Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 03:03
Static task
static1
Behavioral task
behavioral1
Sample
725bab176761e5ac6997fb5f8be7a912_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
725bab176761e5ac6997fb5f8be7a912_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
725bab176761e5ac6997fb5f8be7a912_JaffaCakes118.html
-
Size
54KB
-
MD5
725bab176761e5ac6997fb5f8be7a912
-
SHA1
78192f99ceeb4d4745f3250a64be4db6f1c8ebe9
-
SHA256
3ee6285bebda65d53bf4b1c5d9fd158db127db7e2c59cd4f984052c15867809a
-
SHA512
7510fa9ab14bab3d3943454cb5f2ab7e961aea71d5004e14209c27638d3ec3de72bfd0cc4ae4c33b120c77c5a389bacae39398b8224eeb90a4159db12db27458
-
SSDEEP
1536:6qxAWMG6IuRK7443EVF1tNwSlWEybI2T4W1:XxAWMGD8VF2SlWEybI2T4W1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000001b4f63741d9319ebc8eb7dd6145d7a8d1df42ce43920cb219785da99d1203eb0000000000e80000000020000200000000fda5a84d946a95d33d9d77a9ded1d41232295fe4ffa8926b1cf1c09d8006c8b200000009f9d6fe53575086bcf78622ff509cbb1fab33c18bfb65d6b9f8cf391be1b2e1c400000004e3cb53f05a7aaeee98774696bd50a4345c97738b52fefbb245691afc8d12db354ac902137b11c51f89c43260115978fb02c7808fd8ddef88cfb01cb0fe8447f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D559EBD1-4B00-11EF-A39A-6AF53BBB81F8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428127110" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00e21aad0ddfda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 264 iexplore.exe 264 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 264 wrote to memory of 2148 264 iexplore.exe 30 PID 264 wrote to memory of 2148 264 iexplore.exe 30 PID 264 wrote to memory of 2148 264 iexplore.exe 30 PID 264 wrote to memory of 2148 264 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\725bab176761e5ac6997fb5f8be7a912_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:264 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d76536c1933d195d9e0deadda12b0fdc
SHA1f4b9c813a898335cf46a02c976c236f5c01818b6
SHA25603c05cde5e0e2676e3e25721adf12b88bb48b1e23b29f3e16a4ee1e1e4fa284b
SHA512352cd29b7228af36fb842dd1567285af25357dce432b56f7b6df05cb6e717398967cf8bced79e4055b5279fda611705b0959c3b37d829131c8f1e96d6a91223d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50832766dae0b767bfb950883aac7867b
SHA13d83ba40a7b09935429abcf89e9f8590f8015b8d
SHA2562ab78d0edf8e621dba9d8833c2388a7b0cdad9ac47a835075ee272ab28d863c7
SHA5125a2386b9efbd3d60d00430e4dde4b56d21a2205cc68e777900dfba4c6ca2175b765bfeb680a7f9dda87ba34624ee274576c391a0895bf5b9bf060f514fc2330d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fd07323b66d45360d8683c2c1ee0ec4
SHA13f062a68d2e39c2acd0866a456c53982e2321a27
SHA256eea283845b3ab4d9372ee662a9d065307e902c9e2aa8829cc51dec7b2e2e9065
SHA512a72007e5d342deee758fc91035b3abf472b8cea25c8240e8d72c863f0ccf8b399a6f2cf2d7a920b9c880fe06e672ce1e9a4097df10ae95da8781f5073285a01f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e58a7edc8a28189e566021cfa31cd49
SHA1d3fcac6528e91fcc2cfaea0f285f9640137b3148
SHA256ba843be2d96ffbadb813ed791e7464c55ce75708e1faa78afe76c9227c6a8ff4
SHA5121e22ab9c8b686e74ecd13583d09dc452fbdc83b1cbfdbd1ac8c9292fbf45313e2569f9e1eaba5cbbf9b4fe78cf0aa55b28380b554fe79929be868992219d8fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c124ec1d1b2ae6edc39abdcfa27e3a4
SHA1d8c0c2041e5a6f0d9c72f06fe2e9e3ad9c9d6cac
SHA256af573d63f1ae449f79adeec526509c7ecaf32d04971b0f3704d306c7cbdc131a
SHA51288f95cffd33abbb0f0c1b6b8fcf82cf44c85864c05be99c2c32dc602e5996c1b40be3e2ad86b75073068e6b1672edb76289a72d7fa233c525ee95e53fd0b33f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d97c868da9d50d6d865cecfc8e46b29
SHA1666924f6bd92248c44666400f8043182dd61e0dd
SHA2563c69cf6ba22789dbcf22cb9d35fcef384172a619b227f79f04fa802611f546bb
SHA512f076a3269af1c5d3fbd01974948f36278a125c292b0103ea1a6fcaebca15d60fc3cd71643a769d797c14c34d5d1133f508660348ed328e8d4a7039419e5eec9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ba162a1da8fc98c55d9d3824c077545
SHA1c167b3e76157b88281d09c06f2b5b2a2ec02ca99
SHA256309af6616b8a66002be5db11f41f4a65d82066010daeed69b29c30603a7bb367
SHA5127e8b7bb1bfb4672850a6a93d79fac7924695d911a174d0018ffda97dec82ca245bf77b56cd1d3587c41232c63d2c438a8c0a8d3b2512959aa1b97041a9d8cae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500db53335c793c600eb7cc8926b3025b
SHA1030f3a4b27a113651608cd74e0da6ffee71b42d3
SHA256bfd6a1fc3e3ae82938a4f86f0df0047411da47b4b037bc5332c0d248c5146fc0
SHA512d7dd85171e7be25d74ed838ad9e81107b87f1027b85619e844e64b3a4c955c83e54d5c40845ab908a3891673a5f5467e7ab4f694af99238dabbcb0cc8cab3861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585841e33c996d49983b6cb360733170b
SHA15397242dbb3744f0b049ddcd2694228ae5799a58
SHA25645add1be0d6a8da0f059d6acb4cc82d5c0f9dff7fac0e0953a995ad53e8c8ddf
SHA5123718d137c6ed92b293740f9a7df545d814bad5c230d05d437250edcd16e85314fdf9dfd2d8397413dce00b6d502aac843a1202223cb035be48f520ba78de9bb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fecbbb48fcc8a712dfb09aa761ecc42
SHA1f25b9b7acf41f985356d0f61f1400339329d5cfe
SHA2562735c6ff0afecd9880f6c13e61f20c80509a5993e88fc287ab64b4dd99b45a63
SHA512f4bc55ccf330d1e08b92183167e37c0e273d93a1b0ae3cafa37f47da5db96fce563fe49186ad5d636da0beb99cc45ac58807712440c122dccf8884c8231ad9e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fca5fe699791227a040590afdb010ee
SHA184551571123411dcc97a1165f3bf30b12cdc9d18
SHA256370817a456df7cf2bf85fc44fb8f73fef68a6266fe708238d57f78e83f37438e
SHA512a747f2d675c370c9956f0f1b5ef39458b27e93292f9c2adb6925890e75860fc09455996f6c0e1379395acaf2906096b6220374f7499af004dd6dcd6f9d9c7fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5228737351b5fc66729b04e2b2ab7fa58
SHA1aedeb091019b46301381d1f09bc5555be63bdee0
SHA2568c8d53ded36e3001ee20ba147e41973dac0a00a5b2482b9b5d278c929deef382
SHA512f41ede6efa8f47e724c91f4eda3b46e2a85bf0a089f93383639372ab46253eea0c78fea43e9de7f8aa552f948811fb6ad208e8e17f904acf8b592fd7ac3fea7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a70e2b70a4f2ea858ab14aac2390077
SHA17c286b22fb6f59614a81c76aeaf207c3be9f8c4c
SHA256a962a98a7b4810c4c1f44e9a3b7a93e402e3b115f41dbca5eda783abc27a0ce6
SHA512f7f0d09f742ba88125e93959de42458172d260194a168727751a55b026e6b9b4db9a67ebed3ff6be2f8bb538ccc1a11fd878e432a42b3c08326e89e888471ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a5cf90e2c0c41b6665430e8c433073a
SHA17806a291d8e1e79bd6adae3c0d20c4010fedafc8
SHA256b17fa52b8b3e305d15bdd84bf9f2f7a5c969f7abce0015b0b7a2e885c2581286
SHA5120b4be53c03fc5398960bf22fec08094c707ebe4190d305effdf024168067b99ba4669eaeefd8be418d5eeb8fcf468d7fc2ef7bfbf4cdc8450cff1d9a8b0e8dcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adca9b70d3ea1478e75c03b08262bfa9
SHA134f947c7bee6b8980e63cee84debd2a031312ac0
SHA256c2805dc63099b5ec2c942635b79244880eeb58b71ce1b4687ae52c8221d9dcee
SHA51289bcefc6631abda44092c50808de0839a52ddd26ee9f0d575a7e7e8aa68ba0ca3074e933ffe343f25c144aa0429cee9705a8c045419bc2bab0c14c246b5c2ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04db9799378b80968bb9fe2828e4e3e
SHA113ab29319e0e2196a33ba1afe35c69146e9ab7f1
SHA2564f1044c4f67a6d76f29f861ab3a1b6ea0d8f604401f8e49a09bef524b551ac6c
SHA5122b76d185f6675e8abf168437a546de58e75cbb1c196d34c3bc7d3940c724b6dd6e2e7884f976ed52273813bb5d371bfc532ed2f30c7e1b3f478b21dd18d0a6db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7765a300d70d4f734c7c8d962f5f86e
SHA15c07987a2fb6cbf3b482df7a5210d497c95db894
SHA2562e7394ce7d111c9d2018e4380e7531f54b172756ed1e7240a671a939024598ba
SHA5127ce22494d86d60ad4985ec439d634ca5639d06a72e9fe80f947d66fb6c5ecd2f2b1dd9bd5ba4e09badeb962a225bc98d9aaddb97458ed475c7088cac07ef0ccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef24c3660f02888b71f9077532428034
SHA1af38040d05197c90fe5de5cbed5265fdf43f4606
SHA25652d3ee81a840587448104b1a18bc776c9248b91c54c5e29af409132ca08e640f
SHA512de4ecaf81726bb3201672e0b7797918f527ac31fcf15a2b5885c1d6af0bdadaf94cddf6204b741068a50f602372dca582507b7570d274346e082356cba91c749
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b