Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
776ca47dd02a72cdf216249644e38bf7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
776ca47dd02a72cdf216249644e38bf7_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
776ca47dd02a72cdf216249644e38bf7_JaffaCakes118.html
-
Size
142KB
-
MD5
776ca47dd02a72cdf216249644e38bf7
-
SHA1
200c6fc55a870dcaad4664ab97f52c330860e2f1
-
SHA256
e9c10d1a24c35b786dc9e5f3716ad03b476cf4f941a143af9ca705f6e3f505b6
-
SHA512
23a45dd8e1a0b869d3a1a709c032c58a8b1f0d0f5b899e26e079d98e586cc0d51c5c9431e6a87d6c342836a4cecd4ac350c6bcc6dfd4b9033af01d73cddca30d
-
SSDEEP
384:g8ltozis60Sm598pauNgSdaQKc0fXzE1gD9tCH3WgiJAgxnU6bIoG+taxRjCDhtO:3B
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{170CA4F1-4E44-11EF-BD1D-D238DC34531D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0bea5eb50e2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428485850" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000009e8a68e7c90f26910259993f39599207796e32977d633f41ca9fa20f53b2a8bc000000000e80000000020000200000004c535fd2400864410c2c0d1d465d7be17276354092d03bc60e603f11d41729c020000000c6138e8460002276173950fd6534586421dc5a2b2232111404fb1c66b3bee6594000000001443754cff29c6624e9452d55403866db8a55ea92b79637f0503ea33097012cce680f3e697fe55d5f8fdf4877d059a0bb6bf2bb57107ef3fadd53916bdac5e9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2884 iexplore.exe 2884 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2720 2884 iexplore.exe 30 PID 2884 wrote to memory of 2720 2884 iexplore.exe 30 PID 2884 wrote to memory of 2720 2884 iexplore.exe 30 PID 2884 wrote to memory of 2720 2884 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\776ca47dd02a72cdf216249644e38bf7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2884 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56678e43048f6cad64bacf284ba4eee9d
SHA1557b60707a34417a53dc51bc6a702971501ec687
SHA25620ebb72eb94896c201b65efbfb9825fb700dc8c4b7d16c5dbd7f15f99668d888
SHA512148def0b695fe9652a66131587da5909fc2fcce78560eeceaed73979b64936fe197d7b6cb9495258a5aa3803e647b8147a9ddb9254b06f6cc52aa838aeffac6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5572f90591b8858070c16c8de398f4c8d
SHA1c2c93d0c747ab533d1520a67b0ad2b6eaf752612
SHA2565f11e9343a9f44f46ed258113cd4e5b348f0362e988bc742b9561eecd2045c37
SHA5127f715fecdb0d9f81779d49ae354f0a16fec0475b50ee8fda16d3d1275e9d2366083893eaf50509192db7421672f98bf7cdfe8ebc8c5a9b9d3ca09a902d24bdf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d678a8a8de4b548369f61ea6f0de8acd
SHA1205b368b2bd545da3bb81b44a5b026c13cdcd037
SHA2561c2d0f98226783002f7bb96b07b482d32ee5ec571ea49cce47297ea008c50d6f
SHA5127842cbca22e307f1d5c664fa36338cc2dbe2df8f484822003a287fd4ce86c244222ea9c4f3b7c9719a12210c5f3ba4f0a639bfad99e4443eac9a9dc3db96ea08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c9ac2c14d9f3c11aa6964a101e8cca1
SHA1056075e03565489efb21b7a80269887b2a75fd6d
SHA2568e629398cb4a0162c94ce429520f224338121301f0ad8279dc436e0df3839db9
SHA512aa0be3d7395e4505babd27c99749e76c2da60afe8feb4ae7406484a55662b5fd2a332a6ae637eb7873bce1a41b656739b585a13e8f8f62b95fa3722b53ce893f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57751023b6efe9575f2f7330eeca5c72e
SHA1ac956c756f0092fe1bddeb7c3c2ad90372f2b267
SHA25627c609fabe331d5fb478caff51d08cc9aedc0f695dfae328fc3ec51287eb67cc
SHA51227e69ff911fd945822cbfe739556561e99aacf1d3e4d1e9df87b9e6a031a1f1a516241648bea6d11c74f81727118ae12633ea578608b3286ab9a80d36a4b6434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e1f079fed5b5028d193bd0aaa87ca08
SHA1702efdf8909a513d08f590f6ccb10eaa7be42727
SHA2565d36da0f403b3f943f37cb9166f07db75b936cd18ded3dfb8e686c9fdebf856c
SHA51261b6f8293af1d57ab278ad091c7cf9b960fb0801b7308064ad2b051d03d97cc3b05668966d9f87e575f046fbb635a7b6ed1ef688c0b3378252d3b1bf6f2e4e1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5984df3083d92f30ad1876eafe4d5bac1
SHA1fee6a43acdaceceb15db6a676e33f3904f834170
SHA256749090b5131d85e29ca2332cb4422ad7cba91fc8518f0cd04d1e41944733d7ea
SHA512e58c2846de230baa0db985e6336f876f10b0fad6d3f550b578d746991b27790b8600425635fe455d05b5e757326d0e7ef5528f95784c2734db0c697cfe85e4ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d76b77a1c37590b9e2a13d97cfdfb5a
SHA10e162ab5fe42594487be4132dbe671c0656ab465
SHA256207384cff909f5da5c61be1dbe6652de03e3af8909341035aa3f311e085c8eb2
SHA512abd80c92341c62de85e85e977580e8e8d2da03a7a07257797f015cf6f4297e9cc4437468df35b0f53d48a53364a564c892dab0629acc6c355ce1db74ea598cf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c74c336e192554f670b180825a0dda44
SHA151b1726beb532a47ea5ff11b01132918a250fa90
SHA25674a23f5e5b0f3f772bd4724e44e59bcd55f181d018743dc66948df5fc4d95ded
SHA51270da09b728cdfadd9d113aa2aa4c42300fba648fb45c2008bf4685cfea673ffda5800bd508cea082e2d1cbdabd661f6c6a7ec28f54f80e9caec2b5f5ef101812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515ad656a4c7e7376f604fcb8830eaf93
SHA1f7c28c0d6f7f09faec55ad283c35c83ebb1bf9b6
SHA256d9df8fa5a3e1faba447e5b6922d5c518263ed3d8b1ed707f033065ef95f6f923
SHA51267af3f766d0853f064a41738291a97c01d4c1ec944b7d764f25ec0781b2996a6c3ee15a07582750d1854a0cae2c028f975c5978d02483d5bada7e5094d4ce1f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d5d96bc03bf90c3c0b8caa7304e9826
SHA1c49d0dbb78bcf6c7fb6666daeeec172133ea97d7
SHA256c70da9f4581777b3fdcc278353cfad24d5f4d66556eeeea4815dd85e8476e12b
SHA512426253452b6f49a656da279a848d13270552f4294c54c011d932f9c10de1c101f93f9559f828e53d1f214c17ad0f074d0276f0b058397f4be0324f7c7f8e2060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ac5bad06519e6a368e85a1f844a6b18
SHA15a1022dfefef0af5cc113b4c1272de181aa07778
SHA25639c1297b8edf0d0e8e971d552add4dbcf69706a2efcfc91dc7f14e7a9e9e0cd3
SHA512050a7fb16a904aacd90960483c972b7bbf63cb1b82ff96eb32bdb975a2d039caf0ba7466b2b5b84f3d7de50e8acf7d033d7cf034b7249b3ea3ec7b63e4eb0877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db385aee15d6968a3123e06f08d68488
SHA18fae8ecbcf4e481734cb5296fe32427f3bfa93a7
SHA256d8d7101c47f5589aad7698126403312753496dbc894e426cf579be0054548de7
SHA512081ed5fbaa46ded837cf41424461fcb556a360e649567179f67f1e40e86aff55af62c831ac30f14ac945e752c11c2977b5a565e7db4322723595cb31f91d9ed1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9f6d5ab32018558fe506ecad7aad098
SHA1228cfa9a2a93e7e94fdde63776c783477be57c80
SHA256150cd92b4b8a1bb9e587e405962486732dc508f624cce710a1aa84f568a6edc3
SHA512dfba2535da9c8444c06e19c1f7a775f9c99a3ed122e3b38de4af86111cac8ff0b67ba41dbf5e087c60e0eb0ac878a6a9e759d89dc1fa56952c39e13c2f3ba619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b2f78b4372528c33ea9714155e4329b
SHA19d0d9d118ee597cd207d2c04b16e18d7ba48745c
SHA256e4d887a88381850e10168c594d6533a588886bfc552c63b31ebec781e52ca509
SHA512f85bf475da86af043758e52395da4d285d21ccc652e4d7be40ff03736b374ce19d55da7e95d7db320afb744917368324fb5829722bf018d0f3729f560ac6d207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551afe21166a97e8ddfc8f19a2fa9786c
SHA1a01a86fd00d4cd6167073dce950d92f74d86ee5c
SHA256d8db22fa5830494e15b9fd5c6b8d9ed6da6f7285fc84742d969382118f38beb2
SHA512f1c9dd11b1ddfc826cc12145723ea28647efce6b41a071087ab0bedb94372c8d554faaa05b410b029171e59ccce11a87086445c63fae2c9cedfddbfa1f78f607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553cc96a0700ff890b22022bd4efe5c1c
SHA1adee4006d2683877cace38c1147dfcfb95a00d53
SHA25657cb1d8354d356ee9721f3e214055e7da6ebe10be7f2d71104fcca8a6be0e2e4
SHA512a015a06a9197ce00d4335931c372782e4f6bcc67a0b1abb00c7088313a7a702b047ad4b2e04e966805307a8349b6a84f0c436122a151750dc6016bfab3d97d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2d3bcea75875d7165ee8c158b07c1e3
SHA143c55d3204264711d0e45f46a1a738f545fdf46d
SHA256f1377e85eb7c0bf389da24ec79384189c0beb95dac4293c06318d7b52ecdf6f9
SHA5127c10047cb5bc1e5bb4f11fc1a1657c05d25e30a0994eefb2c4b354ac0ed238f61403b54b80c454c27fce4d1ab6f32fe1626c2f75dfeb4fcba9def26e9a840cfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce502f38cb9fe3b3553c292d4db7049e
SHA1de1fc6e314a3316b98b94d287d4f158e9735aa21
SHA2566917ebfa012828d92f08828f3b103eb2a609a563c0df8f5a362659a5d1f6537d
SHA5124968c304d339aad45cb26719c94625a9bd2fc9ef008c180d8e23d28d304fa138ac194b47a7871f3bb1eaec6d11f326e292733c59c04f8fd40f4e529e1fa5ce68
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b