Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
78e7cc46d19189f58f185b6a25962a29_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
78e7cc46d19189f58f185b6a25962a29_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
78e7cc46d19189f58f185b6a25962a29_JaffaCakes118.html
-
Size
19KB
-
MD5
78e7cc46d19189f58f185b6a25962a29
-
SHA1
27a3ee1c325e56f079c047eb614539aa2dd6eae5
-
SHA256
2f299a23a68a985061d6f8f0605e3e60c1bf9158e6684d37e0fd91d18a7b8f6b
-
SHA512
3212f92e293cd95126f2d6ca953223f9e6fdfea49a1fdb661e692552939d7a25bfab9c99458098331e12dd20b0d81b94ce7be7a6d6c70c32be10e77d171f6c50
-
SSDEEP
384:4+QfPFd9QZBC7mOdMAItKfpC5IgSnbmFe7Ac5I6MdLDPd:Zcd9QZBC7mOdMAxpC5I9nC4SPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{058B90E1-4E69-11EF-BA93-6EB28AAB65BF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000087401238319888980a0548a220c65419fffef42e5bc19b614663432995929d2000000000e8000000002000020000000cf4cece508638a21c6828bcbfb35c3c30f4c9ed5b616a9983e506ac82db42b1320000000745dd4ad6e6806008bf7c5f9467942d7bc223035fa716930236cf4a21706bad6400000004cac1f7a580d81547b4c84a50e51fb7118e3d20419d01623ad5e3ebeec166a22d5c3a136f227f4fdbbbdac7367a19c474cd78f2e5711689d0eff9d9a63370ad8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f061e9da75e2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428501712" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2660 iexplore.exe 2660 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2672 2660 iexplore.exe 30 PID 2660 wrote to memory of 2672 2660 iexplore.exe 30 PID 2660 wrote to memory of 2672 2660 iexplore.exe 30 PID 2660 wrote to memory of 2672 2660 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\78e7cc46d19189f58f185b6a25962a29_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f2385210a5f559ba416491b9ca39061
SHA1771fac22dfc14184fdfc455da337d576fd149591
SHA256e19c9ce4b1703d1b88ba09445dfa49e0009956abbf942a533563424a25c7d10e
SHA5127d5b969432002b9e71a747115fd16939bc18eecbd9f966fc2eb5a9e770a0a91cf81e329f9f9390e64dc0eba360eaf9af797993e8b0b586211f1e8bac59753aec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558b1476518f9549d238e47de423952ee
SHA1864d3c41d74bca042a78a99a24324135b6c7d7e2
SHA256f56661c29e75a62e34a74d971e8c0e66d037fe4d249d4e90aeb38171adf98105
SHA51292f28f7b2ecae6422d66678b372e738b3b904c667f875633c57bc427e6f6b8af4716048620deb05e78078438afed7ef14ca977465af8166d7bb69b8d8b7594c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d18563a2d1cd917ee98653e1a9bea63
SHA1d6b9edc8910670ac8ce5d5b7e71fc5f2d15121e7
SHA256e2a3a7291b18d47b9c37ee8214976e7a0671c6a49a5bf049f02ca2dacf60f7d4
SHA51246800444de5a0c50a768be369f1275c694ed277921d2b98380385cf38511ea363d5c43cdc79a0307f409a3a216374ecf2ecdd3ea4435326a83fd0fdda3ce23a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57586c5b0f350bf80be1f0f66a268c414
SHA1f0c25ea669c6ad8a4cbef519fbec048a276daa05
SHA256946daf944d2e7bd3ec4c2c7f9f53827a3277ad4e62aba08cc3277aeaf4c308bc
SHA51280bb7c9ec3a0f2d77efe3c9a309fa62e53eb9f9ff3add47effd26d32083224f03ac0ee3799567652083784c78cd13a184165e35b882e0f78f0d22bdcc1d27e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc92eaec8e96441368bef822fc46ced9
SHA1eaa5fea866e3dd7f87d3527bb05c90fb9d8a4afa
SHA25676fdd167d5fcd14608680c68c6f5e84ecb329884f11917189ecdbec6f4da3a7e
SHA512c79e824495c5afc4186628b2c57146aa0153f2316b3493e6f425926cea35dac8f65286dfe16171e0e432f23a6644f7d4258327decf93d71cd242705622dafa95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a995a7d333bc0f982ff09d72ba2e324
SHA19271f8d9d08ee606956badec5b8f56ffbbe64250
SHA2560bd318ca8b9121fed81bd8d6ba73f759e44a98bea9013b4e4422b95ac5733af1
SHA5126b7aff16ec396e56bcbf4e3cb71c79b6d722941025e73c0cd039897a81ee88edac1119958e370be6077c1401fd5fdb7f6fdc3e5140e8bbf36df07bf260e4fbc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5617d4691838975e9f2087ba61630d9fa
SHA1e48b10aeabfc34975288f712a5297124ff5c452a
SHA2564267dd1ae942c5bde90467fddac400da311163e9b12d2cd5d57d58ee9c58b02d
SHA512eef6114596bc3ab7102aceedd1a2a724e667dc52b70819356aa4b773c3411029d642e8ba22c37f521c004fae4a751c501925609578762d1e2e91b0746fa3d61f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52376776183f16086b73b53ca69e930af
SHA1ecf6adec96ddf16e57112bd44a6c8ab6c90c9590
SHA2567796b305539e8243bb7eb12c75f2a7c233a2b0c8333cac192fa1f97256e5478c
SHA51235f40d16e0743b9840adcb980b3559e90feaa62168249a8d1084e696150b8a591ef92365f03e7db8ae7deb9a1624a92420753ede796431a4f72de99c4c38ee2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bbe418308a7d20dd0d4e660a8fd4837
SHA1658addce92f5c7aaabb8f600b8037edf0ae8246b
SHA256fa5c42c2db52a6160e05a88e60311a859599076588a453f24985227e96c5e130
SHA512492de7a59af6e94499ab19c6c046c88ea1b7edfcab08c9591845d6f02140bda86bedd45fec880efe0f9a208cdd870605bc2e055e88cbf63412fa31edfc1587d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4273ab09ec5121a393b6f788d9793fb
SHA18e489cfcd9753c6a119ffedfc82e9dc70e502b59
SHA256ffbd1814c628d789ff607cfd51f2285a1b261cc26a55d3d55c8a20e2a23ead74
SHA51207e2910c8c2fce1b509ae6ebe748375ff3cf59e3a88c67df35642cbda51edde9f5a003648b0182ebdbf3be8e436d2400ed3aae21840f6c4b3ba0c6ae380687ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7ec5ec193630c6cbfbaa0ca50d100d2
SHA13ff2eca02a291cc46ea68ca7a8b4d5c9afa99e0b
SHA256215f7c14e89c9fc57cc8f19c7310cfa35a2563fa0aefeda2d3d6ce398cc261e7
SHA51290523ac7e6636945682721ed335746ed5c7042cecfbbf770db5791450ef87ca514a7aa03a71aaa4cd8d6850951d7a3ccf4af14e0af3cf19a8617eeb89f9eab14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567eb687bf0add815c31f882d7ec4bccc
SHA1c7f31b58415d834f52fb95ca0399ab6ab465e0f3
SHA2567b46898008eeaf7893a1966e335610ea6942566e69b9d5ea51a2f255982b3283
SHA512e8fd2fe6b5fa807c3de5656bb585f6495fb7db5d846aefeb1598089a687644a08c2d0fc1b7e13fafbe7df1d63e84944eafeca370f18d28f1b07dacb18c032d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5693353ea49cfd3c7f6bae9c0b48b75a2
SHA1d0478973aaf7c79e3c35408f6e8b9514ecf6dff3
SHA256472d1e26ca2ca31d623f07be352959381adbbc17acdfa89fd78a8e58c1db742f
SHA51225572543fbfd9146e176b58129b9cbca8abcf29241cced4f6403311261e586357a01878d55080b8cb3138ad775f7914894e1a2d0f17fcd95fdfbe26940903969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9e65175e5915530b07c4e6af949b773
SHA175e855c6ceff04021c6d5e00b8dd953f4da49779
SHA256c39dd7315e6118eb2b8ca6cb1f87321cba6699c986180efc968cee89e7e95f79
SHA5124d3c7d0e42461da545c71c6ec4e4ef9a54e0505dd5ae4919cd4cf68aa4a0c2c8f60bd90d79eba708371796869d429fd86a04ba5bc68d798dd731f6836352a59d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540dccce16a09b10697e10e9e82fe320d
SHA1460f3f5224eb1a63e007fd633365930d93285b16
SHA256b941449c3873447f022d6271d19a96276b27221ed61f4bc0a4bf88c0d3214d50
SHA512efc1e614bf51f7e6714d5384b64bf7b32d9d8a9ee23456572d1a8ada94f4270e4dab324575b61577c94ad687f4a49ec06d486f2e2e8af389eaa8f26f5e415dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542fa979c553448d21ed4259018eedc05
SHA1c8f5323c72808abfcc8dbdacf052acad9e1b8dfa
SHA2569ef7cfff024e62ca0dd296bb896971e0d11983bf0c5494736009d3ec065ee4d8
SHA512ac2714a5fe434210ba7c55e6e1fef49180eab5b518e3c143977ff1ee1859c180e1d4f3df57c65c811ccb38570fd1c61da1a5118247bad5c32335c150212c54d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b84fe88b7e932126142316c1815f916
SHA1590009ce9d2bb3b49170c8a290edee9d831414ff
SHA256d06874d1b144d3bea53cd93035eb1eb5b3b2fb4a1e43a41a611774f867d98ee2
SHA5123fe2eef3a9686142dc8a958f76070d1cbb0a0ec66d87c6ab2dfa224e4b53061fc827b1699eeb93d02a9a862390c39b9a688ba996fd9e1b51beb9cf23c2bee2bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557345951992da235252db95020386e24
SHA16da97c5ac846d05319f52293ba283e62b496395d
SHA2566ca5e0c348a49103b118a351ce357b371aff2dc16972b9751af682696a642710
SHA512484683ddf7e776ffad8364158fb03cf65b9251566caa3adf192e80569d0121c82a6f7574ed69eaf5aeb91b02dd140d7d8ff79de094118358b946c688cdb68f17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe3cff16622c8d09baebdce17c610769
SHA1bb600d269e4a9cb88d597ecffd330b9aec53a4ac
SHA25628ef651e30d3486115409da5199b899fd2e0238349b64132e8af53c72f0f449d
SHA512bf3d97ecd081c684204394c8890b8d56727727c11fc872c2b7f8e5b5b08c94f826800a76e20e3cc8ffb4826e17a58d8a693f364ec82f2b9aca18aa034efe4283
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b