Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
785fb849fe606e077260ecc0327aac26_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
785fb849fe606e077260ecc0327aac26_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
785fb849fe606e077260ecc0327aac26_JaffaCakes118.html
-
Size
44KB
-
MD5
785fb849fe606e077260ecc0327aac26
-
SHA1
f217853bfb002ad5cdb5024f4ad547617721a721
-
SHA256
27baa16a1c963dd609c6eda78e25ddbdffd2000fa2aa8b686734c456cbf01588
-
SHA512
5da3ec50c9b7d3ba6d742f828cc13ce8e43979a9964f18c3f6566127ac6b9f174bc266d25032a42b6be2958a9c4034f4f3efb8a4e0e3aa41c58bbf2b0799f21f
-
SSDEEP
768:yC63gBJ2xKIxeOwckCBtgJpKW1dXHWeseEDH3oVdjnHSDvs:yC63gBFVOwckCBtAKg3WeseEDHYjnyDU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6094e21e69e2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000fd9c54ac1966694208d955b27e642fac8c7e744d05e342378c8f4ae8c53d7f15000000000e8000000002000020000000a6a6ac60280540eea5b1e706c662dd4466aebe461f62f9ffd7949c16db7ddf53200000001fea585334e83a663c41bacd8b316bb76b5eb4f7dd8491783b2f7cd92d408ed6400000005cc615920046bf7cb4cc3be1b2e8ee0264414defb9a1a6a789adae905f51caef93f96a19e9785fcf2b3078de9973fb31dbfdd1c88b9e1d6452042273ee74c27b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428496245" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A581111-4E5C-11EF-AC6D-CE9644F3BBBD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1780 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1780 iexplore.exe 1780 iexplore.exe 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1780 wrote to memory of 2412 1780 iexplore.exe 30 PID 1780 wrote to memory of 2412 1780 iexplore.exe 30 PID 1780 wrote to memory of 2412 1780 iexplore.exe 30 PID 1780 wrote to memory of 2412 1780 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\785fb849fe606e077260ecc0327aac26_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1780 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccd2fc672c821df56e41d73cafbde81e
SHA15d1740401e958cbff9ad4e64ed895d1f78ab3301
SHA2560043efc7e22fd6382af43cd288f112e00d195f59e63434847326ba4b7e816b97
SHA512557a2cb3a95fde19d16359c66e6cfee0a10ff03cd1552a2ba0d07533bb0d6f5e727959eeb326575b916b2caf5b414e21e3f55e899b68800bddccb39ffda63f22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e1c9162811ce437ec0bf80e6223d2e4
SHA1dfa4bc9ba5f57bcce386f00b3af6c2175ba3768a
SHA2562e3f7e3580b28d92e2af54a8f9e90f6baab53126b8cc8580da77917b80ea99e4
SHA51274f1aef8788320fd1d85fa2015ed66bb1f5d722a2c4a76063d3073534fce085bc117a7b6f8860a54177504e389023678cf2e98eb1e55b846a3f85245b3873116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52096afe153264eae19a5b9cd251ea2da
SHA1a80bfb86926226a1dc35aa322672d7666f8ecdf2
SHA256852f64d4271cb5cb968b50cafc438ef2b637459e49c30d9ed9ad37a1f5b5be05
SHA5122a501ab00219473c2597733510064ec9d726b8633e01d526102128ac03f24c1aacef401eb33db3d04f3fce3346ffd14d088b2268559653aabdb0b7c344f7457f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a21409a4320cba0bea10fe6a58f394ce
SHA12f18fe087fd3905d4e8c661f418ac959b14ffb34
SHA2561d39bbf4cd14362eea78dccb673509aaf0dbd3031b8bb17716ed2abd72c1a018
SHA5124feddce9b87ab1deee356915484d3b05f30d71382f37d16cba6d01b04286af840f4f8aa2fe9d40f63730c9e6d0d71d2f6e43df726d4b1ee86912973e00423284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d7fd3decf7fc9f5143a7cf7e4c7b64b
SHA1e190ed03d018c32b83478f9fea2cf8eae10da369
SHA256ddd27059e9a4ded068c762fd68456c8ba942d22f25c6f474d02e660159c4c56b
SHA51296600708d86ea5d627534faf904824175aaf785f930e15251003ef80e44d51a9cd7478e1ed0dcaacbc9db43a835b30a484e8d13b2dd639d5e3ef811b959d28f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef0757e96d5fe78bedb77d6326cb45e4
SHA1502a665c5613f305c9b016935bd230410bd2e221
SHA256f0182b0074cb185c827f72c1fad964a0228e41abab5e56d475b2bec7da4d9945
SHA512054c066bd3a87729c7afcd0684b3b6104b64340dbcc977795717787b9838f6768350d652ee46b9773fdf519a85f83910392f9359a28ec567d3bf87eb1270d1a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564abd472cd69113ec8b0ca7c915f54d0
SHA1b334cd316c1d00e041d7ac11fe8da8acaf21d3e3
SHA2566fe365cfc0b9bf03f5c063c6a6bb82a51b210a6f2929393b8ddae161cfd784e2
SHA512748f9ee48c82aeaa8e4258b89a50e9ec880a7a321adf3c0155813850326213a0afcc6ff1751839a591539db9e1d04b65ebff7628cd62d5de483aff4696bbf514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5339ea01bd1123e3d3aff9b9995b7f5ff
SHA1036f9418ed7d95e64755b3621248847dd037d876
SHA256e452480eae76d496aecc98d4973d219ae381695a3cc39a54dfd6b88133273ae1
SHA5127fada1681d325a017e90aa98aefba3cf9652cdaa83e5e8eb16d39cc6a9b620e04cd1285b1a182fb6b82bc6221a27abb4e48b1577ae31f9136eadb1513803b9bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a92204ba0bce1ef5d6a6ac5b524b7a
SHA1fab1010a75c6521c9daf1feff71d5e419c9287b3
SHA256f1680d918836527ba697c0809d25a882bfd94167d1d67aa513bcea43a8099ece
SHA5127623c31a7c51f6161d258e999275df69179536189f31a51d75025e764fce54f3429c45e33a6607954638f9b61f561fe4572dad9497c01c4dff83396fe96561c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a475e56f8592219430298af1b08d5e43
SHA171a56e8a1d8d2f76c322786157e8270a0e5bb591
SHA2566671aee1270f4620ec892e249b5fc940855dc460fc9002391df05c77156ad25b
SHA512b6529e5597adb26558f2043a076dd1a33db1d9c16825549bbb852e637f5cc4110fc06217abbc4e67cd20246514a1b182e5fc74e56c75a9672ec79fac04eec8ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8a003cf8bee79ca4a5a67e95025e113
SHA1c7ee1ef5d4c73fb08810b71d454c9a8a9dae3a7a
SHA2560e8c433afe3fd652daaf2420a8870941bf2c22d823bb2467296ae1ac986761d3
SHA5126321bb5faf52cab994bea9e6eeeda5096c9149bd210299f49ef8d474218893a42235033389425c41228b184d110793d643feb701f20d18abc405fb59aa80eded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58292112ca00622e9a4e06de9c6aaae6b
SHA1b318ae680b9730f88614827d89b986cdb14167c5
SHA256afa1c19910f3e326d9c290dac77694013ba935c66776f208dd8a220484896710
SHA512f97c8815b6a2c71e09e234915bd03be5f5ec3c4b5bb2d0d9b7adc4c6707696dbfa32a552522c309b05969597ee0a2064245cd84033350bd78cb495e479bb9883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9f674a6cb3c5b6276b60ee75a4fe0ec
SHA14e522ed2666b762623423e5b6a4ba7a887ddf5df
SHA25624f46bf33f38b550e8587a9cb72b75b627aa273642106972449a30794f48db7a
SHA512e4bc7a78b8924ff4a530be7b88a80dc313d6e24512dbde8b9523edb69c2f7b728dd4e559dfaacfcc7e298c2f1dc791e7ede6281045f6c700c3857c283f6c31fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598336744bd8c9c1b466ff83726ffe01e
SHA1f373c34241021a4eb76b4f29582a23d8cb10ac5e
SHA256ba56528321726e4f8f7d6ced6d9ae8745ea6f99d352a220749a888dfeb167189
SHA5120d7d934cf1239a3c697ea2f8d6ecdbb88779d6842f707d49de6db62b4cd4a495e875a1814543df1c3b8cfb19459ddf002059fe0d53fb0434b83465589a1f2f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a5c76be71ce9b44d8023c79c79ceee7
SHA170f5bf94d6e8e5c469547ff0423d13948296688a
SHA25691ad10c720a5681eaab7eb840110f97a87b419acea6089c83ab289793c479af2
SHA51268559b72cb471df51d6b2fd701090cedc103d31a5b0f52eeb6fe25119d32178067a325b5b6ee2dfa2f49d24193a1f083f6b81fd5837c628ca3840147f49ce86e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b1540dfaffdad7abd8db1e4b928d61c
SHA1620689602fd6f4e513e4000a9ee3a38d326e5777
SHA256c8350c80a65d6eac0317c7d974b449ad65fdcc560c08fe8b6e9668ab5d1a7bbc
SHA51223b2a7f2c91ba1bc119a53574fec380213dc0ae27f6326721884af0b41b91f8c1babf4c29004cd84dbefd8634996ebd8e69af2446870e200527d39c05b1585c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ab491aa7414c3b404cda2f5766aae45
SHA102666aa6fdae5c9439aac6d0df5024bf2386ba82
SHA256a9492a55445721e7af5dbcd238168a0477bdd63faf202e7db5386665d2c2c282
SHA512c5995a488b2c99c22fb66311f91e33e7b13d7f517f577894e92b732d811cded492a38b5a73501cc3029edb6791770b653bce58240aae94520e3bcb178c6c29c2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b