Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
965d182ca2879ae52afc304bacb28238_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
965d182ca2879ae52afc304bacb28238_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
965d182ca2879ae52afc304bacb28238_JaffaCakes118.html
-
Size
14KB
-
MD5
965d182ca2879ae52afc304bacb28238
-
SHA1
439dca81702aef76b99171307035376a807304ed
-
SHA256
1453b11e6e9d9b716f26fe0532653c75a7d9b149911ed30b949832febc2e55fa
-
SHA512
c052b36226edf0eca21f5aec7c0cae0b2da424454804ab57ced638ce27534355b73894139077dfdc1f5ca6dbb30686fb4e96cc967be4c83c1aade1df58ecff3b
-
SSDEEP
192:xs3Lc3J9K2/KG64e36JSfRYOrHaHzsYihaXuayVyI8Kh4F26HR:xIcZdO4e36QZYObaHWhaXlyVyI8YoZHR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000e4bc8d0d90bc9e0cf25b8e185f66f88cb998433366ff1907c3069800556d16e1000000000e8000000002000020000000a0c1b0bb77a03ce3c8d4d4cd37db26e1408138396af32ea1d9e1386a470956d4200000007b219f6d65708814359167727cd2be27b1a6cb330f476bb442a7329c11118c5940000000d85aba6dcee9d26bb72a3237a7b7321ab7af7327855f141a6dfda62fcab9353b07a08de3eb7319352667a1bf9eb65442dca0f16fd4b440de743886d7cd1b4ef3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429805456" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d012d05d51eeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88B4F011-5A44-11EF-B99E-46A49AEEEEC8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 760 iexplore.exe 760 iexplore.exe 1184 IEXPLORE.EXE 1184 IEXPLORE.EXE 1184 IEXPLORE.EXE 1184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 760 wrote to memory of 1184 760 iexplore.exe 29 PID 760 wrote to memory of 1184 760 iexplore.exe 29 PID 760 wrote to memory of 1184 760 iexplore.exe 29 PID 760 wrote to memory of 1184 760 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\965d182ca2879ae52afc304bacb28238_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:760 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d33887d19a50d1e1fdbf6afce3b4209
SHA10ee436771b2f8760d43ec2a4c641f18f0547300d
SHA25603634acc4843196b4e9596bf751ffcf0a9e788ec3652472397220fa5d12f26d6
SHA512b3174bf54a4f9885cf9a4f70b0a0c41e45dc0a285e4387d2bd3b2251da8b8fe9cdb6de2f8ad1954b3b90ab21e789c69f62377687c98239e504d1748d592686e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52334807d17404e029208bbd45c07c3ff
SHA101a7f272d0fa462da183441781a178a978412c54
SHA25604060200232e8d71a5198e0915dfb93212eb1d479ad174cf77dcfeae281828f5
SHA512b5066d04af5cf888c345068f9d7c3023939340ac09f40853b969cb0691f9d86c35bafb4f9c74eb17618c2c7a169a9c9b9480f057a2d1822edf71994ad256e2f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57985efec1740513a07ed40362c9f43b5
SHA12da96f15aacd0e4e72e1fcd0d0d64932609b18bb
SHA256669b8b22d7669ee8ae7f4bda9e2ae9f830351937ab0deb8a5978a9376bd37012
SHA5127dd6938b3424a007d1c5d7ef17a20b748dfb48bc6d392df0bb70b9a986575428a1378a2b996b0d1c55301eae90d2b80c991f5f0d10734a9d632e81e173646753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52febf767105a793ed98397bee1956c45
SHA1dda00116ca6be7c7ac0b76f075c0923554734af1
SHA2565dbbf82cdfb1a47f9af3a66e06a3d24040937d509c76541217d4aafca0d05cc0
SHA51258db69b6435dc193372ead2e79d97ea0d6494e5c78fa3633e10d9ffeac7dc60b67e157d42864c9f109601d68bfb812f145c19d72962028b2c6ed3a4cd7647da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d4465bb871d1c9638a5334ad2eafe95
SHA1854762e7aba2d573a29dc12b75e5c7794e21a6e6
SHA25690f983e1a3e31d6017d5822ba4f002c6938bf14bab9d6aad6aba9ecc1180a997
SHA5127369066cd7f453852f26aa8bf8d050880375b19e46a94e9478c3ce6f52743676bd7c7c49096debb697467f62bf1a56420f23daa41d736ddf7b62c85700b5bee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b74ef1bd045bf9f7db3b58560a3a39e
SHA140feecfc2457484528a200d496ce8b97a8ced4bb
SHA25685572f768848c02b54f9070cbf9bd521539ba5996db61a1cd5aef8feb22107c0
SHA512bcc01433f64c8869a1bc9c48a05d8e4941f178b20916753d21835ede0d575cbcbe4e1b415e79993c927688547852427eb879219f78c7872b326b669d5fdf7e93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5073b763906206127ae28629cfc3c9595
SHA1c4a83ceee59f43edd41d4049a8a62d05d8a06a12
SHA2569d3aaf6ee54b8ebfff0bf489bfc880c305fd3678d70d709d26ab592bc3da7953
SHA512cef7a9cd4d956d8d276c0a0a358961ea1ce8beebf813b8922fcae1b1c47fdfb229682a9fae65cfa24b196523e6c35cf31839db2aabb87ca438e53cc84e10285b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a866f2b6b9281eb8b177268059bcb4a
SHA12108174b8eb142391235b8d2cad132e87962d8d3
SHA2561b97566eeb901387a828cc2b49fd86e6c3a41f1f93bad5faf2bc9f8f4f5c6a24
SHA51299e3651a4cafa94c93975054b04fd001072e0fc5c4eaa63c9ccd9d7f8c9dfc01b39f103b552528b7db0bfd190ce51bdb8f4618be15a45cf649e9a4d6a8e92d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a19e9221af879f7dcd315c5623461ba
SHA1d4f50dfae82560ee2fcd056f93c2ff82044e4e90
SHA256a952ececec236e305ef18859ebef4d68d627ed9f3140850d203788b336550f38
SHA512ecaec5a02441a3c7154b36e751edee76e16d554d5ed4b4756d58c76b6c17e531d3895d2c5fabbd1cc16a907a8d3e9ea8b6e0d3339ac13757e939db471f998c7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591725fa2979c5e474f169b1831c26a77
SHA12e29aa52aca5ea8c467f22b9c1ad1376207dada6
SHA256cf7b17f298ae6535617491c71c5b794599cf48d31fa2350cd753b11b3ee5c3db
SHA512d018a0479e000b03a4ef24f6b7075e06898ab0ba7ed56afa1adbe440735d4f5756b23c546923de02c83a8853fbc08878301bff0ceb8e8af37fecc50943e897f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7ff4f66a24af45367d818fd882054f8
SHA14742e5c84250eb2b98eb0d48d2e517e0ea870071
SHA256ee4131e0f0c2232b8efaac8d4e9274742bc2629f456f16fec60a3a479f66ea6b
SHA51219a70f2ac4b039a6af44f6e6325192d6a51785b9d1e3badb80e2b406fbf16b85a02f4aa453fb9f1f31c09f98b072f67c3740e61a6d74c20445b94cf6997fe913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552a2d008fb50ccdabfa09f78a12c6335
SHA1e98486b6915b2e5c15579d29c0d24c90c02b774a
SHA256577aa33043af61843347c142e4da374826e11c6477754df7a034e49c073fcecf
SHA512e3695b273f14b55b194595089f1ef596512e1a170beddfd0046bf1d1a3afe86526a557eb692c3865bf241c2bb7724a08f34f34b9cc5ec5a7af050b5eeaa47819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526a2b0b9f4cc1011233b6f37689b117d
SHA151231284e0883704b5a951a0b1031c91591bbf6e
SHA25642fb0c22b13bd06e5723b65c32a536ccb0ea1bf86137a6bb3f259b8dd444501d
SHA512fcd2c350e588a0b637bc1a76944c93447cdb79883857f84c813e069ee64541c4379b9beed3190bfd710b3a170af2938fc8308028eb3a120a8a6ffe45041f4788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f2c0fed7ec8c7d095bb28b7f4e00721
SHA162504b9840c23678d386003eb85140f8a675608b
SHA256d0a0c264f357924ddcff2b0acb6f66100651a0974209cd8dc5795433d191f963
SHA5121a6675f87a0da875b09871a95c4f148f682c1233840e4a753b403c1c2804fe86034e184c1333ffdebb63e9bc0e9648a957b6669a315c00796d884878f2e0152a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acfbb1c8b1437e4ca50169a06ba516fb
SHA12b80b52daed8f623e489f733ddb2e3a61a3dee6a
SHA256158789a5d8f1b3d782f904165a73a3982871b8516415143a2fe05d4f63142e1d
SHA512e802663e1b135663106936cdc5ced6cd9289ed29c35d193c575be6f4b79dac14fc32b84a3cb2939528546042c7794a5e1dc4aef9f1fabd484563fea9005e8101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5d33f829efc84bd16c5ab392f7b98e3
SHA17ab081cd6ee82c2a96b5fcfc79797d4331bdf77b
SHA2568be44c11379b32f02dee5fb8456d5bd14f4dfffacf5c957f5d2d7c3e2b3914d2
SHA512f5a18e69fde91b7c0ac2190905e1e98be48bc4900a14075a12884357356e6ddda0fde8a0b9fa9c04a580b8b5fbe874e536ba81c56a8007cbc49a5f1e3a30c6be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c3d0bfd7b3fccd2526ff29fcd6aa302
SHA14b43d48ab24fc20fb356c49fb725d10dc729feb9
SHA2566f9b8edad9dbc9294747a6a0c7e82b1595f78da4cb83b104950bad03332ffbd0
SHA512b251fb8193e8cac8c1b8a9b76f82379e5fa42590bac0ce561ba5289d57db2c114d80ab9bc00093f7efd4e7f0ae009d07c4727b52e1cf55e70f71ac26d11c6413
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b