Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 00:32
Static task
static1
Behavioral task
behavioral1
Sample
766270b1e1e39e63124ff6771aa0c2e0_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
766270b1e1e39e63124ff6771aa0c2e0_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
766270b1e1e39e63124ff6771aa0c2e0_JaffaCakes118.html
-
Size
121KB
-
MD5
766270b1e1e39e63124ff6771aa0c2e0
-
SHA1
aa92f887473441958aaa4ffdb88d2875a27c6abe
-
SHA256
3910311f0f3aa855b1165f98515e65de2d000b413335eb753d05ae4c3bbec4b5
-
SHA512
e21646c5faa8a27788c43f523494a48c2c14c8436273aa9f098560cd34f3421db66275eb487c8686db75509ce562b8a0af7e7ee48b3393489a13d97dffe6e940
-
SSDEEP
768:6F7LNx7n+R+gHIZvqaXVVFPZzbfPvaTdaTtXpjW7ePeTlY1XlR+e7skz6myarI44:wcYgCnTdWeRTx6mDI4l13AvguZ3T3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{940EA001-4CB6-11EF-95E0-F67F0CB12BFA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 005f9481c3e0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428315119" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000f948d35e480b4570b72a522bf8368f7a35b0974d99997c7cda1347b215cdc23c000000000e80000000020000200000003a50b376d500cbcf7737554382fc263347d8afbe1ec1461864a2a898f5c5416620000000950cd5cda34cc912addc4adc134ccf5372adde26f9e0c0f7448c18087c46de0d40000000742fc71c0ec04dd8e75cfd95f5586e8e66898113bc26763359cbb2de441858bd774cbbbf07d2e95dff9c3e3b2446538f16e94699130a69cf8d9e2cbbee9eab59 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2572 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2572 iexplore.exe 2572 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2132 2572 iexplore.exe 30 PID 2572 wrote to memory of 2132 2572 iexplore.exe 30 PID 2572 wrote to memory of 2132 2572 iexplore.exe 30 PID 2572 wrote to memory of 2132 2572 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\766270b1e1e39e63124ff6771aa0c2e0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2572 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a6f7855ed5faa19521c6530a8f5e6f3
SHA1d874c42696bea58b14a554171db352622a450a6d
SHA25699f08f31b8813d1a5cab893ac11d86786733ee9718e5cf54af530c4645448d87
SHA512f3e3aeda9c244fcdaac92c94d67e6034202fd8b23ea64e1a11c9777fdada35fb8dd7010021be025b97845727e4caede987edaf2572ef5e719103afe74d3b08ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5840d1e327b513f06d9f33c8ba2591132
SHA1ea483271b8a9ffe590f7ec16513864b7bfddfb3d
SHA2560b939f45ff9feec370d795a298dffd993edca88a5cbe43ab785c2169bd22f96c
SHA512c028dbe27d98eda44654a0a5a6bec5b9a5a1ea61755004440c9277ab0731e6c5b7c8615a15b142b420891628eb4d2cb67a22ca4aeac6a34c6c69a62f1f1f4a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e100a82056e4c2529e366a300a2ccca
SHA1eb42494a58ebbdf6a392901b2121eff71b561e69
SHA256f2db348686cca69edc873466b762bdf5f7e5c994adcaf8f42f40ff8f9c6857cf
SHA5128e78cd1a4dadc3982b2d1cacfc05067042c82e2c5d5ab102dd09dc1e75e0c9cd6c6c9dbffba1505de8a02114060b07ff898aa754c4b39c22b2016a79063966bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598aac7a3ea9f3cc229a4fed766f47614
SHA13221f09ad477a7469f3be2064e96e3cafa5587c2
SHA256aff91f573f3654b8069940f7077b300aa11a37bcf071f6e9c329bfa17334ca23
SHA512d3ec977fc6a3e2aaa2b44b0f861dd0f954cb2296ec4488d1f6f672dc55d0708c34d9db5d12236dd5e35bdf7d5d4ab4ebd99b8803a08b354bbf4d4a4ef2471d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b1d663b47388a697360dca0cdab6adf
SHA10a61837c179af3411ea71f25b49acfa8c87142d3
SHA2562794dab79a434afd65cf57bcd7b5b70b5aef5803f8a405d512bef848cb5cf1c4
SHA51276fc0f5cb4cbb85f50aaae2203acee9b07ce55919a3d0fca702a97a5a3a962ce8db0532abab9b56acfef739b1e7838a875b95d857340c91d7ecea5e6d0ddb9ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53714d42b87fabd04b77f3568cdb2f5d1
SHA1c0a4f613232dd98a1198e43588f5bf9375d4f8c8
SHA2569b23f5620b9e91ab03ae66a7660070ee0d3c0dcf2cd306a346688c8ceae11f2b
SHA512dea2b7977b239616d83b9fcfd15072e2cfdbef287a033a439254ba7ff0ab755bc38597ac487540345ee6ef848084731d6cea5a4f3954d7384252e9b5a6c6af81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5020ed52e9546c08752cb2df95a51dbb8
SHA129efd9b055bd95b83eb602e842861c2db820fe94
SHA2569543bb4e37299ebfa7a7de5daa6a82ea21244150d814e813968f2a1871d9762c
SHA5120bcb2f41cb75ef84fe4050f64a43b288ce9cfbd7d107a20e49f223d1739f34728f2371afd86f763ba5c17a96f095357e8102458d69797d304cf84ee69a0cdcde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5599b2356cdd347ab7ef0dbc8ad4c00be
SHA1b3dda8ca9657e0c336495b6d5e812966e9f62189
SHA256be4c271e71b9c33fdc27612a1ee11d6a13c2a07088b3295ca1cedf89d3805bd6
SHA5129de93228b1263da542c79d60db2ee116592a35e954a567ac992aabe169c349dc90797e7d91ee4702ad533f205fcf0ff7f71990b453ef9415a319de13e39e48c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ae0d82bc8323fe57f1c6985fcb4adc
SHA157ef3a4084ba6bd71fcac107846815e5391d7f13
SHA256459031a4479d2c5ad05e38c6fb5f03d3a6b011986f1d2981475b62b31c30c77c
SHA5127b1508594c2cbfefbfb8be72b4851243e8b3dab52a549a44c11d594fd9dc384cca5851ef84c076b944b15ffd7ea6d0ec13d310df78f4495b7eebf54dd6ca89b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cdb7dc1167c118fc4c2e578f531a085
SHA106efe89745b322df7511eea85507a0402e770b35
SHA256e6b404608cdea520c2fd33c4e86f52776b7dfa51b0e4c6842fb55c64aa4fa204
SHA512d7296b2d7a89ae337e57920e9963f20199d161819fdedc9157f61d304d72069207b7a77580d55725b83f26be0d64ff67004b07c5eb49c7d6392d994f92b2efa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aba9119cf67a646e199044001bc89b2a
SHA1e0a108a4581656679096116f9e635e03bdc0228f
SHA256d95a58d6687bd81922d4cd458dee9e87ca048a202a55b1993a7aeceb6b755209
SHA512ddd046024aac32b508c854cd9be437e6008321ff2e61980a12277378e2c0e182f4eabe11735e8bced4a478a17ee1d702262d01281d9026388cccff2941ab35c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5737b3ae0d9f0a2a28840054b66b65dab
SHA13d551f8c6195fa8e9c1b6b13c45198292687dc56
SHA2569244aff1200d268a977fbc840f302ffed58ae4877d6060ec5c0c59d5bab05a94
SHA512866485436c4db0bdf286b64a722550477cab15085c359e0a9536cb39706db73c5dbb78ad7bd151f294fb069d1c74caea4500b276285b76c9832d1d00a47d8003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5248a7e3ce409237a4be16f1888d9d956
SHA107bb88d18d254c06721561376b95b0c1e3ac9801
SHA256d9be79fe71e66a7d65513b80000900683af3fcf8ba29a9761c1fab6e072e3dd7
SHA5125d36027877a42331a2e302642a139d9b8d5aa020dca9d18f51d8dc8d41176709956fe1624aa7f4734024afa0e45395230b6a7c4e78e17363f5562e234015dcfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567d311e469320052daf2ba95601f22a8
SHA1e5129bc4346d6c9be8d657c95ce4469436ed2db2
SHA25697823569db48ca3303fe10ae160da68b91631752814bbb88c7280c3311f98c39
SHA512226bb049f780ecc0040c76ae3957b5cbe9ba07e71d0ae788bd263e1a9dd66309fe3e9a1313b22acc6e2ef0c6e3e3cdd0fe57b271c245d5f694860e1b756dea4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583539f339859fbe0e0abe4d445e499b5
SHA1f4f8bd15c6efe87e7e3b5701460c6c5960821849
SHA256fc3fe85a70fea24997957fba4474c82839310f23bb21ad5c8f6d00c3dcce60b7
SHA512d268936ebcdc2c266eb7baec091148f07b5fb02a43571fd8895357a108bad05097be199dd69781964539fc33afd8f7b28976fdeba2c3d3f9d80a65c9ddec4738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fefadab9be49893ab6cb83bfe66aa6c8
SHA1b43324a35155b849db9ce904a00276b5f62dd96d
SHA256d0248ee76767f1be7079edc2c3454e95526ed38859822ab7d5cb97eff3805dda
SHA51226765e015a34cef653f3c601ac92cc526e022e49dbce95fbe8cce26245410ec38879047be9e8c20aa6d56461d82785f8fe8a8388471a621a2fb1892c094332d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5794b59a40a93c0023c1bc355ba916473
SHA14c3a5fa9daa238029d0a3eba83e983797e8e054c
SHA2564db38919938e04dd5b182aacdb45a42e14d12f1a9f679e9af21fd879bb924345
SHA512627cc27faed2f6f71483727f4cd858d5e7f13f47bb512816e062a7b4f8e32aa9cd1682a5051f7bd6522be35a585ba8211e7343edec299842d8b4f24af5b62d56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57be3fe19f46b259cf8a94a4416c33d57
SHA1922f3496a823a153d5e4fa268d2d6eef2ff80a97
SHA2564e273b5b8f9c7c09b03627db19cf30960519526a75a26b8faaac21325fc6d63c
SHA5120cf95bc0f28e4ae9c6502ad2e7985a7198c7bafd876d9b183115ce37f61f34353652b1fab917dd12837378e463bf6625af61703de36a92d614fd5dab7e19e142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591dfd8ecc3d8c4610d9eb27e5bd43cec
SHA10804b2fccf8a38ebdfde054ce1e826a38292fce7
SHA25629f6f9f40977a098255c037d16c8187f2e50b784a03364fedc3afeb4a44e4e5f
SHA5129b8a3d78cece5ee5414231ccf5a01e41c47f07517bd4ad742d7ec3e657cff7a36e1e37063279b15c78398d9182b6253f6d431e9deba9a426b21afb73ac14a2f7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b