Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 15:30
Static task
static1
Behavioral task
behavioral1
Sample
74a2874ee4a65424300b820dd8e68fa1_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
74a2874ee4a65424300b820dd8e68fa1_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
74a2874ee4a65424300b820dd8e68fa1_JaffaCakes118.html
-
Size
264KB
-
MD5
74a2874ee4a65424300b820dd8e68fa1
-
SHA1
ae5577f78c7eefce1ba5bd4a4538d9f3c0a71889
-
SHA256
ffcdfdc3c0ac6e871c3a3756b34b19fbbf03aa80423f577ffb10542532178f2f
-
SHA512
c5f4b83b9902d7897ed9c4cbf1042d5efab34b1c40c8c05f07de6319822ae7cf2a6c8917a185997a54b1e116ec577cdcfa28ce245d6ee048bdb3e49f8faa96d4
-
SSDEEP
3072:LrgbmzJ4Yq7G5/P4C7oIQu6lvRhtB7lMnI/BNxKosxW0N44vvjx1:Km14Yq7G5/l7su6ZPaI/BNko6PN44z
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428177564" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3030b02383dfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4EEA2A81-4B76-11EF-B6C3-72D3501DAA0F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000008a83829b5cedc9042e6b0e083c7bebb5499d4155629cfb38851e2370a4e5d2c0000000000e80000000020000200000007628c0f84edc690e34addaadd8d108260c3d3d506c3b667213fd389082d5708b20000000c8bb705d46917533100328f86cf11429e8479fd15b170c3cfa2e86412ba9062440000000074fbb05de07035ad9c86999b8f539be3d10c9b884baccfcbf78a71c7b15a560d8b3327d85c9fc31f44d4e3a7a658a653771f7a154d49dfc24a0fe12f2b1df82 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2936 2324 iexplore.exe 31 PID 2324 wrote to memory of 2936 2324 iexplore.exe 31 PID 2324 wrote to memory of 2936 2324 iexplore.exe 31 PID 2324 wrote to memory of 2936 2324 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\74a2874ee4a65424300b820dd8e68fa1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ec45189f19eed86aadfc5ea07ae4475
SHA143b398930bbb37171fd7c26d6dcd42b90362b27d
SHA256be3e18937a145c442e4e53643cb93284421c91282647eeaaa10ee74ccf1dbfeb
SHA5123096f418056fec82b4e8ae29e0fc9e9e50915ce60cd2dfa4575b3f0e8f512625f7fc4139e283bca04d00e92cafdd75352e12b91b4bdaa136a236921812580f2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5431744a7d064efc7a42d420ffbfeaa41
SHA15e7450a19719ce246ba08ddfc6e76f45ac73dfbd
SHA2560977847ffc475806120701e9e36a8cfa3ea3d75c0ec998c5d0cc60e61d5967c2
SHA512b2f206f1709d8ae75def32cb42e5f75c05507da15b2f36cfa0489fdd039fa0efab1b6886350fd16ffe27108b66c7298e450bb8dba178a2e47c7e52920a2e8a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0a7908e6e51a75356c0fdbad4ec6609
SHA13b11b02403af29589b32a967026a7df603d79af8
SHA2569cce9f2dfbc262d321d259644e168d0fe5306378132ced5313b4a20aa6c2ce5f
SHA512f2959787d01f72a647869bb46d63074467b26fc8564bbf14c90070e4e2ab6ec561686dc216096c13510b359ad88136c03d2cd972c9aa4ac1fabd81fa18af07bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562629d41ba60cda706d66ea7bee177d7
SHA1377172b0bb94c298600cf3c7ea33f10810b6ab47
SHA25607584fb632eec67ed747ecbdb0c13bbbf1e0d987b6ecbc96272a344c45bfa829
SHA512d25eee8a12ebb4213ddd92fd05d51a48091329eb9ede95ee3b7428a2244fa6d25c8643ece91d2ba2f7b5c6fe290d384990a07904366f14c44014262a2f8fca44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e75d051eecad9b8cf14c854362298d78
SHA138918a1b78674af4ed2184a24eb504dcc4b8b5e7
SHA25696d15714f7d6082bdc2e94edc111345cc3ac6fdb39e286b9967ff9ca811ba62c
SHA51247ccb05fe875395558e1d36b1638f7cf3fe5f9faeb890c9c9860bfea85dad0fdbb66b03cd4de6cf327bd7323bb1a24c538211124070959457099455a9504534b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3417a2febed151a2fd5c2fc926fd9a8
SHA10edda94c878bd91b7ba3e78ba94626e1c624d496
SHA2569cdba9b5d6b4f0e60327b4b49d3a8bbac827177995cebe63d32c5afe3168be70
SHA51241d4c720186623ffb910979aee25b7277be6c4ad5d7e114fd746fd0fa89b63fd6337f7e831d3457117113e85bc70b4a424629e0e46bdeff40f2509b5f1324d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50127a8b40274b29cad765a09f3605b0b
SHA13874f7222ef95a9fc4b41dbbd95bfd38b197263e
SHA256711e29d6d7f2435594289ab20239808ce00dfbc41aab4df44b0d5b6505602e12
SHA512da33588058b626ad04f6d28864303e659747e3f4b007f2558b34d305831b93c3a43f64b3ee696b1043610c3de48d2f4e0874b52ab18a089a17454c981373ae78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f8eaea7e56681e82e92b69843802ab6
SHA16f38b648894d7434526501939b2fb67d4045bd34
SHA25674c5ac6f4ae6f47de20d93a8055ae89f3047c14e8ddf05c108c2f7549f708786
SHA512838e5a286c551bf7e18efb6ad7b8c33cf6890b56b61ff03db755ca9df86b4e17f6eef63f13488bac44138e98bae5f7aad6b0ff0a073f5d637e18808336d52f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59113fc4a7b2c4554650a42b330d3d62f
SHA1dd71f006ebfb02ebf777331e23a9889e896ec2cf
SHA2560b005cac52a629b1892a1474e4d981a8752ef469e6c5dce10eb2e0efe1cbe436
SHA5121404bbc4f9a049e5c0ba423ee50f9e3eb23c8c25dcc7474caf705fc8f4fd0eca8b5f9aad0cfba1385e97c547ba59202b775627cce99745925c5720444fa3110e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582a2e8ec494189c1517e5d420f4544bd
SHA100bc28063ea3c2cf99fbf7d34bc5b0e15dc1683f
SHA256cde379bf24b755f1e1b6e93ceef8d37ae730613c148ad3cb3330e8192a8c4e8a
SHA512a6af4746487d3d1a89005b92adc1eae3a82e7235e83e01820ac0718fc53ac34e6e80487bb38ab42a76d6163a7f22c3d96163d7ffda9cc40abbfb3d3ea620417a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589a7febcf45ac4e6bf660f07513747c0
SHA17db1ea4d2ae79b40929fa4563b22ca2b9236e8de
SHA256f43b511824c66272661a01b968b9c603c43638b4eeb4f1184d483252fe3bf4ad
SHA51245918cbc6c8415645424e73180c42ec8ea2be796e8a034b475b3dd1d2c710f156ece23c12bd0e6542488d18a6fad68f29a266a853fef48903d25ed9febb4da29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5134a47fef85b9c3627990648445e597b
SHA1e2f16f12fbad48773e5f3e240ef4e5529b37c4cb
SHA256a0c42a5d3411a3992e933aff7f3b0eaee0cd46a72249ed8a67cdec86a763347b
SHA512f72df2bc2a7707b0e07e59e608fa3268d198534097cafd29bfcdb4e4defc74d457d06bc2fcb97eaf893497c761fc9887d16245b87269a12474ba73360254f377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b8b8512b4249e140cf4ff62c9ea5310
SHA1cec95cefc18d8800a88767228f6ca626f7a911ce
SHA256def38fa220bba424103dcc43b63a9e5dcff3aabe45167dff0850b496f3cd608b
SHA51245ff0029aa6b21726bd6af90bf24e4658959e96e711a77df45d337bd3a10788e6872dae4209eadf856da191a8ceb0e3ae986d6667ebf85fdfb4f198a7d4ef5a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52acb47244a1895c91dcf51959c29f60b
SHA1865fa5794a7de4d03319d9ca98da215d2248f10a
SHA2564e3699715d1e5c5f976baa0b1b0dacb8e4439bc7a17b33999566635d5e08085e
SHA512e526591c7d55fc4f89728bf180ea0d90ef25e873d88301f2f867211429c2b7e810c73ae101eb9c85ebbc9028cd61819d668699b180667b5ea6c6603eb865e6c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509cf82b27a44235fae91664723bb470e
SHA110d7c50b4cd354faf8ebbefc87a0a159a9387a23
SHA256a4875e3f8a9b428d6185f0fdfb2dcac39206c8690d9d1944984a20575e041fbd
SHA5121b75370627d6ed0573ef68246fdb56bcbaafbe7b27710eeb6357e09b5c80170beb35dfed8dc44b7e523347d51b62d096357ddfc5e579124c130039b774bd2a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e3c1759832f390a07c6baee77a686b4
SHA10cf71cde32db236c0db06b3d68849dc19afe3fb7
SHA256c454473895e36df6c9cd802a490e8bd8393cd93385c125b6d4c4b1e249e1cbe3
SHA5127ea57e0f09041f62d9d1d5e982bd895732c93e1e279232e9c687c26f1c57d28225ab6689a42d98fdcf8a99c4aed490d9caa7b6724a4fc0fcb7abfbe908c3f7f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51de58daa62794d3ee3497e6c3c968af8
SHA1a7daaf95ec1d544dfb3ec8b1897c4b93499346aa
SHA25612f08dab21477b5ad876dc4356c385e051dec134ceaf0fb7ff33975594e55a8b
SHA5122ae974217d3cad44bda2b3f62e7f55397e47b010c0012adc530205f484d143d01a288291b138efbea10327080351fcaec36117f59078cc941d203236c5bb6b3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0d86ad6187da51c73450c22ef159134
SHA1d79dfae89f23de8a546b3a356cefddf553e0fc1d
SHA256e2db9df770506541d07b5f1e33c65ad91732d041ee411604024a4d1abd241c28
SHA512d9773cc84ae183f13c87c8d46e0745ccbb0b97c2607517306d2956803802ed6665266a9abd1c967b21d9dc0dd435b81dae9cce7227f5c754686eb6ebfe29bc64
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b