Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 08:53
Static task
static1
Behavioral task
behavioral1
Sample
7794323300f6d82bfe4632e5fe71ffab_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7794323300f6d82bfe4632e5fe71ffab_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7794323300f6d82bfe4632e5fe71ffab_JaffaCakes118.html
-
Size
11KB
-
MD5
7794323300f6d82bfe4632e5fe71ffab
-
SHA1
818e485fb5fe9801e13f54977553b9a5d5eed7c1
-
SHA256
469b2ab2119656c695640d802274afd50f633ac08b9cd30b834799ef65e92920
-
SHA512
eb2efda7f1c12db7db7f695db0614fb09fd335381608122ef55c890404c35af146cb6d4b8abc491ecca7485282d5801a8c725e731269d6881b627f7123b6dc04
-
SSDEEP
192:SIjlctL9phIwH/3xVyhxI4UFpMKbclWa2/BLDoaoc63LOQyDvfBCLSo9AmTp:SIwL9phIiSuMEc0awLkaocMLOnTfBI9j
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428487443" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e01ba154e2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000007075ce04e52e075de4cc212d690870ebcf78ae857f776b4d533f3b5db260a2ed000000000e80000000020000200000006c715a2f32fdd39bb098925daad288d52c029cd6ef72dcf358dcca68639d93ad20000000ad2196755e49e080820cc8769c05f8b628a4d99ea3c513d4136de4ed35aa5143400000001c2bfa6e03d30f4389a7d805472e8d53f71bb19883331c00aa2343025db34ed40bfbc8cbb9c5c66350672cfeb8eb24b325d235683dc8083d91750e35cabfec0f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC94B121-4E47-11EF-9CB4-D238DC34531D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 iexplore.exe 2328 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 3032 2328 iexplore.exe 31 PID 2328 wrote to memory of 3032 2328 iexplore.exe 31 PID 2328 wrote to memory of 3032 2328 iexplore.exe 31 PID 2328 wrote to memory of 3032 2328 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7794323300f6d82bfe4632e5fe71ffab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa7205e02d00245e4cbd350cf65b4e95
SHA1d30a22ad3969eeaa743fef220316f24bbc32cca9
SHA2568e5707842f7b691c52b83429692f1881e14f920c32d06f78f962862257976459
SHA5129e722f16a18472ab08aeaa8113f2feb77a900f46f65ba0f698bfa56e206c8913b8aaa488694fc51529540864dd57b6206bbdecb46f2a179c92a9988155d22643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c7dc5a975945476ab1bfa063be9b7c2
SHA11dca07924f535145fb8b1a2e74eeec70d07ee8ca
SHA256c9f90471c563ec0ed85000d3e24103df02fb7c2ede94c1edf60ca9de049dcb45
SHA5129c360bfcd60bee97d4401ff766760097d8ee9f04ca8049bae9f1e531bfdc1a8475890b438c254d324831bc0f3a47b1135f79433ae85b68b1aa35d268027ba4eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbadb967f105c5268ce4c55123095b62
SHA1922dc434f0271f23e55000be11f6ee35b7f97821
SHA256fd71ffcc40f62aa17d917c55ace3007e6ccdd472e1d507f715e7bc58e8196d21
SHA512ae07a805de28630b78b70a801edeff2ef293461fc7a18be570b5f367cd364c88d55816415e426d853cf60e17edcc9bbc9e90a514424183700737026a96ea2e9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f219e4543df6163c692b51260336572f
SHA14de18456729e01bf83f825b2885dee8000898af0
SHA2568ae72b74f3de1df53495434cf4e1053b0da9894e96274a35c208826bcf1891d0
SHA512bfe26b51514d589df1c51e97828125dde8931d2a9d58c7df8716df6676488e21ac0bfb22c59d8a4a2c8d140b5a30b938f7c6a9d279ed1c50bdfe344ce44cff95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ced5dfb026971b93a23eff0391fd458b
SHA12af8518703d2cd662a436c857993af8a3c2949c1
SHA256dcb944164272908ed6afc29d85a2f14b541fd6021c26b0ee64ef75fa67724566
SHA512c200f46272a346050b3b21bb22528e3890782cb2a05845e0633a5b410a12bf529695a119ff7abf6dd50337a4784eaf6afd953266e20dcc1391ca28d1f539125e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5305cfc1fe371b554bc3b6dab93c2f6d6
SHA1821abf8f65328ad6c330ba97391073a6a0678e3b
SHA25691ba669fdc79cd75519a7fbc8fefe7dc7d531663614274e68c1e76e4948d75ae
SHA5121ac2def0f31f469290767a1e234d371044ec023543326f400ee2978b64f1f1de91822e73efc34c30e1357d58c2d7d3d6d66047c9e723101da692aac1fa527079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53324fe7d591646145e4ae1f8bfab3795
SHA1df73bb7d25a3e6bd96e5ba8ae53627157dd9714b
SHA2562b7efe28d2f99bf6bdca88094a714f44934d0d8bff2f88aff17488df8c919372
SHA51200369e9f4903bda1784746432ed80433f8ab9b9aa93ca92b958b6d8e062ebb6892ac73e1aa36cc1f4576a479145061c7d6832c438bd45bb5d738ed410382fdf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51245e6387335679a550bf09eaf6c7dd9
SHA12551257c5dd767929a14a551e5b1be6d8ba120fb
SHA2561a783adda38532699aa91558d9d8d1e66f940c028405462eb7e65988f5edbf76
SHA512edf559185a55e967f4df7fd4473ce8a14ede1548071191447d9e6f552d9b760b45549d021d9173f0a198ace86029b831f649372634f52c65cf017ef9fe4bed7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc107fa5c710994ec8d0811405ae1e07
SHA1bcd4d26dc9558fcca2c30f409c77a9b326f501da
SHA256150800587c2019b43364ef4da0d35454cd0b5d8a8e3e7cc11ceefcf7725cd3db
SHA512e03e8d2547b3a70fd8f902dcdca49902ecd95bf3430efb875b33391b98e72e021cf5f85c9c79198b8faac451a70f708db38fb7110df638414048c975bf31da2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5886ee6284cae58aa7dcf20d472446ab9
SHA1e430a9b22c5f1cc1757d89c7b908acb98e326daa
SHA25699c09bf56a8a5af20079c826a8903673761ccf72890c75f020537f18dd6a1419
SHA5128609a776f7055ff4af4743e1c883a8248faeaea0283ec3eb7d06699b28bc9fa7b5ccb34da03762d884ca12e28cce601bb1a4841155d3d27e9473eb833e0e9e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7706b3953ab78efca0a624ffcc964a5
SHA1a7e1917bd9febc7722fe6ecea2e51735e4346c1a
SHA256f9286af992f9b899e20e9abcfc1f11c7b8bd1e5cf28fd5de431d567237a6bf3f
SHA512f4dbdc266b40d74626048948d839a989ab63ea4966e657ce1756cf6c4a78c3b793d5675b484677bdf92accdc91320dc6e6a2b87980c9e0c915ae1927b503de63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a444c26a99ec8507def25bb3b682fa2
SHA13841f2784b0b34bd9395e6b78b8b2603d91da847
SHA256a2dac71c1047ae8b5a0086b58b89b3a70fe61888e44dc879094500becbe4f3b7
SHA51216e56b716093afbda268a922ebe46d2b11652602bad44a8aeb42009970f23705cd92e687577ac197e4d7a027635c58fb16930e0b68bf7bc27dfdd5d12eb13337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540f017da6178d9be198cdc8209572fc8
SHA1c7ec2b5c92b3ee7702ad2cd6bf80ef1f28c5682d
SHA256e857b29ccdda8d4ea628191fb606127dfd8b8f36f0cbfc63d217a2bdd43d9559
SHA512d15da04baf5d5a654496c139cc0acf22adb472a949d7f8ce644b9c8886ac45a7574ce0885e0df36da89735efadbf63d4d8a85957884571f4a42c47c2c95a536c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542847eaa8f84d64cc962c304b6326886
SHA1b51d26b864602af218683792838abb364b78fecc
SHA2569558eb4a3ef7a1d46f6334ff53265574ed5219447a0349c7b1e3fd36ea490081
SHA512e5947847ba4a08b0bc49fd6c4da470071b2eeb18f79261168ee52e7d1adc47f78cbc57d2eb124f0facb39e5bea765ba2244927d7fc20b248da176c82cc1c4fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5115e3106f026123e1fb4bcb5650c35
SHA14057a87169cef67f4ba448ef5e51ba0e3454c84c
SHA256dab58ba552f00ddac74b085719e6061c8264b1eb130829b523f36f79968d7440
SHA51215a05ad9e3602325b18f2b2b1054d4c060befd7f68fb11f0ed7af793aaaea3740f1015593c5b8cb795bc26f6a278dcfc409c72389f72962d3c38de29def92582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c222ab5c9cdea367b7b28429981c9068
SHA108091b1c1a9cb121b185d19980534734038992f3
SHA25600ca9086a6b2a3f3f03804a11564d6962372483cf2203e105d098181b5988f68
SHA5124e578fc2f279918c250ce533e654bfe4800474c849a8f1249d5bacf838bc7ec360df6d29a00f1eda95eb3ae6e5ea22da364a8d7daece437dc2c468590e73a4ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597d54c4dc6a6d558517b659d02a59078
SHA1febf0f2970b5c273397af6076e8926c0398a0344
SHA25697ebf0f55d472765d940d0d69cf871d70f0e1f7d92cbc41440d8f3e16c868b0e
SHA512567e1d4a2a1ff2d976b2ed21fcfe3f6e0e36491fd6d55babc9fc456ed8ade21e88685cbeaeb300b0b086b0eb2ab4a59eb087198bbec2f988a769a68db27c34ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa87f47338d39745ce1da4336496852
SHA15cf893d71671eb102f16234240e8206871fe0d06
SHA256a7a7f3f5aae86a4d2296b431710faf3d09484421b4bf2c9047de974c4a8c70b7
SHA5124e418b2219c9bd9089ec5e84a6f0e02585bccc5143952e9b6ae80fa406af4094d7d687a1240f1b78ee9b2e52294636e39b6344f19e9ef1717a0aa576756fd731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b96ac4eb9d3018c5cbeef8884708b43
SHA17c2b13436be9adc25fb20c45a2e3da566fc75a4f
SHA256e67416c1d2b0b99cdde4395408c582791dd659b3054ef3b4944c18ea1843708c
SHA51200fa3c8ae04f6fbfff24894ea081889069e8b6b49ac207e57112b74049be82a6115d772027e249b39469e58094e3df6b419faf943aa81afd23e70bc4d0d995e1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b