Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 00:05
Static task
static1
Behavioral task
behavioral1
Sample
764db4eeed67ec251cafe4dcb61948bd_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
764db4eeed67ec251cafe4dcb61948bd_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
764db4eeed67ec251cafe4dcb61948bd_JaffaCakes118.html
-
Size
6KB
-
MD5
764db4eeed67ec251cafe4dcb61948bd
-
SHA1
f105ce87123f47dc22df28a11d32d5a6909a7d44
-
SHA256
9b8c7481f8992de447ab73bce26c43faafa0a1d4fe9325ed1eb079fd4b2f1b46
-
SHA512
9f1ab463f9b0d1e10d2ec16d09607a5f2c7e4058b674d6c0bf238bed856cbcd10af07a222980d8bc1f81abbd97b3526ed7c58813022cb29a35e85c3c4f27e209
-
SSDEEP
96:uzVs+ux72MfLLY1k9o84d12ef7CSTUOt/6/NcEZ7ru7f:csz72MfAYS/h4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7EF598F1-4CAB-11EF-890B-725FF0DF1EEB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000003160268c155b4c65dcce4985d616a552b4e63f47a500e36f011ea58b6e87f233000000000e800000000200002000000072f24a81efe81ccbd418cd675974c1565ff17cf81029fefbb5e5bb5d9a89221420000000199b1005d66d3701817380592d73e7f67e9944c9b4e6cf1606ec21ab01ae4ab640000000c688de989a2ed01b97fc0bdcbe193fa7c3e4f47669efb92e3f050fa7cbe84083e9d9d76665a104d1798150d17e2fcf48a7a6197abbb5a5d90ce8a8ee78ab5e9f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428310360" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 508d256eb8e0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2080 2532 iexplore.exe 30 PID 2532 wrote to memory of 2080 2532 iexplore.exe 30 PID 2532 wrote to memory of 2080 2532 iexplore.exe 30 PID 2532 wrote to memory of 2080 2532 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\764db4eeed67ec251cafe4dcb61948bd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5441532ed0c493ccf9960f3b1efe0e12c
SHA1dce31a0f64de8ad835b50f04db93408405a9b4f1
SHA25632ffb44d2333fc39680487500f86a5cb6b4e85d9dde2bde27e114af1b30d1fe7
SHA51212c79d61843e6ac5ff81b2819166adf3201004164f17c960d3a08e39fb122c78011ae9a35a87f5db8ce27b24e6b317086aded98d67d496d0303e83ea82ca8b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59691ccb6be3a765d0e51a250e2931728
SHA1b1b6f64d657805edc48cbe767d29b26349a41893
SHA256be330c547c7e248ec42e24044af7c4b8cc092f5fecb5ed3a14bf6579ae508ccd
SHA512947624e1d1d47f3af6fbb2039f1fcae43edc682be7a38359b51ac318e404aada4056a14ca2fb2a0d6cdf1fb4adf186823eae306060d135447da1c583535b1736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD593f0b204c7f72eb336a94007eb2e0c7d
SHA11ae5105d5562087c5e8a83c21821a754d1d6c889
SHA2564d4b4bb69e43789f2b31a932e6a3e0f2b7c2cf0e117e43c1a09ca5f292bd2eb8
SHA5129341df2fddda71ce4876f57f1c0949b3144db7a1d23f82073ee9bb0eedfe6e3f8a912d740b87fab538bebeda94955cd58bc350944148cc0e02a262fe5f04b56e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5672bad05ecacf51e273470f0bd21f07a
SHA12b02da5553b8b63213cbf0f33eba0e22b909506d
SHA256d02bb85a531e809a04497d7cb16d70103923977e0e30e239b2bda047d5565e51
SHA512692e3b325f6f19c299656c4b0836615422efba959c11f590163615c8b3394f5fd01c2f6efb2e79bde1503d20c656d61dc0cf04cb8c19c9a30059f01220e4c50e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5757e5422606cac3f9f2f6204fb02dbbc
SHA1b17ebe1601294e7a7fb735aa0597cad0ae494b70
SHA2563aa476292bbfa697e366cc93ee4a29be5ddd7adb666414048a6b6359b7f4a812
SHA5129f0138b703b6a7f520c9ba0c828d7c1e8fee32109321b79d526c73dd086408523432200e1b1a40b09ba78d5ae265100eadc8dafde76cf0490d9a80e93b605de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c088c1127411d4f5eb514735e6585b50
SHA138064e44ee98601249ac0954d4ffc148693d0047
SHA2568b6ddd6c35172eea6b155bf612cca77e06eef0c341aa215c112eb3229b3295b7
SHA5123178cda2506e114c820e9e6ac0fca86275e0190dd9d7f82b460b11728bebb1901ffa0a3c4beeb97984122f36f25e0f0ce6f5a28f3eafe917e633ddfe0051d58a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55e68fba3797a724c9e14c488babd84ee
SHA11fd0ffee474b99ba5af440b485c8ac4a160be6e2
SHA256ee22e3d83b6ae3a611a3b68c4bf4729d8c5ec638817035a9b4b2ee7a487db41e
SHA512469e0ce4181d15cc95a8ecf297aaaa4ee3c4e9ef5beabcc6f652264674aa1ec33cecd9308578d7dba62732c06585c08f7ac5d2b5686c4caa5811576b1136b8d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53ac243eff8d910576b3611c8d666d973
SHA1f6c03b2bc8f22cb29f05ef401d5b2b1e40d5aa4d
SHA256b581f722e3ee05b8fb685d99e48baafffbf5d85b90f86ce3398175d0037c90c8
SHA512dfc9480032c08d1234604fec0b9b2aac73fa341401ddd68404606947852577ac0568483620e5ad22b54c9f3abcde980a71f1962a7a39456e4c4da8ed48c81bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD530e63ffbc097157b786694603b569dc9
SHA1a548be8d1ac5bf9976afaac44b2758870a38ff7c
SHA2563814a8fb8a6b881028c20b8c66026aaa1bac154fa478efc1a42d578d782faac4
SHA512369f6446b41de5feb96656c97a47591d810c711065b84bf2f06cbea6584ce54830953538002b62ec3b791c3fdc009cb7bfb43e29d5761c85efa7bed02366a14d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53cdc30cd840899592b848c7491e2aa54
SHA1b9579f997b0c2385a1ecac4e83bbce89368de246
SHA256af01c418135624164dc167b4e17041b051677bf48b3060d68acfed4d3188354a
SHA512dc1c583ae1a968ec5eb617aedbdafd656d344972faa0f2cff32cd0e79a41a1cc09fcf87d601dab6e2598b03b88e7c88715a3e122e1a0ca6e1c17a96f8bd1ae3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c95d360f433060bfd7a240f477dd716b
SHA11a6a71a76f10f8ae75d822062fe02ac0c7c0fbf1
SHA2566f98b5e35e2a6133fd5dc6f91c3ee7b3f9d6fb38660f91d046e1ef18c770ca90
SHA5124b18c30cb6558a716f4c3ad25905353f908960116d3eaaf8f0b7e68b3b8cc96b20f3ffb668f5bec4124beb65665977a9af010acff1507e6c06cac768f881fc80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59039f5fb2283a0ef2beeb7a28466a7f4
SHA1f6ba6157820231f51a14c2991b7eceadb71d67a4
SHA2568ca62cbcd463c35eac24846539682ba46d27a49c9d6ccc372b3efc00656b5406
SHA5124b5c09f0f240272dc28479056f9cd25ee3429cd1fa0d94c6acf64f60c31c037c4669f0a43b0bada5d057c0d328ac20a9553d402954745af915485a10fe614787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD513654fa8d7e43976815da4c68e875f65
SHA16172c67522b5503654f2662c5921f128b35787c8
SHA256de993edd0ebea68bd8101341f117947aeb7f2849ae6ee6793663c8e545ac27b7
SHA512f4fbd424bcc19b2a919cdfbdb89ff1f9f4ea8f0a90ae848fa7985309189b4fb5b401c1173f186873720c051b7e92526f0ca3b310785056bdf583e68431b03650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d78949dd423a9110808179d27017477c
SHA141a811a07ac972d57756c6dac908ca9bd73fecb1
SHA256f7c806e327320fe89769a6dafa5e3e9a152750ae1ac341a48996bcc0b58e20a3
SHA512bf14b0abad7b8b5090a4bfa5100f93f19e5fb0f1e87ecdd4261ba4f5362a25290bea1fa3089d45831c4c60180bd3c565871666f2fb1d4322bfb3e302db868c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d43be6d887a3280e6acc040998aad745
SHA1787a6ce5d918a2c1f96311238d8dde40688e6e79
SHA256e063a9a3b80686231b63a6b59f60cf4b35ef1b5dbf6da1d38c59d27d668934c9
SHA51246c2f33788b20398a85cb1a85cadb85c20e0e542e09a6bb0c7df639adc103cf77f620d509f84b92ba9a86c9fc5306f8b70a6660eddc9ee8a991185a6daa561ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53a9108dfe31a342a0de50662ecfc5f8f
SHA1bf9fb86b32ce87c22704e9380cebad7abe71cb2e
SHA25649fa20c9ed1b3a1f747bdeba5c0cc50926c0ec53459862ed5704f9772637d855
SHA512b998f587c159ff79fecc585f88e361e6d4d9986621c78f9d150a0be11d57ff5d778a9240d589c542d8cac39ccf6c076bfcd7ae52f7a1132d26f2a4bb0e98b7d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52f06b79a708dbb981982f1da92499788
SHA12a14a03ed7e57631aa14c5458e5a664f184fad1b
SHA2568fe535f8167d47f33a6ddc79841ff8dda4a094ea37e8d67039487b044506a814
SHA5120e3879a678e2335b4a155ad4e65280c64206541cd5208541807554b8e0d151a566125d8c52d82f04717531841c34e4b9f750951f5d51af8341abc8a107c866f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55e751aaf054b93accd0a797e8f343bda
SHA19f34ba6a8cbcb54c98604872906b7742359af7e1
SHA256f0e030961b2b14d3799f079b47bf7d577f6ad0f5aebf30b5662fc66a56fff536
SHA5129592b2e5400bb74f6f0deffd215439e9dac127e138b0547bc924aeb29ab73f1390faba63b7c78c2e350e6be59c665379660cc6edefb734cdd7b361333ad7f310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53e3bb73b101dbf6f0567d2eafe9fc6a8
SHA1619be6a410f6c86b5386d2b8e6d277ae15205186
SHA256d26466a05268a67b8649d59f78cee9f9a057ee401795f1ffce9499ae68bed187
SHA51246169b796820f45fb349e8be2b2043beceaef85fe72b5f549089242f4dd4f50afff255d91f53c419f8af29ea21ea84cdbac9a70435346bd1e1263f6fe1db69e5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b