Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 18:29
Static task
static1
Behavioral task
behavioral1
Sample
943e50cffd1548c7f27852a22cb3547a_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
943e50cffd1548c7f27852a22cb3547a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
943e50cffd1548c7f27852a22cb3547a_JaffaCakes118.html
-
Size
59KB
-
MD5
943e50cffd1548c7f27852a22cb3547a
-
SHA1
6fafcc91874a58f87e20e3fdf1b8a9393a571c38
-
SHA256
170e438ea4abba055b9e183ab5aa221e634f00dee4b5ebfc2b62a508241bfd14
-
SHA512
8e98f79e67825684ee3163a848b7d9a02c09c221e6432e11f9232dd54f0b1669ac8107e3eb21a1f34ee26f338e7d8ba54b4532f9976395b3714d02038c531d7f
-
SSDEEP
1536:gQZBCCOdi0IxCi7tBfEf3fhf9fOfFfPfAfUfSf6fpfXf2fzfifmfXfvf0fSftfGr:gk2w0Ixn8vJlGtHocqyBvOrK+PnMaler
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000fc64251891bf464bb755ba89fc3f43a500d25bee3570a83f7d84640fa187a713000000000e800000000200002000000080761330b7e755ca9780aff996afd1a33a25c44c8b9fb1bff70678e13caae11220000000ddbab32712c6b6a915ad5602fdd1aadf4e36b2f24864f1f2490017f9e40dfb4e400000000377761d371e6824c4f8658a2d30014a0e7115f579be1701e992bec3cd47286594ef3871c76df854a963d11c4bde40d49d961953b5b714ea615c9fe7737f3b62 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{12AFBDC1-59A2-11EF-8EE4-42572FC766F9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429735678" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0d750eaaeedda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2100 2688 iexplore.exe 31 PID 2688 wrote to memory of 2100 2688 iexplore.exe 31 PID 2688 wrote to memory of 2100 2688 iexplore.exe 31 PID 2688 wrote to memory of 2100 2688 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\943e50cffd1548c7f27852a22cb3547a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7c8fc1680abeebce580f2b1800c1fe2
SHA1d47e73e10e9624d39d8add1980c104f5189cc75d
SHA25647b882fcbff1cb02eeec8a43a6f4b88fbd86bcaa6582d6beda30538e771f4064
SHA512636b7884d07bc05fab77cd2a584fb98c1da845ddf07284156d1dccb05b526ca7f7966352ae35854aef58b059cea9088f00dfd6ae2be76abd6462bc605dc1c367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe9304263cc7c6afcb83d8f5ea903ec2
SHA16f831f84ac16a2aa3991fa3bb2e94f9cad8b714c
SHA256ed19ad142c8c2cb0cb98160d86b0b2bb4fa5253ccb3fb76ed0e3561b0fb112e0
SHA512b7fe8e41b9fb5ce3306816ee693304df296cdf8444e55e11c954f8f1e10fa9992d6cc807996c9a7bc23831a29bdf44397582f5047da270c1133cc36145c76795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c46fbeed00a5c4b3383c92e7bfa824fe
SHA10956436b509ff07150499d84468222166e1f8c52
SHA256790528cb38d9d1401389d28a912e149bcd3f7c44cdccc52ab3c965ba779332e4
SHA512188e7a057b4308260f31b8bf6508748e13b36f84170d7e4bdfd4f66bfff0b8f001ad021df43fc8525502e95e1cae051dbde71c9e704b5a074c83aecc9a950f04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b27cc76b6301ce982b6154b7d3686525
SHA190c1cf8c08f7cb8dbe54ad79c555d2d1fef420c5
SHA2561f93590e869561dac01e438b77d07ca84b9866d8b5d1f4b75bea7b030af5d422
SHA512600a67ae25d34d46b5b63e5aa588f9aa70b77f7834dda774a1f0337a30e75360250d0b8e05b97bc42f4707c4c9d331abe6bb9cbeba326e1bf8f9edda9debc27a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b3f3123c0e18a6274f89ec11609894c
SHA16b12c3aca43ba07ba7f0677636bb5a607fbf83a6
SHA256ed723d87f403e224b0e6c88671bf2b910052c5fc4613d8d447fdc131d85d5ae3
SHA51236d1f5f9993510767ffb79a68e3ca322d0abcad7ba875488a79358a70911a5895320b84be88437fb61ab969bb1e85d9d4c504caa5b2ed0ef17639500707a00c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e039dbc13d1f2fd1ff39d33e31c6a2e
SHA1f478ff93fd136ed284817bfa73a2d23180c410a2
SHA2569b8a12d372f829625809a4ccae4bb950e1803e9f2cd631188cf253768e9b781c
SHA512a0b70d531e8fbb5b958d7ddbae40c688afe7dcbcc97087017b2f8ddbc8fcadfdeae25ec596547b5fe177f5715831bbdde2656d9e10956ab1668717cc35748c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5371d83b2d3b2868c5eda114ce6f226b6
SHA19cca1dcf66ae5691df52d2cb2e9279c7f08446a7
SHA256c5c7b9aae65796a9eabbe08e457985928f80345d5122722278b9d018b24088c5
SHA5127242c04bfc19759e447b5ebc831714951ae07b5d04bfa80d0d75f38838f3d216a2d8be2bd75994b29894d3885180713d8f94418d48bb3d97d938e62526538957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e619395fa2da0cb8336911661d51dd55
SHA1024e551293fc96ddb723a6648e3fe65ad7f83b1d
SHA2561b24084c4f3b670afc79d2bca79a2203ffba9dba5d5cf2801689ca69b2657ed8
SHA5126385fe807ae9ca002c2a0f3e8097c2057a1d3fb392597254496ea06c81d15218d8d257d92e77893517436ca3295f10c5fe53b475871ac3f15c02150ed76331ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2768d37bc0dbdfa9c898a6bdd1b4904
SHA13986cfa82157a29c4006b7de99defe7050345cba
SHA25669ceedd8d8047da4d6941d022b95e005ea24e3a6166e9f7543a09a7055a0099c
SHA512653e0c8342588df727b0157f4ae4f0ef5ec901b24d741e34de00c0ea74c16777c6ced1c9d98251cf9d0c28d1ef5a5ba08d1d61781e0d8f3885b9a1d6c0b087fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5038ec14594bf3cf5c4619471247bc9c4
SHA1858b8ecff61706da068640e7dc5acd62eb50e3c3
SHA256662715052b89b1aecf69d0bb87ae024e2a979545de7fd8907dd903aed1239db7
SHA5122f4de0334e1b783ce82c44484381986e87ac067d74801bd8ce4df7085bd015c646c796619dfe891d3e4bb728aa3ae05be2df9c939505534a54e6048b62c62017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e9fe98485edea4dbb76acffa94393f4
SHA1da9530ce98c2ecbac814e7f2e4ccd028dda41459
SHA25661df794292d22e0323f4971677e94ff5d491ee8a55876429e08a2d70398b3496
SHA512544856f39dd492a5ad239bad8bf085d9c0c8c71a16f114f18ce0ab020de58845fed38df538eb523b9b1caff65d12ade7a2570163a4e89cdcc465442bb76b82d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5984fdec6805c0a432f9337df749623e9
SHA1ae453bf6739d5b5e6a455976dde517cd3fc5dffb
SHA2568c01fc0f12a3b74687876243b0785daa684780135ff0e23b01eead370aac631b
SHA5124df2c482e10f14474b98e73f355c77a53eed1a05af5541c96d9f4fa0c6a599e286469be0aa2ecdfb5506d276b02e3c5f5b2e3fb77e20eed5e5b9161a8d154b27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d04be8b78490887869d5aff18afd657b
SHA1ab1e20b30654e4fde9e136600b8be9147363b476
SHA25614ac5674c4f062edfd3544eae3e4945d2abd842d86d3bf75d0c1826b44d9bbb6
SHA51234faf6eba21a2d5a81da08d07a83272dcbe8d6e08cdec46551407ee5d5672f22a509406f27b6a6e92aaa47cecc29b3b9b3a0c6bea1d6ada823d22a66589d6e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d78a07f0c62b99b19c3dc6fa2ff8c9bd
SHA1126e78985c38f8b6e6d0da51d21c14276466d295
SHA256a6a7f9078052008479bd44cceb7c44e1e2cedaa417e5e69a76b71ccb483c12c7
SHA512f903c8b39d4553579eeb41c14cc193af7d8200c5b1ddc140454e4962637a27c9c4735d4809ac4e9adcf06bd98d5b7afa39f259dc231d79a0546666e826a287f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7620d49d8cd7e01f9a067e33077e30b
SHA18b2643a25ea8f0b6566a6388561df869bc00a925
SHA2564ec0a8ef1dc197205192687a56925e8e1b75db37ad6df059d03e9623e77bebfd
SHA5121aa21dd024053f6e23dff9b7e7577684b88cd18b60b86111185146204986b82c286e2b4be502b78b9b7c04d07441781124a49deabe3ed8cd26c2e61feb83e5a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2dfbe303616ece565e700a96602c9de
SHA11972e9fa7d892c679a6fe5fbcf5715246a88aa2b
SHA25601d735ba20ce69fc75b837d2f877144e8d4c80f56a5b3069825a06c7c30cb744
SHA5120839dea69376fc5cd43f30d261c722dcdeaceb9e701cd998c5aa5b4791b20669babc72ee7b62e6435ea297974d6399f5a08928f81e4738296d6c15650ce8361a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5c1d4c1c9589fbdbe58e0442a71d1b0
SHA1fc547dd8cf4f6925b99dc94d8aa9742831548b83
SHA25675a39a0f5677ab1405bbadea40fccdab41da7717eccb20ce58f272569b9f6749
SHA51221e56582adc0bbe0351f9042785b5cf37e34deadc7b41dc68933f940ab4fc289bd15e6bbe8b5a19f918dac19274a88a4109ab0cfb0eaab06bae114115e463a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8f5e56411b8092b9683b92a805a0e8a
SHA1af54e20a518ebcdf82857b942d9fedd75b091165
SHA2560c5edfb7e5a472dae84bd49bd89859c5a43eb01f896004dd26c269f9c376ca59
SHA512f3a45a98bc43d7d2cac83ba36804a3e2cac7896667f2c198c26fc220f41ff61261afa5821867c6fb4a7106874925f27f9fb782743a64c0c3e20df9046b182052
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b