Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
72c58b9aa274020fa5d23162ad9d2044_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
72c58b9aa274020fa5d23162ad9d2044_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
72c58b9aa274020fa5d23162ad9d2044_JaffaCakes118.html
-
Size
90KB
-
MD5
72c58b9aa274020fa5d23162ad9d2044
-
SHA1
82c39e098c446c58a226b607f82b58ce0f04ac23
-
SHA256
81154a55e5adaad39bd2a1bc145707b9e789877acc70ee296de25d012a07c920
-
SHA512
233b4bf2d630fe20919333210c1d39387f17447b0e2aa0c886c29b3a7e13cf892bd177aeee3aa658335a71d92202982b109486fcda6d8b023e040d2c87b4ca54
-
SSDEEP
768:X4UFvJMbBrzTFHIYCS1I4XrO0dY/YrMBHdziWq11KiHrZtFoHGYuyJcWcua5+FL4:ZFvohI2drOninRyBSHuxRGmXXpMd1Bv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000891953c82925d6069f1304f899bd0eceb5c96cc3b18dfabe92788bedb45e7350000000000e800000000200002000000093a947d870449852df78d2e417f3add4e94292a5a646fdd5e1d44b9b7aee15d92000000041c1a46ad9f792374543a6e0099567b79b4834267557eccd8121ae77846a2aa240000000f8deb077e0c352bd9a8b3232204f7c22af979665d50ce0fadfbf0694945f1d83668b77480f99d104f5722d8f98f56480a50a23af1cb5684d05a5ae9cbeb88f83 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 009eab911ddfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BC6F7621-4B10-11EF-A251-667598992E52} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428133941" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2824 1948 iexplore.exe 30 PID 1948 wrote to memory of 2824 1948 iexplore.exe 30 PID 1948 wrote to memory of 2824 1948 iexplore.exe 30 PID 1948 wrote to memory of 2824 1948 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\72c58b9aa274020fa5d23162ad9d2044_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee55ccb595f1bbac5cf0102d12b3e995
SHA17c833c6eb6e5fd57b80257cb8d18fa9e744bc5a8
SHA256554cbbe947e54d513950401f0684391056245733e3f6437ea80ac54d485e6f9c
SHA5128394fcda5d6d3b5fb69792027563b6b6afd4a183f3bf5b7c0d793534a3162f81323cb4c62fb87146aff68e85cf80ec8191c721e7558168387d495b794b47c4a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0f33b810799ef7ca6612d75b2b8f4ef
SHA1b2a4de78182514097e8079786f5a158817cb2cc3
SHA256a86be76462fed4364f5de973d58ac2e5c3a5d207c554a60a06dca4f176f0db97
SHA512698485656d9c5156e4fe481b1fc2ed5246c5ae0edfb7b212f66bd3ddf7ed05c2356bd06a5d9b647626b8d06ea27dc60f1bdc6c91e910564bab62c086e232bfae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7feeeefb6f398c8397d161a9dce5a24
SHA1a74cdacfcb0d8956c7710e95fa0dc44505ec4eb8
SHA256bbd3176f062d08fbd24f1e459d9305682845aa28c25c7e0110c28e666dd224d0
SHA5123206fa2e819347c40c8a095ff85f1d85ff4ab6872fe7c61a8c5b19258bacc4a3d3a1779aae967e688be68d2df6068b2bc4aaf4237b32987b6ff6f75fcf543d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cafff2b02bedf8379a4ddb838063a740
SHA1561944f5c02b8d5732f593f0f906830b2b0b0c42
SHA256b2edaa3d15e3c3d341985acf3508dfcd41bb6c30514b361ebb600a525ba7819e
SHA512eb565d0fd2050189bc0497f7b23c58cb38e2aaf4fc956e5db1d230e8e925b363914a3bc691773d12b839ccaee4986fb6902c7abf227639c3ce4bba047e293ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e878d53cb820a0b3279ec0270bab6649
SHA1a248fe63f1e00659a464db8dea2ddf160605e829
SHA256a261dd149743c57818173103a6128b6ab20ee0e2fd651155405824c79dd1bd00
SHA512df0a02de990ba245ebee9c2ac6d4fdeebb370dd4849139e7d292c7cf2326f98ddf06561da7f14878ac5e47294da21f591f6961eb7911186c8b8f783486e68c93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eafad13088edf495fe8cee0a0587f755
SHA12042c8c484add40a6d8113853a6c61af164f8d4f
SHA256aaf5f3e15455be5098c5c40341c853321eaaa6472c1478b2f7b6049ae1b8b449
SHA5121c29b2ca8e9a3db957e5bca0c33e43e4243fdd930c8befc2dbadbdabafb04f9855a5ce8f445a445a4d44b9ce4d9ee5190b5ef66ed4871c5ffde90e4eefdbdb4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f4852748e39cab88da32bf66728f585
SHA182e91b08998635839f117863aa0945227a4835fb
SHA2563d57eaaa7388ce62c6093bdd8f10e585b15cc99d90a509d5c8cca11bc0a9c8d0
SHA5125c8128dff939b977e390d26603d46c38a2248feead35c1379488e528374a061568a197257beef6d9213d4c98a82194a043098415bbc326e30f9a39d5dae3b4cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5729114b032ce1abac5e606ffd10fd958
SHA1e23a0883071371f283a524d3017139cf0feaf8a6
SHA25621325c95523c5ffc837b42029b1d426be3c3e440a25fa0d775fe82a9949989a2
SHA51218bf37fc533bb226b618986f1224ced0698e1133daeb8ec2ed56a627da6f1b6d772b8ad495b28782391588c822516bc31dae93095e828a710f9c05a4874d3d2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb28cf258679e9d501301d5821021b21
SHA18e643bd57298089fcb080dc97c8e1b09efd429c2
SHA25666ab4e4e9ed2440545e9fa69a1d62b8d6ab73fafa8cda51ba0fa196805714946
SHA51248d0056df166d055e2c221981c7acf32d26c28499f12c89475bb9af8221f0da4b0c5ad608c0237e9e3654bcc35474bc99d6d445561de851963deb4db9f5bec0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0cb7f5236826330c61fd7ae2c971e73
SHA10352c0da8c21104110a3028f0376ac4cb070874b
SHA256f2a74b44eb74b19c53839b5ac255b5b41b62694d0d55ca99cfaa165496e7e440
SHA512646684de2baf92357ceb7cb69b03e90d6fa8785a456dd5aca5b3164737d6ec2ac06b2f4929b86e8ec6bd9e266f6e1e1527fb68c30f50057d3de7a90f77e6d405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5711e5efc5192cae1432e3c68eaf57856
SHA1ec4d2fdfa069f3bab8994075b58f4d3783be0b0e
SHA2563fc54baf56cd1fef37133338c68a570c0b3daffc78a733df775d2832eb16dcdb
SHA512e2fb337b42991d6bc98138766c19545cd5f4751e81b5d5ce6c606115729f86fd63780396d869b60ba0ee6cad06b38ba1896acb25361409cf136783668d3d33f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560a6f26dbeebfffcd71fb1adc55a2467
SHA141c5b3be4b2d16292b0d75099f2da25c0b0e42e2
SHA256d9c834a68769f7f3205a56ba4c5f48177c64f4d7d1311f77dbd7fd47e8df1cde
SHA5122374faf7a80353e3eb0c93dbe60d34dbaa65c35b199a63567e4988eca2379622008f49ce79b01a0ad108edcd3b2428eba8ce768192b6ba704e5082059771e23e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594385336f90b2b25464f17a0ccf717b3
SHA13e25e813d7b8f0783646a0692c396c9b4b396daf
SHA25651123c5e067523123f7d6312cb2c90a0b222a37d7d86d344750fff2b4de9ca40
SHA512dcadae4e3a8e36aacf60014fbdc69e8ee073937f78d4380da932c03f950738cac97b283a260800d5218e984df3adefabcc5ea0f95d1c86619654fb78540bcbf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514c21f7578ac25be141485f8f2bff224
SHA1860ed945fb75e20f27efad09eb6316be8c90ecaf
SHA2563e1e9210b10f3e37bb4336d8ed5d9943f7b85108cc2ff72cc31c26f7090f231e
SHA5128a055e24677f1502798b4085c52d0d38e9bedc88a9f4ec59d6ed696cf7e0b966cc0ce0e19a7c4dada094c04b89466fd14aeca8ee29ca98583a48ab14f720a885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7bb1f6436682ff9195c02a1fcb92f5e
SHA18985e6984f0c1754110bd6d47f7e3387c8da6f24
SHA256d4321610dd9aac4f86d1a049c9ef17c3b1c1f458e1fff7d85bc9e2ab51298c0d
SHA51277f42654370626adf13deb87f536433da124ec2ef14c7d8be5aa2791b3a925e8afe7eee3d39481f74f48a643b3287c0881fb6374e7af0313a4718483e2a726b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8ba1fe0c087e55e2e39a6babe85b2c7
SHA15126ba76d64a0009898b41e4d34bf4c1dd599aa0
SHA256d676fb707816f363d71057b8bd8f0a758b4b5c9fccbfc200eaa37bbc3849d1e8
SHA512393bcbcceffcd5b0799fab2c1627a6e79b067282682361abe4fa394de53d568c03178670454fa24ff8cfa38ff0d57e5c541d129ffc44eca3e45dd8442fd606b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd773de3178f1345a2807b4dfbfb50c5
SHA199abaf4ff6f6fc405c657df00bbcf165e67c08e1
SHA256ef6f31ccb527ec67621aa2e7f5687d6eb6437a8415af1e9b0f36b0bf74cd9913
SHA512a45c6d18e01182e819deedd7be13dff67cc46111330ed65aa40a579f947e5d3f7bc392c13f5ec7bcc3bf6271a86088027c86e101883460c6f2ad741a525b67bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f695ad79823b1df945d8a63a4439bedc
SHA1d27df739e0c92f4f6d1fcc174ed70859edca32ad
SHA25615a3945bfb02e0a452ecae9074f59580d96b815fc45d86f85733cfd135ded872
SHA512a026d34ebe7fa67ecc9b7d129e7c1d3e12aafe949b08112b9bf304218517b0b413d2313ab2870f99d5e54da5386e8e93143701634adc61db1ee662efd3888577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5870f223d509d5e10a0b4a071680d7afa
SHA1a6a1660a35fb3112d939d5efd9dafdfbdf127a8c
SHA2565c539051c3ced3046b6a6c63867472d097acb5a10f0e4e54dd4e6fe6a74eebc1
SHA512689c082b42cf74e21af274027d3265ccc9503f08aadc1a42963e969efe5cc1639929ca8700cee7c479747eeb2a821ecea24f8ae41912424350aea5f25150a682
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b