Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
96db64f6756282b16d9506fb8327b3a3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
96db64f6756282b16d9506fb8327b3a3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
96db64f6756282b16d9506fb8327b3a3_JaffaCakes118.html
-
Size
120KB
-
MD5
96db64f6756282b16d9506fb8327b3a3
-
SHA1
97faa5e811744d9cd993fea22d132077f5ed357b
-
SHA256
4e42cdb85188146489741275b9503dd1a24f6044946261cdb417ff8e602772b4
-
SHA512
45c9ad81ae668499cdd3f8747456248afa93e2f381d85c3ec710323a9ec3edc01753ef4ba1cedb702821dfaa584d4a1b06cf6493db684897afd7487da6425d00
-
SSDEEP
1536:ml1aYyoln79WjlPaZmiGEBIRAFuBGyuEA:MaYyolpelSUkIqFuBaEA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000d0ca244da8b5d25d948d0889e41423c656b4d8b1cb6e18c1456a0633d1fa9c21000000000e8000000002000020000000d99ac53d555d4824eaa0ee68be17f48295c9daab193e2a845443b7999099832a20000000ab0012519c2ea6d0ede132bc169670c0b327d82cad95f320708307c9adf611ca4000000012504f83296ca120557a507a48c7a355a8be1c9081da19d38eeea250674b0c78519cd6e47e62c4536eb7b1db11f88baaf6a0ca0b97ec9e92aec060f35600c422 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c06944c669eeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429815872" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA87EF21-5A5C-11EF-B586-DECC44E0FF92} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2716 iexplore.exe 2716 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2692 2716 iexplore.exe 30 PID 2716 wrote to memory of 2692 2716 iexplore.exe 30 PID 2716 wrote to memory of 2692 2716 iexplore.exe 30 PID 2716 wrote to memory of 2692 2716 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\96db64f6756282b16d9506fb8327b3a3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f60af5853a73a2e9a908fdfa31854760
SHA1557ac88b1fcd1105a2cec0fd2d714f9a79f2533d
SHA2562cb519d3572fb1ed31bdc01386cba95c3348bfd743842d23167d12db7bf51c1e
SHA5129b9ebb754e4b1b3f4f4d65d6e450d243b96bd7434a5b760162b129044fb3d95eadb0b47bb31b1e452757419057ba503d84fdcd094d33ecfbd1da6bec48f056bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5530760cbc4a26d17e969ec9f9ed9c027
SHA11c84cdf736ce020aa03d085f9420b6ba3120c535
SHA256a71377e5f442a30f0dceed338438d75e617a77534927aabf6c6e7e958e7741a7
SHA512699821751d4121078d4edd021670f47be596981b4f71b81a2c9440fd0527ecd50cdfd56887a6ec6441f2c4da8fa04b9931d623f0ec246e4a9d758a330dc74f0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502a7d417d430814b94c41b34660c72cc
SHA114ad814d462a3fb2df7507d732fac81ef5020f50
SHA2562c76c7400ef5ab9537d1b50d082f098b17af2d9f9a55cf10434815c6b3b7b20e
SHA5120034636aa6e75e8b436150d91e749b8a846e9ffe58d299e23cf3edc42915248e35cf37e0790b169ea534807e24b5c9e743706dc43347cb0b9f3fa1e47bdee1fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541a35af2c09fa98b21630b0efd881eeb
SHA144c77a8f8afe522f08010d92929ca2d5ec09f180
SHA256ea9b55e385eeb9eddfa8b955fcd2b5e4e425774b93331238fbc2148d724e4288
SHA51227a92be99c2104f1306610cd00ecfcaed0dd947044c2c927196ccdbe6391945a2be04b96823609d43eb397bcf1981e07ca485dc0dc2fc254931ddc01b23e9e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3f4f12000334372ac705baf7993bb58
SHA1817966b90e705151e79dc9264179069607964b39
SHA2562e81924fce948ba304002ab41856d720b818290ea5d9a922e12b6795430b9e43
SHA51258f51f34970a76ebe24c62f190b356ad900db878097cd6fa8f2c80f3dd420f8163d4939204366da6e9d1fac2701b070d247f462627a40951ae5600e6040baf4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d685ffdecd7df479af282aa50f56f2dc
SHA193c1c415e92247e6e923c87173686cab90c7552a
SHA256ef05733443158cc1bdd89f70638236a22a14f770c2daa66447c592c3bc6724da
SHA5120fdf11b5757b98ceb1fe6228f7cfb03b256464a282be0d89c1082b21b5403d6ce2080cdf783c8909e927299a3c4d6a691c6efec52907635d0bd2f53344de5305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f27acb8bdfffcb0fe8154e06942efc0
SHA1a20ed0813a69cb02e3ab73f91e0a2aaa33118678
SHA2566dd36ed2b2074a16dadee302f679a2286239c917fcf2f387819d639b2d01a677
SHA512adea8e1a74c08202dd32ab5a7a062a58949b010d49f34f059753387b28d3331ce3de0e9226e7edd87d980b6e041b5aeb8975a250546b37504799675926d94e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b04c04248a4ef914f018e89df4822be
SHA1dd101f2d52289fab79ab2eeb7ca92ffc4bc33188
SHA25696272d52ce2ed395f8f75274683ed3b3dd34e02ceec21d3023457f149b04b23d
SHA51265d1d1cdbcbd1fc7e38ad05d27b078e669df58c5669cd0f56e4efde1aca90368045aedcdd08131aea99c6ae1f02957f75a3b701981ba81d35538fb125a764cc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd6bdabdd1d7c779c2bfe61b32847f7d
SHA1f9521907f6dc48df258afed0aae4f3a3f5c1b2f2
SHA256cd6929e816e6d8d227e96d28c32f04ed66a8bf74d2a9e2608b89b201b08dc603
SHA512ddd24fd96068e0c58e38785e985dd2b5e4fefa39f5813b39f4fd20ac5b191a8444e205ceee0f3515643da8468f25ea40e945eadaf06816881a80cc62af1ce6b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502d3ad8dfce5bed4b9c893d59289f84e
SHA13c83ec80afb1f09fe0760f8d2191cc37962c0ff8
SHA25638854a48b319072c3d4feeb4fa086c40f3e88837d1c5129fed8de32ec5c2b773
SHA51205bcd33b43ba505825109451cf0ac12e4b699b6178296ee8b321a50a72a8fd16cda3abba073e309ab3ba25305cb8974117869c26728228cdf6f0c8dec40335d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fc23001f8f5c8552eb72b0d9f3bf6de
SHA1e4820a58fb0e3c9b62d794538b43535f919c949d
SHA256d4841df7b7e37db974a5cd34c3b22a37ca5b29b3c841c0d2da04b50e452b5b0b
SHA5123f2099f66db447f83c00a7d2da1e5f645898b0d675df75ba020f2fda99e25f3b250065688ec87f6388af4021df772f3f76fb8bf12a4ea63dc3753af6c7167bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6db916bb49029c6a2e03da3ababaf67
SHA1349cacf01fcbddb704858bd21e99f187255d99d1
SHA256b088a8a28d9629f45ec382a7fa46f4effcc86aa22cdc2e9344f7c27e69906c2d
SHA51274c9200bd223d522c4ea088da536a8cdba056be3ae476c6fbd3ec12e87389808d7169e4cfa4ada591b348e26d80d84d8e02dc39aab4b752075164938059e6862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd4e3a7f7f6c0edc2cd4caeeffb6f043
SHA19a46e593780cde34e1a2738521b351d085f9ad81
SHA2568c666b4d054d36539be80711756a7ff8ca3d7a44c49745ebabf45c568b5136bc
SHA512d081ede4624a583602e5a3b16fc67cb3219a8a9c3539dd0ba5d3a846717a3a698988e017aff985c324d877151973e99bcb64c2a6466af00c488a9c44663bebf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50065a9f5b54d802d7b432dd6912a62f8
SHA1de9e2c473ef87c5836fc9c6ec860309002fdce72
SHA2563a0cb867f9eed3c785fa70e73ec36f084c1d0d5afef07721f79ba252e58a857c
SHA512757874b10048d33f35f85952789af0e25eae40dc50857bd5bb60b36baa2a065e89dacd31d753e514d25d5db28fc600cddf7f01cadcc172d3deee33fd7c7aa9c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5465c12e2640291a4f4df082757ace84b
SHA1fae224ab80e5c9eb620210c9abd400ff2fbc3e02
SHA25652458ba4177cda276fccae3bca57187502200f3029f362718a800eb99dc4ffd8
SHA512220414a64aed03b9bcab5466325846bae9b8f391cdaf82d26b39f506292800bd11e83756127d373342c13136af72636a296c16a07d2f857987c4282cda8c21d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573e0917eedc47a685392f98e5a09ab74
SHA1140a0eea52c0eb5a32bb949ed11d55b95eb1c0b9
SHA256bc40f170dcaed1651c8c0842b57d7aa3e426312fccbdf1d6e53c9680aa53e0fb
SHA51214123677c35738364449604eb104bb1e958ebd177778743024a06f7bdb5e2c1ea633177860f5e607d3d8e9225bcf3dc820e3cb0e17a6a633be6768a0a76a7604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557e06b0e968e281ce331420f4afb83ba
SHA1083cf1e84ccf59affc54ef4bf02f03823c3debd5
SHA256bb4d7f4e3795f05880d35097192a83a8b6df84faeff91f9ba0ed0251ea1905de
SHA512a358af5dbe5d7df781f984278bf6ba4c9f608df9c0f71847330bc219de2322359f1f9d954d5cd3e26ac425c68820107e19ba5700ecc3120fe5085c247e1e3940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544b472eb994e8790c0a28c5cc210619d
SHA14743cd3db43c8c2e7e2d0063b4529526398c78e2
SHA25629fd765ac7dc03b42c6f9dd80df8667acd6286efccf71b760e399c5373276ba0
SHA5121af5bb880cdd35f5f7ae27046a2bf6c0e96e64605a8c55faa06192eb72fbd9d8baec551b174d26d104e9302deb0a947e096c38a57c37f4998d704d82b18fc095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5024078267a8f3329e2104aea8d396bbb
SHA14adb30a0d90aee4eb4854c93c11333ef6d9f72eb
SHA25664a1f6a05f12162c02f0172f9b5184644b5a546c8b712ee553a1b06553825a2e
SHA512f3d26acecd19164ee71d65573b36798394454d54126113f87415ef9434745b7efb873dd43b6c0174c124fc7d00b6f2f52d31d92fcf8eec79d3eb6d7933f462e2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b