Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 08:08
Static task
static1
Behavioral task
behavioral1
Sample
733c5a00082e382f45f47fd01d7e4f45_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
733c5a00082e382f45f47fd01d7e4f45_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
733c5a00082e382f45f47fd01d7e4f45_JaffaCakes118.html
-
Size
36KB
-
MD5
733c5a00082e382f45f47fd01d7e4f45
-
SHA1
3b44d8bd13b0801d6117c0a2148bf29c67764375
-
SHA256
f6ce0756453487d2447c69db9db4c4b578f24580e357a1a1cdb0f6a876d9dd3f
-
SHA512
e5ef4938cad1dac4eab59069723b7d65695ee010861a0569e346583adb3c14c2cd88fe6525d554abab2cf76be7c8cd9b402b3864522bb9c04c07ea75691e50c9
-
SSDEEP
384:F1Sab/tiEM/co8K8ztXtLbH152QSZjOHxTEf6I8IxGjtXaMxKuaRdd8RJ6Vs/axC:FvtiEqO1ZtIxjbQbKD/my/XwGhuWyd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F35418B1-4B26-11EF-A14F-CEBD2182E735} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428143481" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000005c293e2eeebd4980080d7044e873df9d1b30ca31515a923c315622e3dbb30166000000000e8000000002000020000000f5d74b74e23570a885060e4c1d114a36f06bed7964ff19383c8540de7a65865020000000c583afd84f0907e7799b915dcab4dce439a8e2f4e8e65728c83c852f33af17d4400000006c6208cba764049f40dd31f6cef4c1a8774ecaa8e5d1cf34dce7482eab90468c2e85c2e61353b9ef48d8f6b6c573184d7eb56c2b883501f871487855f60deea1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01d3bd833dfda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2704 2708 iexplore.exe 30 PID 2708 wrote to memory of 2704 2708 iexplore.exe 30 PID 2708 wrote to memory of 2704 2708 iexplore.exe 30 PID 2708 wrote to memory of 2704 2708 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\733c5a00082e382f45f47fd01d7e4f45_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517da8abb971097721028e2f7ac72cf12
SHA14357639914a3623a1384c852364ff694d4f9a12e
SHA256927141b79a7024cf41e081f4fb056512ec0de25affc600ef54a024367fc8eee5
SHA512fca539b601b2abd349a693dd76a9f6d5c568c975d559e1f25cfd7e595d175e1e4e332b93fabe196584bfb88b3a9cf316ca10ab5d254ce7baa526ef7726576dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ab7c5ee45ad04665ad14332b7a657af
SHA19664e652aea86226474bb8647b328afaa5681eef
SHA2562d8274dde0c8e7ea898afccdb041b5a14fc6dfa4a75e8e0e51714d90889c56c3
SHA51216fc3c9ebc3449ba77dae8e78a942e3f5aef0db2d14f9b623b3782b2343205035d94f38520ffa46c3c5c741a0a81759c444324ee375f616c3bbaa89bf1f57798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5410d81b3929787799113f229c993d201
SHA198dc4bd20054f3890c4284bf65050a2edc198733
SHA256ee937d309b6560f33c8c5b7a590d2cf6b647857edeff54b4cd8c8b2f0a743838
SHA512519074c1d461a04f646b0bd117319b7916f917de4eb7118db0c218570fd5e33989e0f8729238a7c60ed6240587e253b2ac9e23d21b33de9949cc1dd022e407b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d0d7a56274ae25115a7e44395a7548b
SHA16ff71667a5c31335b0161210926cda2faf3c4a03
SHA25688a0aa0a8f1fb7b03e3c8277fba88fc8806ba2f95027d68c8d6d53b6ead8ca4b
SHA5129caa5b8736f4cdeb3be8533259341dcfc56bfdea1bbb1354ccc28473df5aecf925b46e89300be9931a60adbe1015f6bb83f9287c7a2c48fbff7fd29cc0120221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fe6a62c28e46716e3b4df287ac2c4de
SHA1bcd8565d12d707f93555f785dc22212943d1cc61
SHA2561ec2367d896ef5c6bc78512fcbcafb124fc48703c4a97784f8b327b72f0077c2
SHA51286a3d27cadc267bd4aea401a90c9452e3300517bf7c9bb4420fa6656b733e3d56ea60d6b871e9b37ee9dc5097b7be537d35df513069afe6e804c3ccc8f3fb9c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e60f579ed2a4041c8ebd21d6c0b6e767
SHA105f450bb81ee043c8920d5848f50c3ccf673a59c
SHA25694bde1292a41c104cc9693438cc7c76139bca386f6f706cc08344c40ce733b1b
SHA51207c4de5599f6494e94d653d65b8deaabab402d433faa97e4637edb4e803f5d48d83d5b0ea78daa67956e4b0929e2495b945517656a9d691670c41a8b51bf3567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8295d059a5094d789d14437abcebf37
SHA1dc884abec5f8c9a4d54f2e543aa8f2cf5f5ec5ac
SHA25678d228d8570890816e90d201b020a8d70230addc74c254a276af3bb47f433c5a
SHA5129dc4bf51c3deded4abcde9e40c0ff79a789cce9beaee7b8cc55bbb2738a22b4ea4f16ddf2812c9ccd02dbedf71ce112472f57377be0b6559b99abc9235320f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cd0a57f7821c453ebae81ee8cb8488d
SHA16bba539a6d13bc940b0ab64eac63423523f3c9c1
SHA2561bd62f0f94961e27f9fdbce42100189be2113a0b8928dcdadbe5f4f98fa0341c
SHA512faa81e959280c94478f3e566419e9fe77d15d74e2c36a0c84617527e866a105d07d24218fffe09f9266be5221c349e86e0750c7eb15b8f61a7130a38503a0741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524d34012288c481a656c2d7674f186e9
SHA142b629064618d414df770367f924df61e43b8ec8
SHA256817d1a88445435f0eebd1155e74bf848e2c0d9f83408192c1be7391da864ddbf
SHA512e12016befa06c57ef36765cf69150f6aaff7815d25ec60817fc90022523f4947e8aaa593c41abc864ee327dda607282c76a5922914e6542f445c744ce7b8996b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e6895e56ef6cb3bc9d18834ced86f48
SHA111cce2f89bf43ad3b53f339d7b0fa0cad3ede24f
SHA256257ac51fdabc6e63c663ac420ef05d320bc1a607e9978f300e671b571de97672
SHA512ec1ea0fdaeed3f8ece48b6ee383c72717f7a36c7b2d351ec23fc5ad0c5289b60d9879eec9651b7b1863b6cfdd1c3211d72f5c3b439636961b0606db6acb6d750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7ffd6860685b58689872a4bfcde7632
SHA13a19629603fef2ba767448c96155b603f8175baa
SHA25624de3e5301c5a814f31797cd695334dc3142519fe4bb1ecf34e358b95e299a7b
SHA51266f6d9eef03d19478e01bbee5953c13d441ba6085ae459f2e7cfcceb1c953d2d4772a40329cf925fbaf7ea381aeb438f86a11e499296028f19d0b62e6b4b326c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3bce99d4266445ae1682b905951a372
SHA17351172dfcabf2556ecab8b7ca6db8946aa70aae
SHA25613280aaceba6868a01fa5833cdf382a900cbbba56d41f94b355aa881949a942b
SHA51253d7fb694f7f57ad6255aa56760c8bd50ed4520a1deffaadb7f8683a04c1ef1f1297a5a182b6e21cab84cb7e0e040e6821c95455406ab618161ef04275fc3873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534c209470050e345339bfdcc17ce9b42
SHA1b22c20abf273721b302761585da43efcfbee10d2
SHA25688e9a095a87de3f49f4d030fe17d8be946c411c9d4a8e85f47be7e0c52ec9add
SHA51253453183ab866f71616d83f885cdce0dd62b73733e020a4eb7f95282f4ae24549571debdc0e8464f8c5ad2a3f6456d92592e811b4c10189c781761b8e1eba80b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df076cc677eeb25023680567fe99572b
SHA1c05befb519c858acdcaf8c2a746af7154ce9794d
SHA25614c0be81f3c7ea3020c598be7768ff7a7d37b2826f5fe6c7245d6fd6acec4835
SHA51252e76bb98f9cc3753f31c328277f83062e3051782a6c0c7a1f19e589a5a4ec52f52a8e96104cc834a235cb19a5a1054f50646eaf5315cee73cbb0355f1171bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52be8ff79ae2bb1154c062f56c75c805d
SHA1d783849ddf0306e52c053272a46c3dcdefef531a
SHA256cb583d633a75b6138b996a127b8efdc441822cac84bd574d0c105857ea97deb2
SHA512cd77b45407c397c1ed57bad0c3f33ef9ef08f65c18c43d808318f0559c36efc80362e5c0633d733cc484ec9d358d90724997cc9baeef84d0474376e86f8dc9ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a359298769cd0e4fb3950ea1050d75b
SHA13e040974e5205613e56fe5de337f4dad878665f7
SHA25698f71511e410dfe60e48568272fe9df73479afc7844b161ceb85fe1e5be6b1db
SHA5124a4f55cfdaa385ccbc675acfc223637220840e8bdf0ab7066b00646f3000934897e393680a1c5d78b9e53d989dd6124f530761e214303a0e9f9c88eb517fb283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ede5a522b8298e8c738ced104ac1475
SHA105a7924857666b9a3a561c1569261a0f2735ad9e
SHA2561bd4dda8857f6a9b9d6c52920f219bff53e55c99406dee0b679700eb084bce81
SHA5120840ba05f83f728715d8f8838bb28416576c1109918a845da54bdd49094780e7a52a8fe730bbb3802d12e5da0c17b80111243f789785a1c83cded1b1e9ca6c75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de17a0d9a23d33f23dbae3deabb12b6d
SHA147be00395853049508a428a63d3f93c2d2021bc8
SHA2563a4633939adff0440fd65d1d105f9e47ef7b17de52f472fdde4e45403cf820aa
SHA512c9498fea97c742e56d09ee5b4b6d9421b0649db5c3a4e038eaa5ababa58874265e0d58a8fb61c8b9689ba68db44d620d8868ec7e073375d9a05c77b1e9d6a878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad25d6b8b9517b5667fd88a665127a2a
SHA1d74823e4af517b1166548dcf98ea7f4a69266cfe
SHA2568efe38512ec40e931c6ca45c33313a76597b8cb8228817b4de0cc5837d5e18ca
SHA51280f21c478e984038fd79452c0f781214c115f38ad72da2086f7f35b040770d2a1a9613eb271a034f3721f982de64d125d05e291894c27ed989f74d4eeab07dab
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b