Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
77f28dd61a2c41de607ffba60e8c72aa_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
77f28dd61a2c41de607ffba60e8c72aa_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
77f28dd61a2c41de607ffba60e8c72aa_JaffaCakes118.html
-
Size
9KB
-
MD5
77f28dd61a2c41de607ffba60e8c72aa
-
SHA1
6f65e9ce32aeb9dbe6597452d7e7a84cf4adfbdb
-
SHA256
0d1be36fed35f5afed99eedf1ffecd492b4d31059e1855433d980928c9325ff5
-
SHA512
9e1db369658dcefcd123bfe552bdcd56cf41c1ce9171275e89f4bd0852feefce34e547493c0137b4f1e58559b3dbe02cb8f7afc99a29abd9a1ed2ba37cfde000
-
SSDEEP
96:uzVs+ux773x0LLY1k9o84d12ef7CSTU/GT/kOEMPBEMFpflVHcEZ7ru7f:csz773x0AYS/+rMaMHfPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c920000000002000000000010660000000100002000000022f094067dc3f9878d77302b48fae13a5283749ed6802a9167166138fc50b521000000000e80000000020000200000004075654309c2683cea4a7ed807869c53a7c6ffa34e5d4625192109f4cc0a548e200000009cca3f7f65aefefac8cdf0a5aef19af6ee18bc0cdeaf87bd4887f1eee78b6e2e4000000030eff1ccfeb0a810c09ca6bb431806d9b408779240cde67611cdbd0521ebd354ed747fb3cffc1839dbf9d3b1d73bc939403ab0dea78ba8a7453d56a002fa5086 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{133533D1-4E51-11EF-8F49-62D153EDECD4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428491426" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10792be85de2da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 820 iexplore.exe 820 iexplore.exe 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 820 wrote to memory of 2464 820 iexplore.exe 30 PID 820 wrote to memory of 2464 820 iexplore.exe 30 PID 820 wrote to memory of 2464 820 iexplore.exe 30 PID 820 wrote to memory of 2464 820 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\77f28dd61a2c41de607ffba60e8c72aa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:820 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cebc4fc6150478dc75b6d244b8428a0
SHA1b661f901382809dfc88fad1a90bacc63c79b0250
SHA25632fb978ac35fd52fb803d0b79737d014431af0ba0e4321c57669a2ad394300d7
SHA512b8d8ce138ccda11a151ef3b24b299993606d7410f01002c770a41275ff2d99407c73631758c48ccdb46d881232814b3f2d69ae60d2d2470c6f7f756f0b4179ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6a345dff61a8b3dc63ef03bf9163035
SHA118b129159a15f5252f5928168f9287aec4da5c4a
SHA2568474b7f07e20f59083877fcae317d7ee729d0448125f00e76b5023b03e333669
SHA512735550e377cb68511a8c5157f41275410fa2b3ee90c1bb1167b70057f744de52810c1ad53706bad9313f52176ab725e7937b573b14396ffdca5dd523a9e0fcca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df43b301dfebfb49291307ca378db928
SHA11f57710231ef4fd2042d278d76ac126ddb3190b7
SHA2567a2ed2aef2245892a1ed368d88b95e2bd0409d71a612643d5b25764cfad731ef
SHA5124e6bd4bbd56d40d7671e514f5c6e33214e6dca14122adbf0b4f3883a2afbd6e1e3bd9ca4b3cfd1dead896905396bb256b7b1a06d9777322e082d669d7357037f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1b203a2bde7df03571ee7947cc14efd
SHA1b99fe324a4dec24c00cef21ddbcffaf2f4ca49e8
SHA256ed26e70c7d7f7763294b46a67d6ea0025bebc3d76740d225acddeeeebe1c654b
SHA512576d42cb45e704a87796258311aab8ebfe30f662cafe1de2eeb9b6a6eb6fc8150cf5c4c71be78ac8ab4d94c1421f498f1ea1cd3e643dba4d532a8fdf81f0ce59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c3ec98a9e934b04d3acac39885812e5
SHA12658a38731aec34f3d3967f21f15863e4eccd709
SHA2562cfdcfc82d501a402b8c6547e72fc49a3a9e4685d69afb6b129ea0c218493eb5
SHA5127f6e8601e589b93f47569912fb10a49839ea10ee4ab70cb688701eb24ff74904512cd53dd4821c30e0af60e9e36b14863eef5c55536525019421cc4beda52579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59888e462e27489746ea82e7249311f8b
SHA1848109ba01fecc6da9d01935d3cdb87a58c9c489
SHA256f1a59863cd8bd312146f388517045f2b6439d9965c58dd65bbb5dfedc152ea46
SHA512eb8e2de02b3a44e2081d30119a3e70bff295d8d1eabf415118cdf897f24b9c3c06d2336a0366d9c69ff8fbde842ab4a909791bbe0a5a5616fd242d985ec3c3a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a033d0fe927d91d5c9fdc12fd9d1f0a
SHA1e09563367716e0ef44cb0ea1cacc6ed3b3ffd561
SHA2569bc06c19e07f4b7d86de38bfa066614a5704003bd399a3b53e9e0e93397412b0
SHA512555f86d1c1a4272fe25e6f15e5a9049100fb5eb503b7b7602e9359b8c4be0f289addf53e68a5f742e7a9588f0c999bb43f0b40558a574dbbb11b8420f32cadc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5643adb083c15b50ed5fa964664f7b7d0
SHA158ac238bb07f167e2b06c3154036233114f73265
SHA2564317720332a2334a7f052444f7e77e42697a012a7a3e5017d389356bba53c674
SHA51268d5aba191921b94062bafb53e13f8982a731312afe0b413975b2f5b411aa0f466288cb3e89e2ea9fe69671c21812096ac188971d8d48ab617bf29e82e40772f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f232053b966c2004b8c2d64fb56b6796
SHA11d59d3ab24308e0fe662dfb781d722a924e4b42a
SHA25613fd960226dd5591da7d191b31a17289f39b62e1e5176c41ab8d7149f06f409b
SHA512bd0b70cab0b63ea23dbbe32aa8b451fc89e51fcbcb54bb6304bc4d616594ee4a322b78a4c9f1fa5f183237d1913882ad07f18016f79d461797ef9abd45ee6a6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbb147d8bc640e559cbbd0d1174daad5
SHA1ebab99775def9ea0859f4e3c1c1a0d3db6650c2b
SHA256cb034f9fe0e48f78657320700fb17f7fd7c62119482e7f0d427527c6992bd37b
SHA51242e4a5884afcc682d088dda5a40c80a911cd478a6c3036a057daaf207ec7f77daa7b1cd6e264bfe116c105531345404920f47a6ace9cb569dce04c5bbb6c4dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ba1713f1d9a7a3164124231f4ea9f1c
SHA1a63cd6ade908af5974477a98bfaddb00f9ed3b8a
SHA256a13826d32cb4cabb58285eee2a604b08b01e07f5a9cc8e9f34edfb88b3f6b4e1
SHA512f8898cfef5ed81e031f4d48a45a94ec4fae03bad21cf65ad9865d48ab40b479b3545293017876fab08a95c11fcedeaa1dd41c084d34daf1da290f925fe4f1710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5e93fbb7fc944ab6c28a5edb01e575a
SHA1b7c9b3b52ce0ead961270e25134162f41e7c2d64
SHA25648615ddde69b5d3980290dc2c7408abaa70df291f658bd09f0452b2549f5b5cc
SHA512c1ea0821dfc84f79806ad475309ddb52c78b97fe865dbb21093555bc0e8d435f6ef148db5fb213362eef97470d385eb57c77cef7d525d10c4c0259d85f83d380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d67a7a9f6e35698b10f745861c7ff18
SHA1f2edca1c7d50e74e8ac28a07c78bfaa193f668db
SHA2561fd85883382913db57d47f1dfbaaf1f2b9ac9c9c50a136c51651fd7af54eca46
SHA5122c50eba798820052cc1d46b7821654e56f596229a7eda1eed12f3d0971783d867f3b3e56952808616c19cbdf48d19961cfa20ece7067a4d85d4c1bec8c3e2a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad5544d08c2654efbfdab3dfef2f40a0
SHA1421caa65676dfaae5a725af7d9d6151248951d03
SHA2565c6195848013615c980130cb17a3818333925186fbc24700e024e67d2e1c2474
SHA5120b57b317ecd5636eac2e0de5f58988b58af91f859a74ed1e3bbaa1efa244ddb5303d70414538fb3a8b2af9f3cd323dcb76e750d3e8f20cb88a995b41663e84f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57539f4ac3d454108ac48b0d61d6273c1
SHA1c47a85db6a9daa1b58133a65a0c89a7c8cfbd289
SHA256a4248c4e974ff54f75fe7a2b5614080a8defe04543887fa5deeb74e08a14292b
SHA51279be904f20cf51b7a1279b992b88533583b1365ce280044ec59d83a6639951f5dbca742e189041a9d4a8a609f538debe9976bc05098ace887cc1cdea7057c7d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cd9869ee934469801cf3e9f24c38963
SHA1febc4521d4fe5223e1c2eade85f040f47f344003
SHA256f542942244add8b329bb5806dc68a7b8f85f6e9a3826bd8e68f294df8ca68f9a
SHA512003f3fd735adda192d629aaf5566958c971ec43091c1541cc71bbb58e22f9a2215ec734f3fcf10f8b157ace8988ac35858632623c8ca1b0cb7d0dbabef526437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a106ee26bfd481b99ac05f913dcd05f8
SHA18b91001f42086795cde8ccb0761718b14c8c5fa1
SHA2564a4f9b9c92c1cb54433d5cc5d91ea0e84fd82167a60798dd33920c9f409893ed
SHA5125c68703d44794c240762b00d651d5fa4f83c01ccc7939e637432b24c31aafd12307423a93f9669090775ccae59f87b5e02059bc4a2bb876e214c6877b392a6ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ec321a3f90fcbf13800923d9cfd1f5b
SHA1739c5726eca992e40240d00bc51fe6b266fcffb7
SHA256e9a591c96329af2a5fe0d0f740540074c72e9dcb7da512eb098f52df0db4c628
SHA512deeda0712c623709cffb7f29c31854d719048ddd8976d2d8352a87ac8d587838bcdf6c9a5d1b21ec047058bdd0544d9b322a9e0e9c3831c0c49ea9a9ebae8692
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b