Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 17:18
Static task
static1
Behavioral task
behavioral1
Sample
96f47374ccd4615c06566b48f1402235_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
96f47374ccd4615c06566b48f1402235_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
96f47374ccd4615c06566b48f1402235_JaffaCakes118.html
-
Size
6KB
-
MD5
96f47374ccd4615c06566b48f1402235
-
SHA1
ed2233a119e252045bb3dc17cb2e13fca3e73567
-
SHA256
e0744bce15f82a206914e90b9d086c54509697e676f52e913d4ae25d84f35a61
-
SHA512
bdf4d2b474508243825c053fc4d5087c00b98e8af39ccc2f02705452157a716034660907540a1e043b2389f53f35693be29abc207504501c390ae05e0973a7ff
-
SSDEEP
96:uzVs+ux7S1LLY1k9o84d12ef7CSTU3weAXwcEZ7ru7f:csz7S1AYS/uCXwb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e3d6ff6deeda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2949CA21-5A61-11EF-8EE0-F67F0CB12BFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429817750" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000c67d207f6646751d9a1e8156bc50f59f06fb6a504bb7fb18257e6bc3f4f5dc43000000000e8000000002000020000000ca9c4eda36e05f1ba8da8fd4efefe8d40c0e6d56a12d719b964bc4e7f289a37c20000000f8f82284aa9d9d72f23c20dac511a28abb51d5d0bff2b6bf4fdcff95da58622740000000fcc42de49e3d61c0aae80414707b6134d7dac49a5f7edbb359b67c814412db534ec9b255a953217cdefab6130c9e331c30c08e0ad7ea338a76bbdeb3d920f66d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2564 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2564 iexplore.exe 2564 iexplore.exe 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2564 wrote to memory of 1612 2564 iexplore.exe 30 PID 2564 wrote to memory of 1612 2564 iexplore.exe 30 PID 2564 wrote to memory of 1612 2564 iexplore.exe 30 PID 2564 wrote to memory of 1612 2564 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\96f47374ccd4615c06566b48f1402235_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2564 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5786dfb70699b2a2ed10c8f1a2b20583f
SHA11aa63d4a5d0daec43bc78c6b0e2c889a4e8cc22e
SHA2564d8be236f6b7d161ddf396418887903658764103492fd1b499f953fbc5f98431
SHA512b5827ab6498ea695b15389d890eaab1038459f8686f1ae6d544745eb395021d8cc2821395d6a694f68e972ffa50fdf0ea35fda5e487167b2f607d242daa8c2ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e4672850a50aa8c0a5e96883654ae96
SHA14320b93970a7ff905fb5633cbe8ed6679220d17b
SHA2566f977ce312c0ccf4f948a3203914385624c0e0fc68e227af88d42d2a6bdf297c
SHA51256a28e2497c9bdb85df40f58ef4c40f2b9329cf64053f502a019d176ac794df1e2716f94892bc0ef814431d248a1406ff2f4565989624b279d3031481803f38d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0297334b5a51fb7e527fd0ee3a45efb
SHA17f254e688fcef2bfbb5cbdd256d1bfb2aaef4edb
SHA25650b16aac61c159df32e58d63bf5ad98fc895d1fdabb0c3bb3261413ca3f1fe1b
SHA512875dc14ec84cf49394739451071deca28a56f159dd1b3162e5e09c92c75a35fd9bcab06cf5b12f87424db1ed2c167d3a52415f2303c2c5a56953c2758195ffe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59252fe8a1dd8e424dde629af733b90be
SHA184985d4e31c16242465a90adc2f505fc96058497
SHA2564448ee2bb1fa2b9ed4b76685bfa413d6b6f923e163536c1b98c6983cff4de113
SHA512097cd9a0adeb60e04e360120cedd57c0f707125114118e894dd8e604796a13d440f26ef790c9650bc70dc4a209c0bec572019e6ac3ae4e28617312b149635ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd51f38f4065d27c6a71e9e3752930ca
SHA151b78c55af8b8c18b95b21f69b94c68baf7e591b
SHA25698b72a00e7ff01b8ee6a5716efd13e8e5ba330e9dc5935c5e6a6605150c58e29
SHA512ca5dce9ace2515b7716cfb621d6ce168b812bb251f565ff16fd5745f204ac554389f33e6eddacba64dd58c0a8efcdc504f5eea3da4fc85aa5f6da32625381797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9e0e8f5052e72082f5b0d7b08791cd6
SHA1dbbc4e18053825ccbac0c89e1708fbb841399997
SHA256d3b41cf7b879c2460ebc9441f717f5688b98af6f01979d5915c2c97bac46c3ba
SHA512f29dceb6a358ba609618ab5dc5c04a78f407fbc42d297bda9c36996b5eeee2bc07614b75557dcc09cba4f7a3c130a852e6b7627263bc55ae7c55a29ccfc02108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5207a07c6f06a018e3e48a6ed617a35a2
SHA1c70967f148b97088348ed9c6c9dbf9c2fd4b290d
SHA256dfa5315b904e9bea170f73f95857cc96e4e44cf4c934a81a91f583ca6ebc74b4
SHA512bc5bc5399961b86628ba67f813a611d1c1aab9d6bd26a2127aaafb067644f06914574a2553e95a97cc4a32bbf113c98bd08bb563e8f8c2c71a5b372f6c00fe10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bda00e8d7d81479e63151991c591159
SHA124960ecdaa625a988defc1a131ac84492f88d159
SHA2566eebec217cbd1b9bad2ab2cfbf7af9ddcbc92800266e43da9ba367fdfcb71a4a
SHA512e5f4095484e7c63fa13d11ee4c4eeb5f2de38bcb7fee60d0e3820ac5ebd5ba04ff000529c6c1b1c2843d2efa71859c401e9e9e5def33532e277494716efb95e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5252cb453258dcbb5a726fcf0474e966d
SHA1954b53c29452d8728f03622a209839ed45b350d9
SHA2561248b89a3a82ed2825109d6c534bdbefa9a29c4c90434b2e6e1ad46ef39de609
SHA512645be9881f9fe398b8eb0aa2b6b4cb4fa16e148cba6cb248a9fa1c8a9a0aabb63e4f3b787eff896b26604ad778ce43fda457db6af7587e9e14ba72793667f164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595a8c8bb7444201da8b7fd8f27a51316
SHA1410e76adbb502f03391933514ee7a9990d8bd2b2
SHA256fd05ef8b9fa4bc9552976829638896311ece73a5867a86f931ef5cbd1c44dfeb
SHA512abdf3db90c5d7250371a0ec6667f4edd8d3d255c6d6b39db917aaa37405d7b7262a70c51370358036c069e543e4f3c0e829269e42a679299ec765d4b95961f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cda1b4637ded474508527714ed08791
SHA1848d4d735bdb3c624964264e81c644f46c116f99
SHA2560e430d7429ae81e3028e27ef44a80fcc28429239a9bcc61dded50472a36aee10
SHA5129bdd976c8367679b4bde9b95bf154b1c8a91da546c1cc2f9e4d0caa8d0ef80a17063d152c15e55f2ac1a9e3f9af23167f3b7ddf628b98b556625c70171b433fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54563da2865ed85495e98c99c4fb32a23
SHA1857b21b5e8deca166efefdd171a82052b589788d
SHA256156b2ce6a044f310275c14ae9cc746f17f6a4a7b9934b77e3205fea2f8daca0f
SHA512dc47ea9aee135e7fff3998413d3851b6ce8b225077ca38773261de7cd1b4bccc1b9bc189bbd2f4cc750306cdabbb15a7ab99d5f043d72ceb8be69d108c2df9c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f8c870493ec5d802d04447245815a73
SHA168ebec41e1c5c0675d6bb8b04775965312c70ffd
SHA256d2cef39d6bf1649058e26dca635a2711ff4ca7d199fa3daf03dec917ffac42dc
SHA5125286988336c7b307348d9793488f3b5fdf099c1a07b4d5b203ea1ffb389697cae5283f7acde9e3000ae045b63f5e2c614aef01f2d74fbe2f47ad127a137e9064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555cb26802ff0696815224f5924ca4cd0
SHA1fee9e0d47991b76c38f460fb236a93f2b4d0bdd7
SHA256eec62276efba70c97366a92dfb96a366662954500d9a2e443b404b46be17c2af
SHA5122802244893e96fa196100620068c800b09c3ec784e68bebe36b6ea604a03eb92bf98ab3659ba51e68b17c48877649711497e4bfed4afe953bf75fc782dffda23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e43938eef39920131d0c0906c29d89c
SHA154bd950b89ca0bcbfa8a8437510c0c8054bb6cf9
SHA256765cae9cfbcf207acd309a57386e8eae2214de52b14e4317671b3f03435f74d2
SHA5128995f91b7dba4fc227bff8b502b7bab0973084beda9a38178b1c336ad6f2d2a63c16ec75122052e0f2cfec8a238282ae57ee5ae927a009cffdcc4d6c8cc558c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e6f6804148a843f9c8d9a66d483185d
SHA114c82c4f66738c7be81775c7712fcee7d16b5b0f
SHA25616e780dfdbfb214ad1ebb95733c8b75c23ea377dae850cbad756d7c6f73c28f3
SHA5129376fa3e0feff86ed4b36b6880fe0f552d9ce5029cbbda22187a5c18b41c50f54e608d7470c57eb716e8a9a5ab93d3ac4e2adb49f659f3435dfc5f03b9511e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f411353c27519b1415c677fd23d08a3a
SHA19f4b8e7e73f7f2ae4a9f7198a165eb7767c2119c
SHA256e7bd92934930a144f7af9524b14fda3d935a493db8787fd17d4967496a147551
SHA5126ad52bb461c439de47f275a91031e26997ff6cda865dd842d569f43006a9cef8220e28217d84b6ced6688067eecbda8fa44364a017470c47f34647188e26d365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525c81d3f426afe93e22ca0ac9ee410a5
SHA1843017fa72ab59bf3ede8e53cbf7743ad267a2cd
SHA2561ca1193ee3533b5a81499a5b8e85a5a69d4a50752a28fdc17fb920e0448807cc
SHA51207ae15307d3000bd4774f0746a0872bba5cad3404e297eb6d57c5caaec4446d27b44fcb44dea3b7646ae45635824a8b4aaba28220ca1246be9a89d3a33b423a2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b