Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
76f91f6bf66b09f309142dadf730adf4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
76f91f6bf66b09f309142dadf730adf4_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
76f91f6bf66b09f309142dadf730adf4_JaffaCakes118.html
-
Size
44KB
-
MD5
76f91f6bf66b09f309142dadf730adf4
-
SHA1
a77416febf26e547fced48b0bc1fdca0b43edaea
-
SHA256
b38b7df68a41f9ade4aa239ed2aac03f379684e7e680cedf0dca84b4c8c8f8dc
-
SHA512
febf7393cee24fd13b653c272c26f179dc996141b3bc04fa4353d611e8d7bf9d691e0ba82bf15042001592d8d489a035c44818d0cc0ae3b6d11c2af3eae5a2b6
-
SSDEEP
384:v3BplOpV+W5VM9M5NIgnlUt11Tz02XIZqNHDtz9ueKxAhUVhdypdj0PT86JabQIF:v3BpeMAIulUtPTwUjTj286JoLlWa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D6B38C1-4E39-11EF-8D34-5A77BF4D32F0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428481298" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000ea3d0856bf1f30efaa55311a3a82d6f22f3a50ad9b8899fb710dc5ee6bd7d1a4000000000e8000000002000020000000b6199dd14342e7801ccdeeb7f62516e49b911657866ec301e650b308b40a228620000000a32dbdfb25115ddf93769ddca72b5fbf3cbcb698d98eda291ffa009f79fc9b9040000000fd4e136f92b81ca19142d24dec32f3c481134b6a6484907d45d3d89f2847a4cc8678a60b3759a547462f69c8a49fc64e2a2cf904b9035c7825a8995a394c5118 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e69f5246e2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2732 iexplore.exe 2732 iexplore.exe 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2956 2732 iexplore.exe 30 PID 2732 wrote to memory of 2956 2732 iexplore.exe 30 PID 2732 wrote to memory of 2956 2732 iexplore.exe 30 PID 2732 wrote to memory of 2956 2732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\76f91f6bf66b09f309142dadf730adf4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a53768f5c7dae15a08134e400e75eda
SHA1bcece3a97bf6a9fb5dd98341157b35a9d1c44c46
SHA2566cd3011b5b37e0ba56659a4aa0ed601a19dfb7ffe804e199c6cc5eb53fb46bd7
SHA512a462d6a39fb698231a5975ef76f7fc880c576fc8892ef8529b9de01e3b141b75cc069ad7f7d0b92f2e90de7464196502dbeaadf376734cb9633020fde4e2fe83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eda0bd5fd3c397bae898614f7c99e0b
SHA15deab43c66e8044d65325f9947e8703bddd78a17
SHA2569cffe05d3c299d72e14a649ef7cb052c8c1889a59d616ef8257c445965747cd4
SHA5122cb8b1337950aa6925feccac0eb478b3cb8ce444709c4a727eb80d19fcfd822679b273efe3c9256c1d44bc6498c0da90af4911e2f16f5066f990877274a67dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5630ad7c53ecb94cbe99c273bd54152d8
SHA16037189a9f688d51437d4cd46278560ba27d9a93
SHA256b8596e8b9535b81c1f31468e757eb53c89bf1a816d1ef3dfe6c36798b990d1dc
SHA512e31c2bde95f85ea09ebea6ce6601c840d8c3cec7d64d496f0417713228911748082d13e5f1917d4c72ac19d8e785b8c3667b68b16bd2d08c09f7e3e78fa19e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bbdd31375cbb89516ed971105f27930
SHA11bbe5bf36aac306773dcc7d94966b03860a91237
SHA2567500255a32c9d58ab6c54a81457fa867e23dc688bb766850c424444d89e1c234
SHA512634d8b4081962fa73d129db8022d6c0e6f268047929dbafeb0cea493d9d8cee6f0182a56ae5c0d4ee8ccebcd3d4843a93d4929923b2189b9e6bc347c6e50667e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549182f304a00df491f80c609b4303ddd
SHA1327f04b9ed0332ff2329c62b6f9655ce935ad43c
SHA25636559009f29969a6cac6ea6a40fa3593874bd16dc8f773e9fe5a09d5c0d23e6a
SHA512947e56084adc3d4a032b8b51a048239798459f72adca6784fe79585e97829df14ba5df8a1d0fa669edd22093e9444f33468c54d73572b8355d9a628da6bfd01c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6952ecd5012b75ca2109749693537af
SHA19b3fa206c5d59be7dc9b127f483ee0775a145bbe
SHA25613a6f43e20d0fa82cafa1bd8091f6ffd55d2540f0d584c71290aba22a14e1e57
SHA512bf7d3e9e0964cf943509c28c096c9b8e7d4aedff64f69af54c546d30cbd20ae029d99f5afe3c766b0d86ac42bfadcf20508bff0eca4a0f0c629a79e8167558bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f3e1429353e7ef9f6927210deb34600
SHA1256edbf6634597b15de1b141b4abdbb714746fb8
SHA256d46eb77564fec068fa5e1df35783ed6408955ae220792b2d3dae1dae157ffdcc
SHA512a3148236af8df7b76d4394545514bbce571a1ca891eeef729a4cdb1cc1ed2c991309067f7cbd8dfb6282c149156735b04b03bbd233f9d7ac7bd82d134f168148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf44966e1bb30dffc9d80a7f9952782e
SHA136d6ccedef59425a3055ead611ad5f41562b4b07
SHA2569dcdaed0db9726b52a8f7117970f6aa0a0a4847f125a21ddebc67e04a82da86a
SHA512cece2f10a23d508571ebab28dade3aaaed30272c6bf800cbc39a6740146079abcc157c59bb32482e498c46f8cc5ca3dfe9a87178629a531abcff1feb86eb82cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a6d616f8b3ecf6c251497f134bfb688
SHA1d697e4abb3c71951d969c1a0ebd28544bc13cf93
SHA256efe9e5d586aea38f2bf307a78b120b3aa15e792e50cbdc781b603081aef73566
SHA512a6747d141a26084c8de3681e27da658b94fe816bb107b62ec0eefebc398b238af064507ba1dea384cfeb604374f777f057baaeab257ec3611df76f5b97c7f981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583485ce5056d18d25e15290f334ef52e
SHA1f95a8917473c530ac9134b5509f5a2c75b408749
SHA2563ebb4a867034d933d916f98139faab6ee37457adcedaa7a2f04f132528a0e575
SHA512a6999b57d48edd88fe8eaae16e7a50c110437baa9b8162290d7a03bedff9139cf4d0449a5dfe419820087441bb4fe02d914873387e64a62254318513ec0c68d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1650d492675f7e8e099d90f0fb7f179
SHA196fe6b7f90c01a746b04edc7a2e81bc1c37cd264
SHA2569c57a6523bb87003eabe75ce4acde370083580faf8a462b3ef5450b53bc14d7a
SHA512e3f6ecaa589fccbe076a22e8cb5231a06bb09cb01ac0509b769d9505ff202155863c0d9d017c4c20f15ecf3e42a13bc10e9e90d395d58bbd815afc5dc8e6a99f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb0e3c4ad56be9e984d73395289848b
SHA1a9a863b5ddd4e0ea72c8bb4c1a1c54f3b98286a3
SHA256d6b6d7ca71d66b434e7cdf69c884496a5f621aeaaad01dbcce03a9adc1bb24b9
SHA51266cd2a59f2876e0067dd07d0a564da4cf309909dc571322f4ebf4313dc543e5ad312e20ecf645cfed296a91e519b7b012b89d393e2d8b4eaa46e0307f4470ae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530c303c679cdddc928b9a354371cac86
SHA199d1aa397340d9fb082e056188c660cd22a42bb3
SHA256426115a0549f479fe9ead74bb48020ce1396420d733ae4e955155965f3161b6d
SHA512db89df94bc6e47929a4d3d1360382828a0d13d6f733d5c3fa1fbaaa6ec3a54d24c0c14a5a7b7c8cc21958f9ff10f176315d4f8636a6d695ff0b39d9ea334f8b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580d1ce67dc13be0d2a3c0bd1effe0663
SHA1d70eef3ba7ea24dabd2c8bbf779bcaffdc1cff96
SHA256e0e45c70ed1a24b2b57c40fd5bfc89b3571a79b285cc5e46892e0f61b49f80c6
SHA51203b7e7361b1ef6bab60b1fb68869affc80d7427eec0ce84e0e9f3cd44e6b2de0700458c1da3d755b8c716b1499d74f41808f48b758d461ff68d5fb848e066e81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558d19d3b59f35bb7ca0130e3c500b5a6
SHA10a04dfb767e1888e1ca6a127f674d69a92064f3a
SHA256be85b7ca3bded90cc67eb5ee7773a9c0c3bdd29cdf6a8775c52ba3372d342816
SHA512393b6beb4d8ed403c5760a9b25c1f9e823f685935d350bce7f79b225bb6155ef514aa8c665903a9af8b8a6f581447ca775bcdfeb8d08a0f1e2819b2e05ca22c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5057d9e6c3f12e6fc7a3706e297b6e7b6
SHA1416ccacf53ef7b74128b9a40d33d7bc7b8470c70
SHA256d313f1e524ffba9a4b96c879352089eba00d71512ecd471fe837dcdbecfa1d69
SHA5124f8eb04dac163fa052cb8f7982272c2372dd3296f6c40421f81585054782f8e1c292a0ecca3bbe6a8b41efd9a7a2aa4d052f130029bce4d8953c377b3147f015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58517269eb0311cc26c73db9e416c490b
SHA1a04b2ba1b0345fa5952e50c729b31562fe09c8e2
SHA256e580a1c9b8a9089a41a42fa4ef968249332a476d3ec09e34efbafbb02f2ff6da
SHA51288cad57d5d9181567fa6a2476a1d59a618371a2ecafd877d5507c109314edfd14f21ebc66800aa31f388a3823c42bb976695d32f4ba97d2f7036b4b3c92a6111
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b