Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 17:59
Static task
static1
Behavioral task
behavioral1
Sample
97195f0268c16b08e67ed0c23b7c45dd_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
97195f0268c16b08e67ed0c23b7c45dd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
97195f0268c16b08e67ed0c23b7c45dd_JaffaCakes118.html
-
Size
6KB
-
MD5
97195f0268c16b08e67ed0c23b7c45dd
-
SHA1
acff6df9f6ba3e85544a7cad39116a2d04760b8c
-
SHA256
2f8996a2211fb9a35544ebd573d46fec2a5c793180af40cf4d92600945e2c197
-
SHA512
dd2aed1d49282fb2d63da5a78f5cfa3f5e5619dd3860b0bb9f646915f483c91b349a6e0b3c88cbd82671fe431bbe02bb60a291a027202b0b9a3610aa15d1da99
-
SSDEEP
96:uzVs+ux7zQLLY1k9o84d12ef7CSTUFZcEZ7ru7f:csz7zQAYS/Ib76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429820250" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e8ffd173eeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000b8f04284501027cc7ae32b8171ddbd4a940abef074ed6d5d1d044089af36c30e000000000e800000000200002000000084d3d75d8c1e35b2f6b1b8f1397f2af09f0cb1971155f1f76fe908df507eb013200000002887fc07a2b39cda431f43a101f01fe717dc5be73ae582f700a1b108320b20d740000000d34c455eddf3917b70b13d54eeac0080389d538cc36056b476749dac4209f71e9ddaaa7d852348af7d8030bdfeb3fd7040ea1a351b88d7cf6a6b7e9d58580855 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FB698F91-5A66-11EF-A207-6A2ECC9B5790} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2428 2384 iexplore.exe 30 PID 2384 wrote to memory of 2428 2384 iexplore.exe 30 PID 2384 wrote to memory of 2428 2384 iexplore.exe 30 PID 2384 wrote to memory of 2428 2384 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\97195f0268c16b08e67ed0c23b7c45dd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f5fb9547b007890602a4922e9abce7f
SHA1cd462060f86b427a68219675a049e1711e39f95c
SHA25675b80d7d9d21f250e9ab4d842c445034b8611297b9f49e3f3d77bfc864561167
SHA51248d503c813efed24f8f092d10b0bcbb073e658b5d9aaaf992108495b53a71a1827232626b63fa5730ae70c9805043f59bee3d638783104fa99bf6817547d7e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d40f87cfe0639726ec2e3add3b245ba4
SHA101464233c78286c8c67d67c463ab773749095696
SHA256c57be302d2ab7874dae32f9047cdd1581f2484ed7345fcb57c5a86389e83a588
SHA51238d18ef033897fa5cb0c1563b6b45bd18628d8fc5d9bd4b425fac37bc7d7029093c36c8924ba890f6d8f5ccde56bfadd59f9d7a2854e1076cce9d99e2fd6d2fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6e21397dd87b26c2930b13ad9bc2e1d
SHA1b057d26e22aadc99900b059a92e6a3a2d39be41b
SHA2560f1cde2ae8d54f201c69601332f61f44a0c4918445d626138dc8b0bd31da5347
SHA5129e6c6c7560c1557e51295481595dd08ac8d648c804f5aaa8baf655e2d2c6ac9ad1d22e0b2a185a91de81043346c8bea86876c2d2c85a12f9170bf15c09cfcb4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ace29f88e5f4670519cde356f4a2410
SHA1176b8f5309c921a2542d1dd70da924808fcb7a64
SHA256be2eb94e5d171f478f0d34db782aebb8bf6a00c780f79725edbb649425be1b9d
SHA5125b7d1682744425ef3afa772b3a605bcc2b535c039b1c42fc84ab1331c527cf9d2e2253e2e774d6f73c2d078812a769835a21b0b048891dc108c73914886401ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5855c76c1419ce70e7db69c01e5ec3ef4
SHA1ff98a1b1da91ee36297c037d8d01aea9e646f47d
SHA2568756d9d6d6ed552b1f2430781af8538c0a6657870b8c10ea1e1e1f49c8c38a27
SHA51239ca1ca593aa841f2a09c2ce5a88def0162590815457c8389d441c68be2150c1347e09f1d8ac53d5c6f04cea3a614c76d09d9934b8f44e722521cfde7febd804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53da06492836f37babb30b1d13a4dd8cd
SHA14abdf1b3115131f5e5e3c8761937afad19ef259a
SHA256381dcb71f66bef595daf354f7d939fd0949f9baf3b91c07bbd5738d5b09e4be7
SHA512c60a6b3ac28a5f7c49de9b345a2be0bb79451c8e962b47fa35623d521bae9c34c98c5e8f5ae02e06e01c13e16bdc636fc72cce8885aac29b7d688af9cd1e1c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b16f01a61818c21ca27dc851deda6300
SHA14bcffc24629f7b9970a30f3b4a3604e4f556cceb
SHA256c4c3187232f96ef53dfb41c2226845bfc00a8ce4b68065e5303bc437e5194880
SHA5128276cc738662aa0957ff460e7b70cea10edf35014d38dd571d905210e56480f130ab5e4aaf22b5bb104a78a674d3728ce3afe1aa976d60660851b819e65f4ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5366730a3226991a271f82295df34a357
SHA1f0ed00dcfbf23aa526f420cdf19aa48971c23495
SHA25645cfb0b3b8f84232fdc1eee2f0db3411481e87a9bee1710654fc1d65e27d941b
SHA512a117078ef74fc95b7a5d716ff5019af96289835010597f44b865a2735001dfd7d640844377c8b3a6ef4da8858eae20e6df2a770fec3ca35588c3b6b9f23f130d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c524e87ac7f2b5ff2473a23ebf905cd8
SHA1ba1b7e5ed4f0bc2637cccb3926305b15630e2486
SHA25609f99275d6eb549a808be532dc310436af94d432789c76222a07c822c9a2dbb6
SHA512311f5e7b2bea05b6aa7efd9f2b3e4a8767aeb1999f90b68348cd56427774a12587ec4775194df5a17d519d8f059d97e5e5729dbbe7ef59b90ebde4540a561162
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c092b6e5b206beba1731dcb1ebf382ec
SHA14397de08b64a5c06773c576f306fc9584ceb9b4c
SHA2562c2162a485c6fdf113935d854ae51ba279e3032cef577d704068dabea4b88a6b
SHA5127911830ba2beac52c37d5e9656d49164d755d8125193d965c72af2b922298ed82da02e4fa6d9374985b3b7f12683d3c6fee0a7dbcae9f3c59f873b8a5fe0e3f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553f2815281fb67bd2054023ef6969600
SHA1f960c5604aff1f4905263d3ee76b23b6d9f77c43
SHA256fc1ce2d37bd2bafff1ec956f3eb2ee50f31f67289319f66e7519fdb4718d2f39
SHA512dc5a6fcf8dc724945a86cdff9902ffb630ee3b973b7fab5ba4a3a39d4ce5eba33bc5de4a42208837b9b214e52f28114927bd506b9916555c91832aad527cff49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517c144975a40e61d59524befde7898ea
SHA1c0a6dd5ba6bca846b276c348634050d7bda0ea63
SHA2562feab23c96e0b560c745435ed428e35249494f256bb5b90eec530dec767c006b
SHA51297d948817c8eb41520786e7645403d26533826fce26b315cffe58deca9523568d7eb2862bf4059b38fb754ba71d160c0e785cba52aeba56b3fb30d4d704fdc9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec3fc4c130f7f97f73ac849b504fced7
SHA1b18f3a33595d2a1d55d7e709577e3ce900a06b0d
SHA2569280046ead78aa23ed9f2bde68111d0e74d0132d80320eaf85b5fda20b844e26
SHA5129abc4290502a1bc112f7705b911a24c837fe03d885ee2eff19269e5d6826587dc2569bb95fb7c660472650d471e8006be3d0d40aebc1992283b5a97345548434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aa3443cfc1a83e014efea0587e406ba
SHA1b0d8d45a2d556c82a3efd506d73b70abaaf8a1a8
SHA256eb5f20d80d93389f5d78a4b2fd3b3ae190164434b52eea52874e4553e475bda7
SHA512f930f55b7f74d7073298ce946c697a7d7e508dabe732a3243b6783573f708355365b80974a090af2bae59e1932874a54e54c5cc9614345bd9522d99d9a606bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5176825f3fd8b5a8037b39464d7f7ce09
SHA11dee4f6ca5228b3267918f30a347d91422ddd860
SHA256fbf168aa2e157f44d54df6c29ae0183e09512a4f2736a38686193714e0c2b969
SHA512abf7a0409670adfaadafcce2ae89374f9e321914e7da6e1731c65b250beed8425b8986eafff31ccc47a5b6d9effd0b9fff7da8d7caf43ba25803be8d3b9d58b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a8aa4b51dd2c9644b8bcf45a02fe38d
SHA18c4e19985c66c1e98d1ff64faf64fa83f5a53ea3
SHA256cb4de4a2fa64b995b6e78b7a136369a0692fcdf34e30c8663c2978a4cc751a09
SHA5126c2bf49ac5be4da9aed6dea330a1eb8166bede09b059d70c4255f0c54cd28b33a74cfb87d3f7477c6449a4109f5c9f99c00ff18cd8ea7bcdff74e37df33e1852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590fce75e72ee906cacd29a8a6815a4aa
SHA1abe569c272c6226981869a9e5bc42f1969725989
SHA256f5387e19077bc320ff2f1c89f93770746396a053f042dc64d2bef6ccefb42e02
SHA5124e2d344239aee85da6098c6d2c1f66d9579892af5e2161bada10c1d2cdcace2ceb282db60975052b72748111e2a083093b55408d58130c25ec7cd76b2a444726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc3a37187dc209b0c6f45dd74c792942
SHA1c1c0f70ebae3870af3312581e7b45e2a3353cb22
SHA256ffba8ba8e1d3f18043badb770232a60086e1bd09cf7905a5b3c43f800cddbfc3
SHA512b95e4bf0f288eaa760196288557de5b42b3887677104e1aa98d18a99513f42838358bb9756aa1ce733d81db29356a80d2b59f1f7fac48e0daae16e60e835ef31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a793afbfdcd1a89716076b6ee74b2e2
SHA1853dd991181d656fedb9001f8036a5bf1a085cfd
SHA25648bef5af626380124f39980c1719c4b708c5a4c9a8a3a0fc4f3d8a0a8251b90a
SHA5120d67b6081dcddaaab0d4fe5658abff2f0cc9a7b4fb1c6ffc82321bb23c51766d40c90c8a51916347e5887fb0abd01172fa9c8631b63608e4d6531858ecd7dcbd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b