Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 08:16
Static task
static1
Behavioral task
behavioral1
Sample
77801b10fa14b0f5b34f6c92c3beaba3_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
77801b10fa14b0f5b34f6c92c3beaba3_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
77801b10fa14b0f5b34f6c92c3beaba3_JaffaCakes118.html
-
Size
53KB
-
MD5
77801b10fa14b0f5b34f6c92c3beaba3
-
SHA1
9180c8dd426d28e0e0b1afe55f39ac96d5b0842d
-
SHA256
57a15e4616fd5f3fbd9f687441d8e4275684bbee86687a1481dff3a921932c53
-
SHA512
3529a33ec7a197760c8c184b045444e76d23326c99c29989deb65c75cb473ea020725bccb5ef26c3a65e5edff39a05666169f28b5dce889376779fdc8bfb8269
-
SSDEEP
1536:CkgUiIakTqGivi+PyUDrunlY963Nj+q5VyvR0w2AzTICbboou/t9M/dNwIUTDmDN:CkgUiIakTqGivi+PyUDrunlY963Nj+qs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428486696" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E9B51C1-4E46-11EF-880F-D61F2295B977} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000aedf23c295bad0f591b11c81be3fbcff864925517a64aa009b98f9b644f18ebd000000000e80000000020000200000007e6d1f4e09fe7bc9d9de7b2d2ef91c7e9b2864cc89c22f0d96594e4125ec2cb320000000914c82f91dcc52528ec1eb25971b67d4b95d42020af06db361d016eb32defbaa400000007d6913bd2319c2bc4693a48cdc6b4dacbace8322ec983beb1b1e01b4ab5df56355d97fa0596d9acf0393cefe9becec9785934c09abba201c86e21ed59df2d668 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40800be652e2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 1836 1924 iexplore.exe 30 PID 1924 wrote to memory of 1836 1924 iexplore.exe 30 PID 1924 wrote to memory of 1836 1924 iexplore.exe 30 PID 1924 wrote to memory of 1836 1924 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\77801b10fa14b0f5b34f6c92c3beaba3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5839db24d2abe60191ba9c6078e613de0
SHA1a78cb92b964a4e4e22be863b4541c4707c40420f
SHA256ce92f5e051533c79c9fedbc21b77b44015e41c348443d7f6ad2be7b764b2319a
SHA512b2ea0eb0b61ebbbc6cae83482fcac0c25364d71f4cc75df1f9b2583233fa04bc6922e8f116e825aed695f7d3954b2b722a76328f22a257ed25db7783574de350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561aa2babf3cf371ac8359802d74b60c2
SHA1337f43f83ccd473d826ce3b0733ef2490ad45397
SHA25639a69fa76ad3a8547cb5b0a82677e497bad2264efb510785c72babaf91f1dbbf
SHA512e281dbfb80740c76451e7cecd6d682a22feb526a5caf42cb37d9f4d87409230a50a5e02d0413349f7e2a8a1fa4df193bb294eb59744da99aff46511b7dcb361e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5af99b499b9b0603bb8704d0fb58786
SHA1d0fb311274a4f067e64ec52462f1d260e236a707
SHA256fbbc3b3b29c7c0fbd46f2aa9d382b3eb1155e1939b592d58894ba28ffc86db16
SHA512eba6c8308fa04cb151009eb0df53b77a8489d34420d97d6c75f3ce223cdd24264a652a806e1c72d96176bee42d0496c9d0bd8060d695fef9b2cb9ce92c7ac1d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ea50c47c120479594748955d74dea76
SHA13d2f95f7d9890d9fa034343f75ef5844ee8affde
SHA256cc555bb1093e4c9a4f049427c01d97a124032a7d2d8196de48c0458322d91dd1
SHA512bccfa9115a112d3453b38437a43a57e52273c27f145db3372f3be41bbee149e9fa8b4953575a1d1149dcc84d27ccb15b8afa969cc5298c1fd9aea1f65e9759f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ac57fb7275004265ef18b618afa180c
SHA1b18608e61a99cc137b321e31feea5d7272d294e4
SHA256a54a6aae5cf4a4b86ac3ba461e622ea47f3a2c9bbcc8cbc6aa1114d26cc98a9b
SHA51290c7b8200f5ab2b98484c2062b2d3443067c0aae15834ec0080233314c1a51a35eadf28f99e50f143e049741dc1f66566980f18442a311b69c3b74c90a6a21cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e19f2a20b0bc241d3ff4f49cc19dd734
SHA177197cb22d742e159c6def183d1be809f5c9d028
SHA25613ecd7f7d3fc9364b05890236522acf821eaee4cc2790a54e740daa4a44a3c79
SHA512d46221348f880d3062ebeb99f303adc5d47d6d986059031b61d50ca1db798efd54e2f7afc9ea59cc4a80066434e372b3a0a78e25f9eca63fe6415e508aab1877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b0a76afaaaa021f3f4753837150f652
SHA1cba775452089164ac51e1c69ee17ce5008dcb907
SHA2565728bbf32b3af956c43b45ef0d250a18aaed72f75734026fa1acf4bb71979bf1
SHA5128942b5e49b840e8160433d96ed055f5c92a083eca26f120967f85220838ecd1d35e51df9c20c8a205f9588e4ef43c0771f3e608e175f89789af2bc30ff016278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52efe67cb74971ad6ff1dedcf7cffaa4c
SHA136e0ed712b5347781f01c7578d062d445d67cb0c
SHA2566747ac19daa066b394742990a8eb69a06962a3d68383854bae54b96dd0b8c4f9
SHA512eda7a093a8d72e54c10e1f52d5a74b4226410dc1416fdb21633587385fa30a06f15d0405154ab53106883f9370d517e0397d63fa17e2cf79f631e69e26d24eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559d954a0a30941147a7d00cf5fa3e5f8
SHA138a5255d7d14d1ed496bf8aee25e87c8f1a7276d
SHA256dc30e071f2e10e90a2598ddc19fff2f0b817c3d698e86a9da46c56728d740554
SHA51229d0453d777b3bb68cc1cad257ef14b0e12401945adb23c7c28219d6fad37fe147db235dc1572620d9dac053337ee598bd1d5ba4de2c7b1e566d616effeee614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6d80ddd6f0b359aadb9dfd5b611aa88
SHA17d2c9abb9a1522514ac41470820ebe5c311d668a
SHA2563779c9cbe35d8a8c3e2cc13eaf6ba18290f9bde2add7a24e38aea80af1408ce3
SHA512848250ce7a88ad3e1f8ea3120e6c75a3c45e605a59bdc8f249e6d3f3430df697c73df6c22728f9734683df1ddfc282bd201da8f1112f0198b89caf512a44362c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c40edc2f56e2ed53f168db645af81ad0
SHA1cea6947d736824b5d9f86e8e28bcc2d65c989d09
SHA256df48508b7a53a3c4d4dcd53a684a5ec90042ab8b0f3399eb28a3e17963ee4735
SHA5125a15f7047fcd39e476a9c1d4f7b21111d1fef09a6cc204dd8a336dd5cd79a82df43f2076ea6186712565a39ad2777ab9bafd711baa229747bc303d8c99dd296b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca7307d3384c1757a888827aba18efa8
SHA160bf7fceeb062371158c081dbbae94cdcf3160d6
SHA2569e0451f65d6754018feb48160b0068599e80a37a2a1b8eee7bec5a4a6b71552f
SHA512f1072ec6915618c2278431c37da052dcbecf44fe75ba4488588c557a7bdacf1d39cba9dee8f138600068d36806244f3f07fa72c91ad30c77e8a7cc383f7a7e1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504cb217cfd0cbc39257c3d36924c8798
SHA195d3c70fe709411a6c1d6890eb8abe6bdd8ac600
SHA2567b362b3189006279a147f70273de032fab9f0b8d296ec77e4532735d454e1727
SHA5128108da93d0367bbcacbb7ed90f5399a3e32ceb13efbbc5ca95a4ca68180f59524e40e4f2462136b51799f314223682b0ea0d91fc64787e460ed1175b85ee1908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcf5fcee3074e4b1e17a35c88098379a
SHA1185766b9b6641e134f2f2a8be1a6798c7481ea76
SHA2569de761ca59bcbeeb5c5bd28563dd34d0054df6d4a519efe328231d2d745d9ce6
SHA512c776601562393ea732b4a98f6a3dbc4dae970021fcb89c85235b810cee7a5a5a9e76e41a7b28cf2fe6edf34f9f05708ac6d4a0af7b8a472984819f9a48eb69ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a055acaa2d292412e2472a5602e0af37
SHA12cf6227db8000e3c97c397b3bdf9df0077e52085
SHA2563deedb884c4b433fabd16f45e45765e6445ab944bdf29ffb4ddacb1b428aa9e4
SHA512781f2ebc87235abe726b219002d9eb9c316ece17f725153785e497dc7c91ccd0cc1334c9e14accfd566331f9a75b294486bf0766c99645f8366b37fe8c5c7e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a42a596fdf4c578d12386c4a25fd0ba
SHA1d770093c93a2d5bf6a8ff43c11a84c6ea16a912b
SHA25628f7b6cb57daf45a931b271ccf4e32109738cda854520821ad796dd537e1353b
SHA5127ed13226a5cd5cc0b2660da318c1c36a793079f86aef33f855568ccb3e6d16c5ce0f044653716a6a918b9a9cce33741b859cf352a896d934afecc125ff83179d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b2642b0159c6777b90d36af04dd2521
SHA16b6c97ccc9b9a363ac527c705222589a43e43b74
SHA2560cdbae7597e72f30b22ea27ccf4fff9fc848861c6df22f2d393f69ceffaf8741
SHA5126ef7ce1a8cb3fa6ac37f0443df245498b8a21279a9fd207acb4a36db82311207d982d49cbdcbf47268c1696971a6a425d153ddc66f5e0f2a2f4e3b07c5681936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc0224316e1f2374f38d95becb4577fa
SHA1a292b7e175662ddcaea5beae71e75ea819ea62eb
SHA256937f39d19438a8fcb343e6283586e4deabf28f9c59b78d1c31b0ba466ea89e87
SHA5120c2b14a6b505c464a92a02ea508329f6d3076e6e5bd0df517fc457f1219b6d6cb55b5238b172e9cca4c73e1a19b2f3c3450dcbff56605b24a213840f52aacc1c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NFAY0EOS\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b