Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 21:11
Static task
static1
Behavioral task
behavioral1
Sample
75bd5ee579a3a1e5dfd0515be92a2a8c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
75bd5ee579a3a1e5dfd0515be92a2a8c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
75bd5ee579a3a1e5dfd0515be92a2a8c_JaffaCakes118.html
-
Size
62KB
-
MD5
75bd5ee579a3a1e5dfd0515be92a2a8c
-
SHA1
3234267c66f3498565c06f2a1944f1febc43e14a
-
SHA256
c8a008a92cb4f643db7e54d408a1d1f2c8790db1246c77825b1be4d62197800d
-
SHA512
6b3f22a4447b93e49a70186bc760e9b4b40dbcf3d0ce08eb4cdd6a6a54ac0aed3d7a30d6bace2d562bb88c23b3348beaea573429927c16f04499441c52b3cba9
-
SSDEEP
768:h813JcDKyHHHWylo/4HIodi4hMcOo+S3sodi4hmn4FNLM2hL2c6:jDnHH2g+dodFhMcV+S8odFhiB2hac6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000dcbe4af1dcea5312226732de5b4ae5958f2b2e321be26be6649f4bfe19542a68000000000e80000000020000200000006ee1443ca32e31aa4f35a49d1d85b096afaab2ea433c8a24ad8f4b52eae19ca720000000fcccfcb6a78cbb78a65ce97f543bcd23d377bca8cf26e3db0ef99b68df5c5f704000000096eb45e516d4a9a73e00b2fd5f3bec7702a28eff6921d44ff974916ed51cd1122243cc26ac40e31c771329388e27f6a2379b8f27227d74af626dc0edb7102510 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 607c4d9308e0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B90EEBA1-4BFB-11EF-BBF7-D6EBA8958965} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428234866" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1880 iexplore.exe 1880 iexplore.exe 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1880 wrote to memory of 2464 1880 iexplore.exe 31 PID 1880 wrote to memory of 2464 1880 iexplore.exe 31 PID 1880 wrote to memory of 2464 1880 iexplore.exe 31 PID 1880 wrote to memory of 2464 1880 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\75bd5ee579a3a1e5dfd0515be92a2a8c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1880 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56472371adc65590b9996c48fbe3302e6
SHA1e1084310fc51b27e406cd6bf97b3410a8a701ae4
SHA256bc286ad72c515aef3189d9cfe2170c3a4d323fb0d76647569ea22bb139953256
SHA51225d38f1a6c4d5fbaf36fb45bc26cbeb62def38bcf1b5cbecb58f91b26b6ebed9c1b1824e55aa90dc2d1e701b5afe35a8f134314f37328fc620592b0ae9c01fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c928c8a84df0817b8fbae566b3541d48
SHA1509ab747a225ebecb15c7182865bcb7fabe9ab31
SHA2566ade3c62e7ccb82a4395674a5f693dbeb0eef710392787f8dca59a94ca990096
SHA512b122fdd60900682ccf6759bb232fd2e51ad5e773394011b9b001f19337bf922d27dc13a70243bcb7a3d756e6e277f325a3000664facdca95a04c8e2b202842f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD525810f15cee35c632e76e29a66019609
SHA1c27eacb6d69c5e6f36f82a937b1fa02c6ae34fdb
SHA256467ba898235b59b46ee25e7fe09d02449e570bdee6e7b3f72ec1d34a9074b120
SHA512191f44701a46c9f8c09bcc10c81b1ab7fff870e715b17a0cc2959d279dfcf2c8e8fe976ec4f7393a42ca5195748d4fabc327dd2cbbd87854e34fd01e3992f22a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51c78aed4c4e05c4ce170615e6cc54606
SHA1901c6cf0dbd713650c5db9debebbd5bfe441c1da
SHA256867ac7af1d8646bb610a93e4f0733ad59b9870733ee1b871b1c7867e936bddc0
SHA512188c377d51a10614508dbf9c4538112751b47f31d76948a23968b6b04ffe71b72b9add326749f81313c30365f8f383535c09c8b76478bdc1c1aae8ecf531997e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c3a9bce364aa9a9d990d8d3b4d56a659
SHA169fc4557d7cfac8cf1548dff440827530e037df8
SHA256ec90b9d811aad5b1890b15ffca7d4b4d885e1bd0fc2e1be7df82255f70f98bd4
SHA5127fc84efbf3693d56c12ae98c740b10c4d32488f7908ddc4b341f9a525fdf7e4ade11fe24c4e50080e30f8e97dde4991580084cee7884f1b903220dcd8e8f99f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d858edcc3ddcf8446fbcb4cfc5fdff0f
SHA11b354b1934e3acc0141b29beed1fec45f16a1a3f
SHA256c08789416420108f2cb569ba1d9b0a72bed9a16df52355cabce3c69b2bb4d2fa
SHA512f27df758c1114719370460cbdb3d225d65e3d5800b7a70348bbbd3fed1c4b5e6cf97f791d5be1a7f01a533102f890d67bbaf9e2972cd8d18d5fff1161f00cd0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c7ed1b278b3ad0093c63b78fcf138f3c
SHA130c1fc0b6c7572cbc8fe4ac6e8b672a4ea6d6829
SHA2562e3fbc663e922957174e76c3e3f6fe75585d28fe99dbe870832da405b279dc0a
SHA512db09c8eb44fb1f6f976858266141d10d600dd191a32ea1f04d5c6d936252135582fed23366621722adf05c7b85d115805b96ad74ee6d4f4ba55a2310b36f8252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d07a55fa30975a36a9aa1c2828fbadf4
SHA1f03eb23d03f44c0badc430446f8c1aa6027f0241
SHA256dce399488a44c76bd4b8b5f055a8cdfb2c876c5b238416ef13d4c6fe14513750
SHA512df642259515a10cbb249438dbef24e354a849a98b922ab0aa1388bdc0dfabb6e99465b4e78c57c6c45b2e931c2d6584c471cc50fb6e855195655eba747511709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5abf12bb933f2b5a844f0e6e8887083ad
SHA1fe5ffaba0883ffc5a8a87206eed453f627fb9e36
SHA256696944195ec23317eb95340a819d88f37686e232261bbc61b7588c3296ac9d46
SHA512ccd3d8bebe5715b8c5f550647d2e99209908212a496f7070a9c076be6f8e3fbc399b335dd50c9e4af8a8064b9ffe196f63b071488c137f41f499fe67abe25a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57b8f8273c80cbb60293aa4a80bb40e95
SHA14c20d324d472ef1cdb2e7cf96d52dc9286b36d08
SHA256da7535bcdd53de96918e72d9ee117e7195aaa515ae6f158e66b3d454e3c48ff2
SHA51278fd3916d651b583f575ba305df900d70f25a55e913f2c2f09079a2ee2a3140eface544d0ee6d24ddf8a570839f46041cb851887b5ac8a45f2693db81e6446ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ac64c177f3929cbeed6acfbeadcd7450
SHA1613dcaceb294de3485bf0ce975fa831ce88ab70a
SHA256f005c4c7ad800288d4f7521d75931d3ffdb3f51784dca403ef0154da3121ac42
SHA512e1d25e7fa58d43ad7cdd0002e17b3381364b08e3c7ca6ebbc5c20189ec73384aeeed432a36904906b1ea071e5d478166f89aff0834262f8bebc945bd8dcd295b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5deda84668bddd1ff7b6a53c11d9f3805
SHA1a593049501c0707305032286ab6c3555af645ac2
SHA256b4e7f366f29f549c695024bb21bbbd128e75f73d5d2c734a2fdb59c5c178d8ad
SHA512cc515e5d46d870dbe0957b1a1c9eee16097c8f004e983ee7a1c493b9f938fefbc2ec679bb073ac8200b549aef612fbeafaeb214a7581ff6e3585ceced23bbc40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51b588be9cf7b90e94a193f801ef1b920
SHA160c957d2e9d73efbce92a7a484f5927a113e0e56
SHA256b13e5a8443306861139ce2cb78dc5df4e64e4ed8b0ee8a810ec5b4a8aba275a3
SHA512ba0707fb04eb7fc6a3db9ddf8270b61270335132873dc297dd43a6fe4acca0064813f109edb7c8679e688458dc7c0931dde9d195af0931faa1091521a9d75cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD510b9b6027713f4c609034ec34cdcfbf6
SHA1c6f7ccb3e07864f82d498cb7c8872ff2f36b0f8e
SHA256ba4eb6d7d0adcf57617f3b9838315bb6a5b6ae46a0cb8e409e398401b379d92a
SHA512b13d56ae5983d6e0ac4ccbf3c4712bffbae1d2712eeff36b8f71779057419f1dddeb091bc87a5bf272466dea5b60db9a10be25a8b8ae1a6aafb63bc0be5e63eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD541cac289dfad952bd1c3002fb50440d3
SHA17de6d5cbe6329b643c4506f97bab5ff029700df3
SHA256a9f7b7a4c5cbab56da44b507f5a70422698b5bb98f674905e2ffb7f55ad77dd4
SHA51243ab99e94d4fe0f3f3c45bc2b21c835598d6a04479de416882e2db3ca07f943633987ba6d4c6577d68acdf8e496fb9af72e89f23be89e3e8b9b95dbfea2ac4b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52046bf0b18c949440c3435c3c7c134ea
SHA1fa45a8a3e4e4de6a5238b444ee4adff98f008ab9
SHA256f91b871f9dedc9a64f8e1d6010d2be1af41064d94362884ddbb3c19fc6102fa2
SHA5122aaebdcb02f8c4e88a57c14697445f5070b19c3373d3cfce47c36ce36d06b96dfc14f78bb38ec19dfc845b45bba3c5c5e6ec36dba6130a933f0ea8db0c7682e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bf949200cb55c0d729185403421bc2e0
SHA126ce2ddbdc90484d8dbef49a98cf40d505696381
SHA2561bf6a9babdbded983fbf834a2c2f3e7dc36d75d374a87ab573afd9721f8954a2
SHA51229688cbdcb8c762398ee15ac634e26bc65fa6dd538bb01bdc463403f37104187669d433186426a4f94ad3db9b0892d463c992b061535ca30ccf6267b5533bfee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54d3f99a0111a9f41aaf9010468876cbe
SHA1fdf7b8ff503b4ea4072c95c1c7439641e1ffd3d6
SHA256254d28e7dd5cde4f78829386c49829a5db41392fef511261075c457a21e378a9
SHA512cd843478ad7568a12c78ceb1bef927d0c43b34c1905b4b23a2e158b359cf4ace15e1081313d036901dc8ddbee20551f3f320f8a5a8954fea1945eedbbcbbb502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56a1f0d7717559ff6150f6c961d35d25a
SHA1cfd138b295bf3eba332f4283e95108d68cd48cd9
SHA256c24d128e296ccf2188ba8018d5e2612de3b1921cd87bc142f816da473e61dc1f
SHA5121f7dd10f2f0471aa7c0bfa85a01234cb11c875dcd64ca2d2bf11451fa5879433d6e44c570d81256f12e459f00cbcb8343b2e97c1e72e3a7143ac28afd8814c42
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b