Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
72c2991acd636eb4bbe3cb2586fa15ec_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
72c2991acd636eb4bbe3cb2586fa15ec_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
72c2991acd636eb4bbe3cb2586fa15ec_JaffaCakes118.html
-
Size
44KB
-
MD5
72c2991acd636eb4bbe3cb2586fa15ec
-
SHA1
432f953e6fbfefa7902f405b8f3a2c43d4342d48
-
SHA256
4619007b2beb50c1375bcb150ba740ef6cc6e8114d8dc79e336213922dc8444f
-
SHA512
45596407f3b4685fece476be2f81a1844f96b450fc891cef13ae667cc72ddf5d954fa12696f15f487603b99ae9467ffe625dd6753d93647bf6c0bb19a9aba18d
-
SSDEEP
768:Zcd9QZBC7mOdM03pC5I9nC4Df9jjK6QPd:gQZBCCOdP0IxCyf9RQPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{27648DE1-4B10-11EF-A533-F296DB73ED53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30483cff1cdfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000602a5dd2fdd63d2048942f0605a4bfc478074340dda7d4a237f9479de626873e000000000e8000000002000020000000b1af5a16a58fb34c9f178d32dd2dee68fc415c6d63f564f87312e56d8397f0cd200000002e1b8beb3eff10bb4bc5d82a7fda4691357d1ff6e8836568523d8e6498cec31140000000dff1b3b02a57b9edea9aa987997bcd6d21627dfd51d0810a7f67a09ba3f3edeea50df7dd061d4a8727063ffe7c864fd6666d3889e6e6bee00ea8b5bb7520a079 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428133691" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2696 iexplore.exe 2696 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2776 2696 iexplore.exe 30 PID 2696 wrote to memory of 2776 2696 iexplore.exe 30 PID 2696 wrote to memory of 2776 2696 iexplore.exe 30 PID 2696 wrote to memory of 2776 2696 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\72c2991acd636eb4bbe3cb2586fa15ec_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9726f657834fa91e5533dc120c03041
SHA1c0e40d279d1132c678dc1ffe916ff6ad501cb639
SHA2561ce694590b4113aeb5df9073a88f0841e284c167bdac7c10780261e9ed822029
SHA51267004fdc70574612f092f24171b71ba4c1ec360457c32e1779e1547e566eb64890a8839e05b2665ccf04bd09dd0cb1d772ad42f298f077cdd6959f6afbdb4e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3e2e05ca5c5ffe544724a2002490dbb
SHA1a9292cf69aa94f1346ead007de38af99214abaa3
SHA256348551de9aa04b3f7250a4a4ba4e75a41dd341493521d0da43d01e9e36a9939c
SHA512a5cd07abb0d5220877af3eb3a6958a6206b0b584a8f74600f32a0799dd259c65529a029bea3430373917aabd5355fdcede3915794d24b0242bf761a1326867a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511f3f3a0d79f0ab8fd697d5a1083a3b7
SHA17d6388b984400faceef40b43b78092a7ff02ead9
SHA25623b5ab31ca8327a37538cd1e88174e11f44c59d5374995ed5c9b0edbdded88be
SHA512e60dbd1129e6a1e7895696f858bd98bbbd65b569ed242bac719a12c33eadb44c03426a8ce9deb8896390b40ef8252ea79b79b7b157dd4168829c117f511b21f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dee812b4955e6d583e7dd82c04da093d
SHA15dac447870656e7386eebb083bcef109da99a0ff
SHA2567be0b75e17854294d50088e9ad2c1dc842613da26c39466abb214bd3c23b6229
SHA5125104f52d679035ee45395835375d3454c402d8920520ce309d1fbcecc62003d5660c5f04f7f6fe19badc1b7aa06db73a2535d4ee45df7f71b4ede07811ebda5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfd3e5c0beb96151eb545ec6dd6f271c
SHA1d9f9220b2e631408dda4d3b084581c92368fa9fd
SHA256bab4ee4e35f29f5fff90f9422b7cfae5562a1a453e91b5d3d73df575d5061b28
SHA512f84c8e9d1608f72480f42daae8db2baeabe509b7c03378f3f194e178f6802dc1bb0326d1dbbe48d95163b69daa92b2bcfdc00d001962034136d20e6bebfd31ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540a11d53dbcdab20144fb85a3a879800
SHA15172ec4f49d4729588d6a98f6f914d78412b5446
SHA25655aefb8d6505e3747605e72493ac1b5aed1b2961355678484a51dc9967998262
SHA5123846faffa7009eba7a7d162fb4778ef9e19575f4b65373b4e2d9840589d2787930d8952d12aab0053367b2bb610bb2439afa5ac2c390b77a50eab79482032763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576ea64bf1c933b7d9cc02022ce0c13f1
SHA19f2f7651efb386682f561230df281940b96f8dcc
SHA25604c5773254a13bc327afa87cd42ce5f8a1ad84d93fb7308adfad981cc14ef040
SHA5121303888bc4af27b216146e1d1c5b4cd3100621bfa5dcd353a84c4bd3e53c8629fbf80c5d93ff9236604fb4a529bf4d4a31d0b9a7f285fceb3692d74960b2559b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542f92a60ae39ec5d641b802dccb11723
SHA18bace69b05d2a9597548663e41c01cf0770c11e3
SHA256e2ed16ffa028eea36a50903f6b42f5e74ccbd8da2e273ce7ff9e9c183196ade6
SHA5126ec24d981c2a5c5de074922e834580e7f719c9951c79d69c620408e8b3f9f4469394ab108514049d0d2875400ece772699c487cc0e89f77bef924cd6b6c9456f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582e8c58dc2bc92c62679dd6f7710f576
SHA1267950ace93d2cdc4d2748f445814cd312c21920
SHA256bcaa8a5b5efae7b5c417528f59255b3f72edf65b01e02ce10448b46f690c240f
SHA5123c90ac1aea565a1c281708a6cc730dc86605084de5c998373c0d140c61e2fe8e899b06e913c7dff14f8a0ffbd9277f1eb31a0968fb40416a975f1dfcf2699214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ced03ed5f065550541047dc3cf781dd
SHA12c116ae2cf35063ebbef5ae2d13e4850fbcd3dad
SHA2567f5366fcb835e2aa07b1a25bcfa118f513ab42b4cc4425a3e348af262d6d2752
SHA5121120d34dc45ce652acf19011d4430f744a25c5c6ec36d135b99f5cbee7c3e7ac905274a7b977f524f229c57c7ce2db9dd71ec596c4d4d21d3431d4f4a5a528ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fedccc33c2f12ca5eee70839a4450d7c
SHA14b6478b60da75edf0e2cb6f28041d40eb44086d0
SHA256a052caacd636d3e595adcbedc81f6e1fa0d4f2ff90a4ea106fabd83061549144
SHA51267f11dbac50ec8c90d7d343c93c01ed712d39dc90cd6b74ef758ebeb549ae4e5f439a3934214dc84554a49facedbac3a26959557fab988cee81f3d63a8c8ca44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548fe799b3bccc52279399f1cb0e0ba5c
SHA1a1a81ff3186654eddbab26ee942784a0489b48dc
SHA25622f91b5b6dbe205a459a2c54dd944e2d7d4d352c33e0197c1edc25aea37c8dcb
SHA512aa27a1e924b510914d7d4f88576828f39ab96a6444584d2b5dc7129ef7386b4ba8d9d2e4fa46a2587f179800a49c709bb828e7289355b2303a9bd26ff0555feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe1853959d3e3f34a043c14bfd428649
SHA1821ced0c868b94af935c55fdf9a461d2817a5c40
SHA2563f91b6018116a27d41a44ffdae2ad688f5c84b9a09007e8fd4c0b30008899f41
SHA51288d985dbfcb53597e18fada74c6ff0d4278a384fbb690c1288ff639d8aa4569057e52aa742e1e41f1de3902b46c484b0679867890106afe7899e8e41014f1300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578fc3da8cc645a60c0c4fae6118a84e1
SHA1c5972b346a228fac728e93d8aa1da7c2cd6bdb57
SHA256cd985387caed703113d89ebdb84c0d44bcc5aaf2bb09c2246ee87872be63672b
SHA512662307c0e597f500321ec33e824e58c6c8a04e8f4f9fa6b2d8fbcb2f3dc3acf16e1fc4642c43a00f0f43a913e7fc46376b2572b81503262ebfefffb3c457fc44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be80802da4b419f5a1c43b8c62cd175
SHA10ba1ac8b49f206a17686b2458685a4f172d5bd8a
SHA2564fa31b964dfd0fca06f8efee4ad75c9a13996e0ac17e187439edede6fbe7eb38
SHA512d666024dae49299cc6e6ba327720fea087510614073d3c63884c476addd9ad39dca19c961e43c96ef3f5d68ee05909e93857fa671bb22f522bf79a431c2bbf73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58da55a638caf9497638bfe746ce66bab
SHA11bd8060a9a263d16d37757ede54d396ba7b3b824
SHA25669d6472072e8fb37adebaaaa5d01573b1aece6ebc000068fc7258bb8fde10022
SHA512ca78779f3daeb579b886238f93ffbdc24d4b7232991d3e5383b92e37fcefc7e09ab51f39d8eec2c8487a64cb898074056e56d16290c7e8dd2e3ec8e42350fd32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bbf3c96a28221703b1760f6f4cef327
SHA13ed1bce442898c7501b3a6dadc9c3455d2d8b2be
SHA256e4907556c1e32ba758d823e2f6aa5de1b17e1cb55723c76ff8bc30b8725cdf7e
SHA51213a24cf93420735701466f5dcb52e9c0f11d23fd9df9a59a17b60cf47d2358cf0e2ac439cb498e9477c2aefc46ec26c46006c2b4d89971447191d259958913c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e76523a845f93b108292994e270723d
SHA1662b3f8a228b46824259ed21f91e891b74d88a53
SHA256952ff065f6baa1844f57df37169b7680da84fd6f5616288ec4e0f0822a361f68
SHA512705d8929879013eac084f86a08b9d9a26c0d40b4cf16cf968ec5f21da8dc8784388c01b0f24fe6243854bf82d71c8268e4ad8eeaca5a781fc04b79719e49e8f5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b