256615d765808d298860c8734f6ac6ff6111be9eab04087144d605d95fd40aca2d6
SHA5123eb2cf7c8e37aa938d0dd1c68ee9254056c0a27ec0c71fea69db6e8a21ed72b237638800ba1ba1aca2ceba26b4519379db70cb78b12f1dcf0293d90cef9bbb68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51ac942ab08fae8d1559ecda58b605a7e
SHA1cce6a87f3c0b8d25e89b53a0a53c473a4ac0db76
SHA256d012db90746a2d7115ec470751a577cb6563ad884d2437442fca2b975ec6b762
SHA5123c84b550199708ec8a9f3f0b74b3d7e04b62b035e53ff10d142538a2e280d3ec82f64b7e343892e5ff527012170c8e2c9cf24185667c81286abfccd2827005ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ad657d5acf193cc33abd25a0ec8771eb
SHA105d0a2c98ae96ab6f1c21039e5d3201af5982ff4
SHA256391488599a4fb9a2d164ca941dd1ed14257d772a98a690101c2f159a07e04548
SHA51277f38d2b0d5dfabeb3054d7f6e07d060b3cb6e00c94c4e2442f812805947e5447fc263423ab7fcdd17a77f393433a2c378b3d4abccfe62a29251d46a520f825c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ffb18092827543ebb9be45e19ca2221c
SHA1d5f540a90bc76eb73013465bed98c6fd7aeca7c3
SHA25681736145975ff02708cfedfb1a2b911936eeba1cb8da0fb5836a0de41f764b8d
SHA5129aeb54cf81b32deaaf88ba3b61600157f430a269164b07321b6db1e5219469198eac1a07da0973ca511a885f3e01d3e8687c35c95b07a99fb4042006d87ad17f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5888f4ea1c998a3f9209129169c583f4a
SHA177cd06c2c6611696e72343d024d2c3232e453f19
SHA256b0e5009ce144b82871df383d5c27d90b31c5f241acda9f1401002b006ecf72f9
SHA512bcd74aae950f46fd6dc9e0c6a520d1008b41be7cfc8ba9daa4d68db3452afbb79dd10cd1703e89a8462676e9322b695f47b92317c9da9a9b1d6c5b0b8aa0e047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e63e735570081685c422710efeb16fbe
SHA1af696cba32202db93bcc5a50dad114ad1929c2a2
SHA2567d31443ad96b055c89988d1904633ffcf6aecb21b6019ecfc5ee2fd4adf6970c
SHA5121bf7f28e9acba037b6f92f4a28d0f4c979f22c315593934e6a7f98841b7af927a99564432946a02446e378cf96c41a15599ea00b4ce8e02dc76506b6b6c72961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f3182b3c6504898a37bae7c6d0291ac1
SHA173aa2311fbbf1f3d64d7adf4d16dd545d55fa957
SHA2561902f487e5f3cd19894f6c0476fe7e242930517abb341cdcc5e571099da1d98f
SHA512e4bbc6a4ac226c2c8163fba3ff5252f06a0c6daecfc624cd8eef891c0a712e343aec20af2d80d564706411025199e7838b2098a2ff5f2dea8686add5441f3f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5566c0102bb936f3952ccf4ffa359e5a0
SHA1fad3af8b1264a5808fd06c887396a58f05cc3928
SHA256b956077259ae111f6ae6ee8edaeb2bbb1d1802bc820cc9ec9aedb2b95591b0f6
SHA5124571034c414065d610c96cc099c02f95befdce12a585a45a4c4d13a5ffb607e01653e9148d7c32865a6b54b08a0c453b529a908c57f5dada4a68265dce7297d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5093f53412fc802a456899c34366da711
SHA117526f05d2062d448650a8922b700807d9131829
SHA256191f1bf353240704801fb609540cc9e852188853c56ce9d0ce3a378170b68bc6
SHA512d1bb2232281b300e8490ce526388a247e798760231039d902c4dddbf9feed05d489ddf0356cfc44f6c39630ce6576f6433f2259a4bd86e6d002494e96c403960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5faa47f27ec26d43821ec9ca73725f864
SHA14820556bf1b329d41d20dabdccc139713d2756c2
SHA256d8ef20152e1faf06f99a17d68587f724b73861abc2d356f16bcef32107faacd2
SHA512a926e817fb98d9c2d6fe35553409016bc9671f7d56148ccd9ebc3abd68c8c19c41757f94514d79cc614e83dcd4fefd859154da7d3f1f296f65f50e2c0e6f036b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54d3ba745eb7c7382c94e34b61748b58f
SHA1bc6917956a101adfe3859c63703b715712d6ba9d
SHA256d97a50bcd505c27a91c8a3d1df902ecce11383443abcc0e511d64a7d91fc29be
SHA512006c45be8cd9e3edb7596287efc9300118f8ac5b2cc2d0ebb03fa40b0a5f26548b8062861041cbd471c588c415cdd58072df8642083af8a681f0f678881a8697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53618f5a31bee2479bc8ee95057dfddf6
SHA17f1d8bbdd945747b17476af2235a4b251c3ae246
SHA256f2dde1524f011c992e95e6cd5af03027863f3f765ce70d6afbd6c3d798b0e66e
SHA5124d0710a1f2e1a09513b9fc031f87ec913ead8d7dd6bb281dfe9bad2276eda5e3016681130efc80358b47986b054f88bec2282d7cf68868c1a33502e6d4162261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD541777678383b3aad10e188da586b4c42
SHA11fdabb84e04a73748503c9a865e22b3e1aeaeae9
SHA256e758a980e53cbbcb49d6dfcf8b9879542bbc521cdae332c860b5af101cfb3ddb
SHA5126c071d4ced8a8608f5dd733a72451a5aef4555a6e22733c8f6135b7a0360c16d77faa5b4708fd1d6c3daa487d1c5ce0be7038a5a5aca78b9af9de33e048e90f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5acc26782d934462bac966fbf318f45dc
SHA1ec2ddedaded15b82ef147ce4ac6b53a6caaa420a
SHA256fc50b8fc9c4f0e9c82b96e01ccadffd6ad821b6fe4ce8c915c54d93e0381e122
SHA5126a39e70c7c25f769f52290cf61ea4ef606546b3868caa76ae399c06e9d439e7f37d84522d1c8032abd99a10f45b2c38906b665ddf546825c036842f43282b955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a1d166e7d9988df540c92a679d69ab85
SHA1213d191d0fff02d43a39075200059360ee4307c8
SHA256c2c28dd2322aa61504098bdfb317939ad93725e62e9467d6b23f7cb36eeb6690
SHA51243f52ed003b39f22403f0559104d6e330b0645a07a7be673cb4018e4cd3b3a4b984bc23cabf44c1abc611aa0f06db2dba48a808bc1bbbb7042a83fbc04d3fe0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56c68064f8a933f9554d5cbd22fa1d5f0
SHA1d6e7f487a8fa0f863b7a9b80be730f174b8efebe
SHA256676a1d204b7a75bed2d136fa952e29d9299d19225cfe7c727ebd996d71d262a0
SHA5125fbaaa53acf42ee348fd974c37ed76d3ba81260b8256e211577b47d7570b7d22e0c5888d05c041965e596820fc62f7c104436cfdaf47e39a0e60bc9843aa7067
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b