Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
70s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 06:50
Static task
static1
Behavioral task
behavioral1
Sample
72fef1833c3d529fccd3dcae2e9badec_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
72fef1833c3d529fccd3dcae2e9badec_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
72fef1833c3d529fccd3dcae2e9badec_JaffaCakes118.html
-
Size
6KB
-
MD5
72fef1833c3d529fccd3dcae2e9badec
-
SHA1
a9bc12750b4812895edc86fa6216b6969d030e40
-
SHA256
5c26d88e1271215be8d8b24122d0004cc0febe99693d2263269dc7ededc34099
-
SHA512
b3676b72b1a9acd5efe3d161c6b3c7ef00a8ef7f1953c5753c0e0925c8993584fdeba9c227748287fc5e437b2db2783c42bda640b4180ac8dbc693ac03c81121
-
SSDEEP
96:uzVs+ux7bULLY1k9o84d12ef7CSTUn6UiWicEZ7ru7f:csz7bUAYS/nUiWib76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5151D3A1-4B1B-11EF-B8DF-E649859EC46C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428138488" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000009966919f0eb76403cc2b3c7f83e54f6dd7dd5d92186a27fd31b1ab0722ee23ef000000000e8000000002000020000000dc2fb0e453fe4ef0ac640920f8fe4adb571abbf49a5e2edb276f56898d566b5f200000000c56a0aa8dee9f27cc6f07d6969dedb0ba29253718b71c047c98f66625cf5d4d40000000ad30eb6f60ef49968893a38f3160fecb3baac3f3ff815273c828c9d1c855918a1ed1b0aa630a197038f58f3d040ae1e260328a650c8b92c2908abeb43ff5b98d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60c7dc2628dfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 560 iexplore.exe 560 iexplore.exe 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 560 wrote to memory of 2588 560 iexplore.exe 29 PID 560 wrote to memory of 2588 560 iexplore.exe 29 PID 560 wrote to memory of 2588 560 iexplore.exe 29 PID 560 wrote to memory of 2588 560 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\72fef1833c3d529fccd3dcae2e9badec_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:560 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525a22510aec35124eb8f31af4504d6f2
SHA175efcff6d38a8eadd53855039f33be9a44a3016f
SHA25674412d5ff9032b9f6dddecbb699fccdd53cecceede448688d07577e86ff01aba
SHA512f478967e236eb42cd73e47b493b6bea51fc6d6ae699ee9ece852f0db106f134252ea39506d22be2cb477c57a8b3d34685c081123a5bc24e99bd6030f49618354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528a174195010c6e9cacc4b60caa00914
SHA169212fbe4945921a92ed381274168cdcd5320881
SHA256851595fbdb88b27bd5b1e46a404f43420c20ba32fb6bb37814a2efd3da2ede73
SHA512450e574d7e424302433858e6341fb3b11d67a79d071c7ddc8478e430ba522f7765a73e6fa765e5bc496fb88b82a20b5d747be3d224a9f83185855e9dc1aa2943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faa6796d245d4af1f7ad7a5d482f2741
SHA13034be7d8af9d4be38641876bb74b33a4914029f
SHA2562e3c92fe22bc43170fec6e3610109152dabc8a1f7e5b9ae28fe4ac0d43762074
SHA512685840841b9481580a11907cceff8e885544c3d8d864df3b6f7ea10a96dee7d53ec9e0fc5fbb8a7f07deb7bd8ebd5cd00bb949fb4b0efcb5d0295fdab14befd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb25f6f91bfe50d011d6002c5729e77d
SHA1e96dbc58a7de99c3f3b1cb08618e653b372d12fc
SHA25644c1291d52e3a57d7ac1205d2b4250d57bfcb088307ef261104e38dbf7500b92
SHA51212cc52b56ac0a1fadf377c153e2604292163f6dad6ed14a82ebea79e4272d1ffcae6d8c7a176638c42aecfd969cfc2ab54e6485b07add77095f66c92e3fefd3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5852c5eb71d6164286d905d4009d9c63d
SHA126133f5748a34f033b201dc02e008423707c640d
SHA2561c29af0003b13672ada1549cea120b0d7dff23eeedfc72ac041703be204ab62f
SHA51230274e102f2dd91ce1a5d9af036e07f742599ebe7d416139f48e021f2f7a07c2f262af2fc4992cae9e93d48e0df1d43ccca301032fa86638e89dcdf7ae1c7a4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cdc07312eb07e2b73d92d85d5fe09c4
SHA1ee1662856d2c3b5c2e27b96a9a636dabbb4923ee
SHA2569120b560007de5e53c5e5bd9e59bb3ddd8550680b3b2ccc58c3b5aa8797bf8c2
SHA5124309241e787e2d4bceb7aae3874e218c92370400095f8f31fba44f9bac1586316642f67416670b462cbae4ff9e810a63054757f7660af6d4c2aafc84bdd575a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c980d3f5922bfa648557ce9eb5d073c9
SHA155a594ee1aac9c754ed234d4dc475dd1fd61fa97
SHA25637a39d878c4ea3e50335f00a2af8577ecfaa5bd1d8f0c0d6007995d17d9f8d6f
SHA512d9fc67fd901304f24dd9f016234c282c34d63f5ef218da721d2fdfe7a39c1bfa75cbf77788315c24fe5eea1236da6bb6000ce7dcc1fa909e39d6c900fd432f8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e947cfbc26cd3763b681fdc1e12558a5
SHA14b5c12f283b23297e72e8daa6e82eac638d1c416
SHA25626af3e52b0612d77eeb0a33a0fda5e774c8bb312c7db0b5fb3f9f9c5a4cc9644
SHA5129efccd231926bedd511720cba01d512ba81f0c9c412899503a0778dab51c42b5d04e30421f6ac9e5ec37c2b2053f52b166ac12f92a00449ad7b22c6ebdfa402e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5613898aa6471053ced31b423c5090204
SHA1367a2d9489f457d8213ee1b0c81856c1294982e4
SHA2567f988d9689db0ff99c96b2b2e2c7d2f0b2e8ef3b6cd9c43d1178c9a5f1f56c67
SHA512c5ff26f303e8a1b6e2559ca521d05c413011e54025e5fe06ac65bc4ddbed8ccf32c096865b9ca4a9669bdca1adbff671efdb15636116a933c8dd33cdc5dfad34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6dc9706a6f86d9aa2279f705803d9ac
SHA14e2991fc737d2283cfbf398ff3d5b221f86873ff
SHA256546416b37d088a7aba59b15d24434f85f1f4a4fa0af1b054bd7ba9504da7ef35
SHA512cadc65f379de5516fedcdffe4bc79e536524e13de9929c80d2d0ec75fed3a78896572785394bca9cbdf791f5f1da3c01843031caaa51a2c1e015e8eb68e6d552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568644ad6054fe4fa82d0cba3a3106434
SHA1fd7c863285063a0a6e59e31e7df841db7dee3158
SHA256326010e2f57e08bc9f1bc759f899f98216a71c053f65d7f50ad5589b3a2a6950
SHA512fb96a6de59e8e4bd64bd5944d342c620a0f50f2f4188e72983df9be1e52cf32c02561204a08a242e25977646650dc8157284a01fcd606444895165b0e4764bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3fd8198227f0183792bdada2426e20f
SHA12d3b5abdf508b765f2484000ac69245d00564fee
SHA2561f29f5af35583ab42743ed3d7842c1858ff8caa441a7066eca19bc3f110696bf
SHA512895d4b43bd3c5dc5f85ad6fb15fd524cd78e999aafdf00d18db3deb984d15c5bd6941c1eb0e2090a71597253bfff07da6a0d7c2a779b6377481b0fd20721e90d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5276f4a52fed30cf0157477f88def5dc5
SHA12ac32bd7aa217ede5dcc84598ae9a08e14af7762
SHA2562db4991c3b2e675e3da51323dacc856d0724aa024c038e8cbc49beb62d8f281e
SHA5121e9eb6a15e633d2c0c3fc9ed77453ce0ffefddc2a4324fa8efe8fbeda211e13a46c46ca74552a88ff49acd83813f03225521664ae9e6d1ae0443a3a5721ef08c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebd266de25efe55cbd47deb35117e783
SHA1fec6c485252daf80642dbdbbb55c136c8d251ec5
SHA256f9600e93b2cf93c8c5cdfedeaf8a8e5992a36b7ed0d3a604fbef564325944046
SHA512c9e1b24aa6fd7ec56759862f3bf79389ca62d3a1940164ea064a9ec7d99472e3a0fec6ad551feb2cee77319c135d2871e229932c1e2375a102493810c9677cb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b7b128b0ea39be9ec9751d671c4f31c
SHA109024bdeec9523bae1f8d3717cd38785f200f086
SHA256acb0da71dec07bc2c29f30d3201a8f242e99b7ecb05c1f31287876df63450ad0
SHA512e314b9ce475e8337c99476e21a61f3548c8b329cdd4ee98341b561dde85a925f83f49c2d4f25e2fa827c9470687c0cc263f801e3fb4efc812627e2aa908057a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c52e0818366ac8006685851e0a3f82d8
SHA109cef620dbb4d2dd8d4ddc3bae276e8f79a1c8f7
SHA256fff58db5d3b9fdd07b61d9889f527816c740d39e8b9633066dc20a28b5fd27b6
SHA51206eabfb051da1cc6ec76ceb1238a203ef0c40efa0ed98ad35f5522ebfe5b7169f667ebbb2b00cddb0f3370b2ef516a655e6f34eefe99e67e663dd71b1e2fff53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7d28774361e66879a7af87bb04ae008
SHA1c453c4cf4c3cd777dc91f1d41504e46e647b5325
SHA2563f7bd9e781f5e4bf637602923e2da433c254b3431fc18c4832ce7ef393eeaf3b
SHA5124eed0e04a34b868775926b6a3803dd4bec080800914597ad7f07d8732af6c3e4c52175236607670b3eebb34004e5aef8a3abf1a24ff5e4a5d6090b8e5c6b94d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caea1e9012a6ca2b1f6f25119ad48fa0
SHA14f7f5b42b3c4dcdd15c54d8d374a94588b482585
SHA25630010b347535cc1ec83f7e016a80a532db64ea0295d5db431a2454b2f8096691
SHA512822953b8fc63aeb9b2c5c82e3d27d065cdc33b0e938afbe9b4a2b608a95ea9d138638fac05222c14124a51883682b5285b7fa44cb7df9c2da9775ef1a181afde
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b