Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
7763b23e2c96384f340da8e57baa5d8e_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7763b23e2c96384f340da8e57baa5d8e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7763b23e2c96384f340da8e57baa5d8e_JaffaCakes118.html
-
Size
44KB
-
MD5
7763b23e2c96384f340da8e57baa5d8e
-
SHA1
81c082aa6bd0eb4d1ca73d3335f6afb564ab0f3f
-
SHA256
463e312e31d82d49244f9b0a1a989a35bee3a8a4346f5406d311c97691bfc3c5
-
SHA512
68e0b03578e5002ec4cb4ad03d7fdb3d452d5d94d19264b6aae30353ad2c78b6ee1cb44a48352bb73a3832a359522308fa929365879f0cf0a78a148e811e7f91
-
SSDEEP
768:Ej3/tPMqqFVecb4xMrxpaMBxu7MpXxzvnEaQ:WlPMqqLecb4xM9paMEMpXNEaQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f9542f50e2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000d708c125584598f7bc94fd8a1a9f29eaf3c7b2d1bd5090877fec02c5417d4916000000000e800000000200002000000039189e6c76daf20e922566801e3abc8d7be9dc6d8464d41de2bfc355fcff344c20000000b6396bf56399af3b38b47fe0b892f6fbd4c903329ab8a0c31e63d2ce29baef7f40000000fbe289328e268fd5365e43e0479fa115ab85c69b9141e865d49ce27bba37c23412464b66bf2d52c082e236958c4179fb56e462483c772f2af30a9296ecc091ba iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428485534" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5AACFB21-4E43-11EF-B228-52723B22090D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 3004 3064 iexplore.exe 30 PID 3064 wrote to memory of 3004 3064 iexplore.exe 30 PID 3064 wrote to memory of 3004 3064 iexplore.exe 30 PID 3064 wrote to memory of 3004 3064 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7763b23e2c96384f340da8e57baa5d8e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1c6325b94713f409a0d9251a2b5b209
SHA16d1123b7d0a5d20a517d724bab6e4192b27933ca
SHA256737ffad27d5da15b29f9eaaa50bca41749deaf747ed8cc43db9a39687d9b70ac
SHA5128f58d623b8f342c958ba546214843c35997b54023c0daa8235656b74c05acce23e90ac50e11fb8a13eb44f5665f08352b940100ecf6ced0e86b7b09bb51990c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57de87926279b4dc997b7b50f30eddc31
SHA1588f769ade7f4e0d49911c9cd4a0da948c06542c
SHA2569b199121fcbf89b755b671bacb47034fcefd750e6cabce6f2c1504f7f352c7aa
SHA512ebed4671e7c7f89646680a8c1f0414e1f40eaaf0cfde6df255de02367d62fc8c2b13bca8bcda4e3177e3f37ba650423ca807ce854a5ecf8eabba99c84b4832f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525f66f75211a4e573ee7ccafedd96ce4
SHA1b40795ff118ad29f309053de359f6845d44ecbe2
SHA2569368acbf916d8b047698428b75f42fcd74534f8ec2a92ec97f3d90906b58e7ad
SHA51291fc247b19ffaae519599aa3f91d41a89eaceb78e1f53ff85de7e5ccb82e99c5d542e7e873c3881164edc7354892701798dfbff786949cd074312a9096f519e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5504f8eb80ebfba043be3675938256da0
SHA128f233328552ae81da41e357af09993661d4f6aa
SHA2568765aa0daa9dc9f54b8b04e16a93a228167fbce4c7bd490c6839ff27a0e534bd
SHA512fb5ea39974fd82f0b2e5a7a2f97f35a62fdbd7d5624e1c3375dea28badd1ff1d68b6a8367c27abf51a20455a517924cec20170e72bfc79b4b91b87c39e691790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584a56a674537ecfd21b27b5474af5857
SHA1f4b746e0044acfb6c6bc24db02d43d084e8db144
SHA2569940ece9d44d6202582e995cbbc9f5475bb4387e441c549aa8454ab6e71c24b2
SHA512f8f5806de3a3e7c2b7a7d7ec1796a1ff374af4050c2f6c6c806385b4e364ffe5803a5c2e0438c51080e9b6be7887630b8c9acc380373bc3fbac6c630cac0d839
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50699472aa0613303e4217b0d425ab79b
SHA10a368c11a31d244c2d6b0e6da088c5894d892059
SHA2563035e57edc4981f0e4e831f31cc0f751e3aedfa2d10ceb36fc3c55af0224307b
SHA5125682a96c84a4e61018dd2e8aaee868d016fb6bc8b043a889b539106a8e4b9ea0bc396abaa0d56da7bc15069d1f1b6738bdace04a8ebb9ce31032bf2118d433fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ab35a838ceb2ebdb55463d629b04b00
SHA1b507c11998da0c264cc226593050d93863042a85
SHA256debd0882979ef7d8aea492af4abc2ce9b62f29a36e696c15f29d7e61c9c3ade1
SHA512534ec53545483f0c75da7bff13fbcba29eb09af42d997b50298c384abfcc5e21d12383fae0d9e20fccbb8984d8e2575856e77f5b66533750a9265f04a22631a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5087f90839c74745886b0cf3cbdb087bc
SHA16a91edc628ea3764e82abe0f5145397960ac1f46
SHA25642cf18cf016a91ff6d14e84dd452ed4b8e981c1c8edc56488e32d43189833398
SHA5126c8e8bd231da558f58e2fced522751f5a0f7f29465d32aae160978cc14e29ab70e1d95002d3d6030f976cfe94e906ccb6fc545eafcdefa7f81b379e13258c6c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5898b89dfc9d9e784212334df51970e14
SHA12364dbad5017ed8bea496443abcb59d8e7f934d7
SHA256273271f47e32bd73e717df53026df9accdc8dd30f162bc25dd5e7d37477abf1d
SHA51203f0fcd9cd64be410fbb67f5cbdf32fde2a14048fe318e511b1b301c34c9ccdeab0a3cd07f143b63139ea24edab3cb3f51a5cb6d1080e3a28b8d55bf45ef08f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6df2d3b1292a0691c8d6fd39e8c162
SHA17f697a56c8c2ba5bd542ac4d599e67f36f29c4d8
SHA2567c804d1c8e4e7440a8979995a0d6db56f30f071d5efd235dedc325abd08c0d63
SHA512ae531cbf1c976cee49073123a9d2395ea19d15b8d05c9b4d749441880d4defeb36e1d16e9ef26e224a38e3454d48b4724ccca3f13c3e5720316e0dd2c0c0965b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50af572373b797eb6b4940159e70a14eb
SHA134799f8d3831a9dea144036c02c6d81ea984949e
SHA25608cc68ab8835b9e512202a6fb3d1d59eaf935a336b707ec0bdfd77916e53f95e
SHA512ec9e6afe9dd2990d59913bd6fbb16efc4cded6eb6301edaf9641a97ff27b208f2b9c39a7c94080b21dbb64588085f0b0b5be1c3f9fea6bf05ad64e05a2da3c52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a368f7a5a57a851ce2e6ba52f5a4f59c
SHA19c9f4a0ee06b4e40792848f6a5b0dc004801e49d
SHA2560a3b83bde0df4aa929ae72ebe9a3f749194618a58138f853620ceccd56a841d3
SHA5121345bd8a80e0a8d28cb86341d26016287c419eee961f325bcd72dbc02983162d71b8c67f19a05319e704d4de187be26c7e930845d69c0c14162748023da4d126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af2a51836a292c5c83bec0e85df37423
SHA187223f7f362e2f375972779154fef3aaf72cc517
SHA256ae8c4df7e26f694df4c5254f7971f52305a01d78254c46857f07fa9ea05e011b
SHA512b8174cd31baa067ead29c69911efdae336e91e8cc4f49fe1aa0166dc6d360d9d4ee16604fe1563686f5d90ff5274f5aae482a648184ca4078870850ac32aa617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c75284df9591c735de3eb1d067112745
SHA1a63988c65e88ba04ec65ccac28e7de92b8f5e673
SHA256e001332791c7e7ae05ff13614c8b2b2fdeffa4f5db164c61034e071633fd3212
SHA51254f975dce7ddbac0a46e46c96854a92f968484a7ae1f5d0cb6f785a2bcbf51316a98e56d902fccd0213073d120b4e00f7c3b72d9336a9bba7bc128d407d8f552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bab3b39ae960c2c77355e0721cc56ac2
SHA11c6058e6a8eb1815b268903aab31c8fee60085fe
SHA256df635ade120acf1ad3f851861d070a2f576a614806f00bac6827b580e6cedabf
SHA51229de6febcc4d2b6412b2a3a23213c66663216423d021424a2beeb767a3e676bd904884648e70d9e3d927d8966598ea46c660fbcff61c7da9467b68d62e36b318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afdc99de95794a2f901168c2361b3748
SHA13e6bde63d491466b70b7df3f1184f4d6e017662c
SHA256e5674f156a374fea43a21c6675bbfe838a7fcfc537bacdc6492b5ef52ec42fea
SHA512d72a8fd2b0c89dfcd2ba11935eed905a32d91fea3f781244f00d7fe6e6b22b1bd3cb15961db13f008e8db15555fbc97aea1131c3ec6f4698ebf72b1560a08e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5967c1edbc0f7dc939dffa5e09fb2f9b8
SHA14c6a60a2435388ca00deeae3b445d3794fc99ee3
SHA256bde608f9c42627c91bcd2b5783c8a83df6803319b8f6e5c2a4f5916940eceae8
SHA512883ca9ef876f027f323434addc945c31802c8f2b12b9a0c105e17ec15e4e7fc82202a4ca648d701244dd07ba512fc80863dac6670b3a1937436d5a16d4a237c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f6f1457a92b046af68aaed13c2ed436
SHA161269b577bfe89b01f0b9c246b97070462f54fbb
SHA256f438b27bf9991d8c07c405fce6c346311d5cb4ab57ea2bebe4be294d27b107ed
SHA5127f3ca9aebc1f6fd4e1a1d524dd62f2b1a041b484fd170606526696798674b2d254e5a1bfbacb29484b0216f9417da98cfae54287828e257f90743f6db62b6fdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551bfbeb987533abf914a24367f2fe2ec
SHA1f653eb936e352b3c4e856ec0dc75c6cfdf7a09fb
SHA2568a8a6d9319f945abbd80e6fdf3480da6e298ecdea82bd6a553d50909a3a8256c
SHA512b52a69e98efa0dacea8f11de03a6057d05fbfbd0a9b2801c4149ef95c3559541efd2136a8a13874c1f6b005b8da8f823b559922163df5e1c423c17f0f08b0b6a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b