Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 10:11
Static task
static1
Behavioral task
behavioral1
Sample
95a838f0609f696f67edb88f55c8cc2d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
95a838f0609f696f67edb88f55c8cc2d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
95a838f0609f696f67edb88f55c8cc2d_JaffaCakes118.html
-
Size
38KB
-
MD5
95a838f0609f696f67edb88f55c8cc2d
-
SHA1
e965652c755cfe401683b5fcd4c9c41c69255540
-
SHA256
7cefe681a14456fc7a7b2ccd6e19541c36ec9860fd78cb3d864f55e835878287
-
SHA512
4314003238a856e19d7da55588c93cdb220e1478e205862f5cb2b2a6c34d0b4c62698540cdbe181d7570fdcbb1669335e4afd53589415f0007f7dce5d803c3b5
-
SSDEEP
384:ZBIzazAIwswNwxuzazh3Tkx8TkXbuYzoKhGuCr8LIgEnzy+KCTtzazL2AdE:YecnTOxueVkxUkt+ZeVq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429792158" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0141c6732eeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{920CF051-5A25-11EF-A251-667598992E52} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000d76d8588b220eafa31a95bda141865a62844c4f027fba9355872f0d3773c25eb000000000e80000000020000200000006f65f49c28a90583342dd0058da9f6e6b9b9f9653a8b38a8d6c24f244ee105d420000000a763faa3a6be0734d4622f26e53525853b9b9716f6d28efb161d11f43d60d58240000000ac6cddb736f727161bf2e1e74ba424a2f8eabab9b642b66f0722bf67293083f96cc313203331b28f2a6f986d73824a81a0a51231662191fc6412afbef3605922 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1512 iexplore.exe 1512 iexplore.exe 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1512 wrote to memory of 1944 1512 iexplore.exe 30 PID 1512 wrote to memory of 1944 1512 iexplore.exe 30 PID 1512 wrote to memory of 1944 1512 iexplore.exe 30 PID 1512 wrote to memory of 1944 1512 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\95a838f0609f696f67edb88f55c8cc2d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db5360cfa7bf3c0f0e62a8e0cf781256
SHA1bfb818c166f00147a79baaaec067f3665efd6522
SHA256df7ed1a6341f0305f1e915fbfea33adf41ba8e1353673c8ee2aee4470bd55ef9
SHA5122971750c0c0db0b050b6de694e55c6ff29b4d9f911f5902d1bca7c1be6d9a1e36d84029e3b73fa111c13d69d28d38d25d256a2397a2cf780d4afe5797c453657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dd41ede84b2b9e83f67533a9dea5e36
SHA10c76581427a50878662cdf5432fcb7a8495df2bf
SHA256aa0a5618c3d94b8bce54e36fd082ec71aeec3859b35d7b832c78f5e877e2034f
SHA5123c9e85f98d6583f5bf4f79830e2dfb74d206bc4a874806aa1cd3b9f070f5877c9adac2f77b7c1e45a6e885aaba588604b3c2e1485c200b5d485c12df1ec7a697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582408edf5337b28dab4b9c248607db26
SHA14eb1d008ac04c63a58a46ead1a94956bbb576ae1
SHA25661d2ce7d7869b74baef283f6d18f4b029392b830f48bb6d2754eba64326b74c0
SHA512d5f5863f645c85422e9c459ea4a2972188865067a05758334e05e4eeaa21f2c3da94719fe8aafbac93a2282b786d984dd67842b9fd9804ee5de0a7fd33517cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577eeeadc86f3cc4feb63384de4038c48
SHA1024fa6e8276371bb60c7f6af69628ce6ae6e8273
SHA256595d2d88636c4f718bd26af0110690abd49eb07956f1e11847d51cf6e9a2b987
SHA5121ec829ebbbfc6bcde1369263555741b1dbe01441d800a9fa5c6b705f00738f3b9c18050e9e0d79fe6435075d315f1b4d309a1b62039bd57d241ace3f045d5bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c7fc36ef86a80fb342f966c3c4af3cc
SHA113a7bac1b2a35bc204843efe95b58038b6fe3e83
SHA256269b250a5aec25b0a08d12664817889b4c6025966fb4b1a33db30ddb40bda6e6
SHA512b8af924e3f633166f6c82ad0fe25775059f218ffcb4d5e727fdc44f195d1e675e13d562f23729ff2f0fdcd1a977f65327bd2e5c765d62e9e87b989ce4f653c07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56db38992e459927b2b45873ba833bffa
SHA1a9e06a46a56b482de3be69ffef8a3c870d375da6
SHA256f187a61d288e4b8de66c62a994b5aefed7fdfe646c380778541fd0236b2ec5c6
SHA5127ca1592a34f2b6492ec0887e9ed1b0b3b227e110f1d2d8d8331259666f246fcb0971e3d7c1acfaa5bcf1e9401263e23a2cd0abeb3fbe43ff24ec844c3b6e9941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ae040cce4edf775debe8d88587dac65
SHA13c25df3d58ee2396d29597903f840fdd28d6cdaf
SHA2568a38c67e631e6552937a7581d26aac3852b4b7f6e547ff5402cde954826b46ed
SHA51210ecf01e268a45c42ed89cfa0b111ce924f0545fa53ebd8fee62b0a324d56a6b08c02eba07a03a70f47c34c6f2161cdd2cbf11b3fa3a257537c0a6125768db44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f6b7f6440029d89a82ef691916eb56c
SHA12eec626244d63a0ecb45c1a2d1a9dd14fb8d5fa5
SHA2563e0dbb6da8b2806bdc3636dc7d68c3f610de0dee84a690677a9cbe760c2cf8e2
SHA512d38f634c3355c89929093e1997805af49121c6f521197736ff4e9100389455159212e9f376dc88090572ba4ae33af98da7afb11347786174be1b8b9bfe2c3583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb16f712ea54ef2ce2b494ac05b7e927
SHA1304155888c5114533c73cbb561dbbedc78553d58
SHA256972ec9ca0af889284526ef1d082f58cd2d99ab34ad20ef41c6205a05bfeb393e
SHA51252bb2841fc3bb5436e7aaaec25d79ada5e12321459bb82a5c5155b2cc6fdb501289357eac4e3b0c0be83844c67035c1bc07c5a36aef40cde121e1611271b5de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e90e2209ba81145d65aa723f12729549
SHA1a994c1cb9430922953584cbe0e02701728f9bb7d
SHA256b9e60d03d9ffd75bae74a250e46e6c363659f5716a5ba1c624f8b7d38f7701f7
SHA5120d81f17fdff8f1187c77bb57ba4026ce2d6489671283954bfbb3b452489fa1426d107fa7c0e0729213e4db29341c7b61794e974714322ece8c1929a609504c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545e5213962402e2aa4698c209b2a9e27
SHA1f39c7a96018bea6b5de2072c6e274a51c8549b3b
SHA256ae9b4498c482c960b9b3d3257698ce9e5a554a5653c72da38b569200ded3d821
SHA51222497435c8350c80a58cc6fd0bc1a52467a2d6091d8c7c7cbae01c1d361a284e3b676169c9ab0086f5c72ffaccbb534ffea7f4bf1d6f957f19850a8ffc098073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58738cac2c46dc3be4987c3b89f5b222c
SHA1ed75c2d1b549d459b26a1ec66f9b33df219ef28d
SHA256aa4edfaf4d10dc338b27a2a01c493b4f1d86c89b9a2954a773c2610331212b00
SHA512798ac31859fa0804c2db495527fa68f2b989932611428ec27ef95184fcc7cd57fd17d28777a23077b01d15b623ac3245a9b91b50c927d240d23182d3747af86c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb67312bac775c3b28daf657205e42d0
SHA19ff4293a09ddf84adcbbb0206f042592c464ec64
SHA25685e6bacc5c9337f40da5371f8e83c108d9b25b57ddad9866249be3026b1f5890
SHA512cea1ba3a9fe457a3f4a87fe677044ed11be31bae5e0388ecb430303d3d23c56b981df0a8c9ee16d3ff090da9b6459d86e24e4b56b7c3c1f4578312e09d911c9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537d87d952a0bf0e1cebf1faaa255c8ea
SHA136366bfcd22b6271453bdc636a1dce425c074089
SHA2569e5dd37f80aebac45f5d291dc61cb6ab1851f4be6856c6110c3a8f731bd8cc81
SHA5128f3a6f071c63180f8aadfe06299c7b36bcef69fd840a9aba94c5cd65268ab7d708d6df779cc7e995a8c755f604a2f0e692bb95600804fbe7319f8e235ba47060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d75a13ed2e9c555a89e4b15201cc8cd
SHA12195bb7393268d519cfa32e67eb6d8b9da4bacbb
SHA256152b1107944c0410e502933a790040170d0e57b4b2b331021c42fc8a1ae04e9b
SHA51263e31919f372c92419c3e08d0dac60108eee3bcfb58f07e4a49986e8221518b52067017075a8f8eb42b830f831d5ed832f508ab47651a9f9045a4466b58eab64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbcd478ab56237d12587d27892e56b54
SHA1fba10a2e4f0f456ae4c2ca047f20c5ce46945539
SHA2565d17a6a1a1d334b22b7f0d6092e8e41cb1b29d9f533ac804ff4c4438898abef1
SHA51283664cf0fbffc332218c72cf9446582c376a7daf117ebab09fa87dbb7f681c4c5d8fe58414463c2941d117cc74c2f84cd46fa92ac50211d8d7bd3616c8c3a3ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd3c5c3169dbc8b973fe8bd7a2d2bdfd
SHA19f7643d42e1fb9cddd81d7a64f42231efa2500ae
SHA256c992aee04ba40ffec2c342f08e3c5e45c45fd0e4e813498ca7f1e6805e53e79a
SHA512a814080c4720dfc60d169e3df9d7a847848c7ed733cfce27d333f3558c0f757564d7e796541a74b03360057cd2d5c95c3246ac2a6287ce1cbb3e532cde185b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1622eb97605fec18f0ae067aa3453b7
SHA176574aa2a15ddbba6b306801176f3aa027e54143
SHA256d21f4bb90bd6a27bcf34c622b0640903138b177242527c21db33616677e414a5
SHA512205d4019445d2da94bf58f121b5ea72e68c292b8048b5c66ccba4125d3cf2c6c09e7afccb399e95e9a35bd5910a3223885bf93e1c16ff0a9034e2f44935c3226
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b