Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 11:46
Static task
static1
Behavioral task
behavioral1
Sample
781b2017e22978b33669b2e0423b18a6_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
781b2017e22978b33669b2e0423b18a6_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
781b2017e22978b33669b2e0423b18a6_JaffaCakes118.html
-
Size
53KB
-
MD5
781b2017e22978b33669b2e0423b18a6
-
SHA1
3c4398667fc68a7560f3b3ecf45d96f4771470b4
-
SHA256
1d44f14c369340e212e64cff9051737b52d9a629013eb296232759dfed9dfc58
-
SHA512
8b138b2a192b1d2b944a114817508e00ba87642e010da9f491f602277b6907d34ffa3600635f0f44043b47b60eb6071872b067e8bf8991f3457562df952f8e0a
-
SSDEEP
1536:CkgUiIakTqGivi+PyUgrunlYA63Nj+q5VyvR0w2AzTICbbWod/t9M/dNwIUTDmDu:CkgUiIakTqGivi+PyUgrunlYA63Nj+qI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000fd7466b93a13729466a6fe4d71de5a2e365839dbdda03ba2a9a5532344184720000000000e8000000002000020000000ac495e4be51134c5133e8ed6d07181569fce40cd6dc9b264255700766e5b3e1720000000ec33fd8786be160af7ab82f4284360d5eeb934b31772bf871ab8102c7f402f184000000054da61e2189c45ffc42a5cd838106ad8236a4aa02295fe74e7bac8b09bfcabda4681a237d41b69e65b8caba91e224ca7b62287e5c16ec0f4a9e3668611e56bd9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2069d4a461e2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B513AE41-4E54-11EF-8D15-7A7F57CBBBB1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428492988" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2332 2208 iexplore.exe 30 PID 2208 wrote to memory of 2332 2208 iexplore.exe 30 PID 2208 wrote to memory of 2332 2208 iexplore.exe 30 PID 2208 wrote to memory of 2332 2208 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\781b2017e22978b33669b2e0423b18a6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfe2e52b19f8df948ac3af9f30dfc8f2
SHA16bd014196a94dc7c78b9575892078c087ae67f1d
SHA2567a043a823dc5451fd0491b0202d7d505e4c510cd265ace49565d6c5fb5cd8922
SHA5129a4398ae07feab52ee7deb0eab733b52bb51899edba43a8a71958efdb48d958493d853a8f9324b9eb123b0a8c1667ab5656c88e867c1f65ffd29166ff84d2985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501c23f2ad8efb7d71a906ee5e8b14a15
SHA1ca38e6e4c899051b0591d1f6069684482fe6ee87
SHA2561c1a1c86967912dfb88c9ed93b5ef95b0572062b353620ee739a8f0b87d32e90
SHA512643d51ef0b5e1ef2cac0b085c4b8f9b60ac5c28f98f27fb553604c085171ca31e2c873585105ca53f9af778dcab066feb9c59ec5f6b2d5b0d3b846c5398827fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8f093336cf125ae4236233d53001b4c
SHA1a14e6b007c3c700efd0f664c7ba0a70d8e49b926
SHA256f43153d1025c61e1478f453e084148b31b68f4981ce582c83b615d484701d819
SHA51212f7c9916d44f6e21468d246adf1b849a52b2f0fa5ae52efc2b05633ea808596ae9c909b60d8112b8c1b0707283f9e2ab306e1257576d6355c28a55eaa1c8662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51beda6db42f9a7fb1c48f91fd0c70b18
SHA1a6da0e13b9f2e6d9c12981f7f20f91fdd6ec9251
SHA2567bb7149c3e93e650fa0b2e92325e5e868b5a53c129a8c3fdad61594d140cd817
SHA512910a3d9b84fb23a22fc8b9ba3337e4f747d303cdcacc650c5019fd305ee2a5d6e329a057426c571e5fdb92c782e023e3588fcb64efd63589eb3c5cf094ca35f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fab46916a43e3b84d0bd4c697d9da418
SHA176ced60c2905023a548c2e42c115a32f9ae49209
SHA256de141bd18e7fe9245df555f4121e7b972670e40c14994d3476f7805b04191c2f
SHA512614009fc27acbc0cf2d05619b192057338769d1ae05b6ab5d05e1159e21084b74f693c4cde48dfb4d53d48c9cb2d46504d8886455a16bc30f82b1161b8362c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd9fa66f63c15d4b0284944517b7e983
SHA1563b59543f67ceda2f03475aa5576e591574854d
SHA256e9fba7afd2346bff18b0a1acfce0ea6c54cae4b81f44471383d871a809151533
SHA51289e18d020be706369fae10989bb5390b0d24fa38dd169f5f1c40ad8b5bb26daa5eac654c6693868397641e63b7751e4d17c1b38088cf139ddaceb455a78160c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e128fed6dedeb401bc955d307e08f513
SHA143518c522418f84047c3dff34c6b106f50a675bc
SHA2564abb1990149b481a5757513038749bc22a019ab0173a269219504b6018af4a3d
SHA512f32e341da9d6dc72f65e3654b8fb64ee2bd4e537677542d5466ad489bc97b16058bea92db153fb1306e84630d6fd0bdfef9f5315142c830e23b0784e8981ed66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a60c28cee761546c82e87877cead1d8
SHA12f030076c301ea97efd3f5d0956bd1a5df4d1708
SHA256b7e418aaa9eea66ca672445c6c087ef5f4bc86edba255f7cf55f685f082d9e5b
SHA512462dbdca131467aa6c2ebd7927da0738f3e08580b4e66985aae3c1cc80ca5f4e4877156694db1bc001b24c67fd0fedf6b9ac56adbd9d9b38c09d4b4ff96af365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590bd100d3bba25891011d6f8ceb877cf
SHA11ed3dbcc29b69dc2dacc429593927759b29a6a73
SHA256d38056d86ce91dabc48ca1d47edfda29829ab1ffdaeb7a12b83c5c572944f661
SHA512756d491c5d3b3af98c3f506b59656722efaef5525f40c0e6f572cf59e0f012e3ac6a37a1fa11775e16152f9a7655ee50a189c8b2d0d7220951374c922b097713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fb1441ed15493f1b19c1836c08db100
SHA1c84694a6be29e921310d990a35a60e3324a91666
SHA256cc53b3f3614005e4d218a36d3fbff4112b5e48472459b3f1afe0ddc3d01ffd86
SHA5129e9aa34eda77eb4c4d390099fedd232fc649d3650365e1056a09a18d6e476cc25ee71950559f048c1f652c9261b796e2f8abee4b93ddf8b9428710660cd04bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5825cf4c1d571a195ac882a370d03d424
SHA16b45eacb6d44b2ef871c092c4ea4b7a3747562b4
SHA2566943d220ddf483d53734f9812148ffd7c1786da56a6ae03b020b595240626d92
SHA51276e99e13f3494d23ac99fe45923e2cfa0b31006a0da20dee75626806edf01bb5ae91c179a5c50400a8011e8f10d66ee04fe59f7c0e2409caa1c69ae33b774c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a2362d32a5cefb102fa7c4805eac5df
SHA1c5070ecd4a99467f527213569d4941d3dae84feb
SHA2565f19ed92c961a4e577093b232856230e3413add15fa771b89a59d5eae5c6dc4e
SHA512ced436c4525e5929bbb9c6f7b6a6969174d880f18cd3f498cf4ea0ae0571619bc2995839000597f3934c939d58d51d6201d29ba3da10f1cb3cc0c33acbb81fcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54baf2da553ee57993656ad5df3bb46fc
SHA156644d2a0aba4a61659368bb3b911e59f4eac2de
SHA256839725cd859a475fea74817f06339593cf20a2873a8cde4c7d5b270095a9b09a
SHA512e659329319885b8f8d6841f35fffd20fd4fac9c42b3824881c28789b09138f8de1d5a69983a35949293a111e3e90d3d374815bc5104128b55ea592b5ebcfdf32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a615f5950fa3d1b368760b37c33e5a4
SHA179e7e4043a1485eecd74f3ec585ce093b90557ec
SHA256633411a5cac4c6d1702cb1e28e1cfa5e162ee799e0fc601eba06509649c5ff16
SHA5125d326df818d6b1cb4f1411a9c21e7e264578f9a93d1695bcabd56178099e9a446d84c9f258141827b51bcf9ac369c2ebab7bfd3f9196a6e5c72cba5813de1249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d12ba76410f6da443012584a5452b2de
SHA1763943d6a650f586c2657ed6d6d1757c4031ac67
SHA2566daba15e0ffa4a2bcffc85c3bbec003e7a93520db5a03d6572d0bc84dccff9d6
SHA512e1ad2d9b8bb34be376190e68ca74fd4103fde1e2d07544b3c1c14fbb96a3409aa5db6d9775f857c63befcc640b51bf8a2f79dcbb9e3d9d6240173e18e9140093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59deca4acefbdad5b3337da2f909991f7
SHA150fc8b40e402bde269fcff9af7d4b80f633d47d7
SHA256c850501d85b60fc0031f6afa56124efba0af3de33c2b7dbf75b650189cbd2e6d
SHA512d9b6a2966ab12111b458a39b529338bad9fe5e00618018f5b97b91fe1a03c8f2b4e1523a209c75cdd72bcea9b9c7648b4808db8145a7a6d894e42ed2d71bd353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaa2679e16de910db9638fc502057e2e
SHA137abd66a3911ba73798579318971713e232adf7f
SHA2563fc64bbed861c06fd8a11f9e99e6cba5894945af4bfc3743918ac68e1b06e90f
SHA512d4077f916000f84f86fa6483ef6d6f9d489a575ad0a569f3519753d60b1ce424e4ea0dac4940e75ebf5ba2152b33553e276ed6a24113c5d221eeb5fa9506f649
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6GL24G53\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b