Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 22:54
Static task
static1
Behavioral task
behavioral1
Sample
a478677800bf6f26075983270f7d4ebc_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a478677800bf6f26075983270f7d4ebc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a478677800bf6f26075983270f7d4ebc_JaffaCakes118.html
-
Size
121KB
-
MD5
a478677800bf6f26075983270f7d4ebc
-
SHA1
9cb0b2bd83493c27bdec2bdf89965b3278de12c0
-
SHA256
60d7f0e8cbc0d48742456714fc66f39863c3392890d09678ef5a236289fbcaba
-
SHA512
8f7d249934901252730d6d2593d694bafc781c3428ce167554c2cae37cff79fee64681b854b1481c407dc10dec6e0c75d9d1359a1f381d72cd6a77d4ade45828
-
SSDEEP
768:10xo8zVfDO2uviLkzvA/tCod2dntgh8mSiBK02m5g/5m1slnRjZW:106CVMMkzkCo4dtKtSiBK02Mg/5mKxRc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BC725471-5CEB-11EF-BD1F-566676D6F1CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40b743aef8f0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000087616e37cc113cef237d9e62ee142c4881840dde5ccb800626ee90127f22b3b8000000000e800000000200002000000029479ff7df396b2f9ab8c91fe8ce4268b24cd8ee4acb9e12791aa7de7433079d200000001ebb52514482c6adca784fe60f3a9abcaf2eeec22a26cca8e9e95b3f472f438240000000a09f7fa67283e8de7dc4eaf3b24c7b08bff9a4f69767490b15b0414962722352f6af846c9e5fa0472df68320f86d62c0c7dfe8a1b7facd135bbc0f6079ac1ea7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430097171" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1916 iexplore.exe 1916 iexplore.exe 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2072 1916 iexplore.exe 30 PID 1916 wrote to memory of 2072 1916 iexplore.exe 30 PID 1916 wrote to memory of 2072 1916 iexplore.exe 30 PID 1916 wrote to memory of 2072 1916 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a478677800bf6f26075983270f7d4ebc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56641f69fd8bf588a6c42ab2876cdfb14
SHA1ab124f459c1c5931dedbd83d9433a7299cfc217d
SHA2562813cbdd0a38e106d0f1d9947b9196efaab55d8d5dcb451697d97026f3815f04
SHA5122bb8dd1e31864c3e45c90bc2a339f99f6f33694fc72baf797d11cfc4b17b019576edf9280136fe25df9f48f5c21d301bf4d35ebc9a18bc820ea797ec4408da7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2280bed7259389bd822f4119a439439
SHA174dccb1f7832d4efde835a84284a76032592adf7
SHA256e7d510215e8a3e9569ba3d454ee78a3cecf9fa6a19237cdb8948d7deac6fced8
SHA51268bfd2ecb6c9620c63b53fdffd07263a83c319d84868fd5e5d757ff7312ab8670cc68a1644fc9bf650f282673e8da18a55c7debddaa759e72270ed682c1f3489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5560363f337b042c16b5170499862ae23
SHA123439217463ef47df1b46de4461303c7fa4017c6
SHA2567b63adae2b41159244ec7b117c4121b23175de9da699b66c312a73172d7e4194
SHA512fa6cb8b6cb18f096e5b078b2bd4c59a4c605cea996d2b1aadbcdbdf1f32ac1a7572ef3d41e546d17022f9ff4f6c011147da0fba89998566bbc9a73f0e4166b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543fa05c5ded82f529b53850d06373dd4
SHA140e54cacf78230be8a963f5276f9b6b54f5f0785
SHA25665b8d689c53403a94519d708ef93a83522c8a4ce492d1b6b7a973ad7dd9995dc
SHA512b642881801263755bbc0e6f8692106d8e4968cdbc5355961832b7b49723a1ddf4c67f5e7c7dada1dd4002ba2b364eba5d4a79b47ee4db9de7b48dd2c11662d93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b07c0c388a13c8e8e5566a6306a8d581
SHA120b1dbb4121e379bbece552d9662c02b5d0a8a60
SHA25603b48783bfe1bc9855f775db46ae24b503b2dfb42a49ad0b4fb0a0f69290c18f
SHA5123eeece27e50d9159ea5b365b78d6bf8d6e93a8df9efbf0d3e935cd905fdbfb38b769b1b80311f25362ef3bd476d6bbae3e6ce43e1b4605dd5feea7afa631cf50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51acd0d1b170c17a4b79ead0480708600
SHA17c78e602dac817e593c15fe30bfbe476378aa2c2
SHA2563a0165b2f0eb513cf3d9198cc8fbb57e9097cdae8b5ef574171a524b71cd38bb
SHA5121bdcfcac7848b8be5e334b276c46c4b0b4dc53fae8b5eca29f463fa968b9ed4f576ef01e01201168819e31ba118ccb38d9a20519c997a59e9b67b6b0993f6baf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556ee40bd9b76519b4ad36007a745e4f7
SHA1fc81fade97b38c723c952dcc6bb6c4de408319a1
SHA256911301021539bb30c5930cd394e0c19b753cc4037e84ca4c243c0e67bbb245c5
SHA51204c13406f2aa16d1531126d250d1efbab00e16737883f712bdb8f9798ce9cb70b4428538915df18248989fa216fe15d2c16716b3cd2ebc4d6fd871d81645564a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7805e82a043029d3af7c16862073b94
SHA1efc00bc555dc3e143b3c5094d9cba7e409c83baf
SHA256e59db1558ffe3dea95992146f9fdad0ceef469f94860a33f675c9b5710618632
SHA512278c87a9efb1b85ae486a85b5ce608072fc81a49c3e013904fe834941ebf25df4174f2b003f5fd07600f52f18d60f349448cab82648cd87300188e1cf7f8acf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed6cd462ded71b96d09d70e2fb504e4c
SHA18d251fd768cced452b2f5a00aa67a26327196aea
SHA2569621f6e9dc5a0bcc70d356b329041db10fdc0f7a26c17eccb7fac817e820e2e8
SHA512bfb916e2923b13e0c4b3c17e5d83093d0b2c077d316a296bb0968e42d34d5a925a63accc6889baae4d2cce93ff40ee7445a7ead20fcb63028865047cffe733f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bf3c702aafb94becc4dfc4c640349b2
SHA1387ce04332db94630e021e073957fae1098a551c
SHA256ca76a89092dbf43226faca8df3d432b04dcf1f385063ac7730c616d955e3b59d
SHA5124434b5273e961eee24e57793546f4fa3fca115c9ddffc2bfe7913db8861d387f74048aee6b358833ad88768ced1334d465de7f0a06c306dc80c86742317a10eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3c59f6a71f91d6cb1972f2910898560
SHA1f17dee0eedefcd9accf7ea89f5bf4007e409cc5b
SHA2561bdbbb790183265edb061a1df4d38aa34eceffe0fe2027afa26de258f4cc0962
SHA51268bb65c7d9579bee3521158abe4a2d32e6483c6f7fe7bbeedece39e6604d4c07c777a65838f8760a2343465d12f7a032d0436fed9782922b859354082fd6a570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59784c9e7bdfe7f2f3f0812814ebcb8b1
SHA16d0083827ddafca997c3092a190a5541416269ac
SHA25669a8bccf45510c075e845f68f6266988190b12d9529d0e8c856c05cd39bd16fb
SHA51279a9160e539be6c4707c28bda94285405b821947d7fa2749203778f98168e5dde2b2bfb32fba62ffaac1925bde27edbc97b4776834006875a7139363895e2ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55130560377b8cc308d61459e702613fc
SHA1d5abae82a73b421ab943f19bf27a2330c2074fa3
SHA2567558791339db8f0a4bc89319b52978b985bb5420fa9ec151460d262159b44011
SHA512697d249434bbda9a110c0807577fef7f203dcca800433a5ecd2edc80fac02c26915aff58de674d214e0f0e28a7332355048e15a74213636ce431de949121e010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbe44b7db78dac67bcc0f43924447f02
SHA191282bcf8b4ac1df5bf4f301ba420d3de998496f
SHA25687a57509a8106a8b6a22edd30c23ba9a8ded2d3938a2ccad46e89f3d4adffb08
SHA5122dc2c0ab1af0b9995f320222c1cccebd8f92da21dad98c810121bace137dec4f6539243fa8f047e4241e0f8f9f5aa600cfaf59d08f388961db3ba5e117f18005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb62c1dfc1a2bfbc284d37caa1a49a61
SHA17ee95c135230e809858b97b49d4d64ee813e331c
SHA25672f157d0556b48eb0cddea7d7a80deb2c6ac064d17d9cbccba41db3ac5461cce
SHA5127570455f11ef26f89be334f711d6c37a6253079657628a40e795411a99d5efe851ce54b85f92582b1e158f16eddaae303a3f36949ea78c1d51919113f12f22eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5100fb30c20c91f34cd6e3f5607f8e299
SHA1ba7b38cd7319983f0cb194ac8ed4b6b31148d9ab
SHA256ae15bf95936f9622d6db26c62fca82414132f582b983cc6f9fff555e3cb72d33
SHA512d30ac715a11699346d25e9d3971058a0f776dd4cfb3f63382d0e629aec1654c8037de5c108765c816146b3c28e23b3c66c25b59fa81f0042c8954c8ade79e300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510aa5571d84bac7b54b3a6cc7f728468
SHA1c613076618340694a7a767d52e030d12bfef7b8e
SHA256cdebdf50a90c781a0410db2a4862a03f4b149ee71af81a0e2abc8d4e87217349
SHA512aafde1ef09c286660d3b76df4529efd5245d2a9eea78d76f915b887d38a3e05a935d17c04330cd04d3d99301c0773c8e12971d9b6c0d715436bb1a16ece5ebbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5182398280a01629bfe5c08c74dbb8882
SHA1f5bf8bf6a451cecea9d5345fb59e5ceb0e57eb33
SHA256f9b54b115db10c9426b58a40522e0010af18b7e6f3824669aa27d9139c3709c0
SHA5127d3a8fd9c129475dff16419d4108eb3f042cb7d05c02256bb050094de50947f31eb1dfc76688c29a9af18858b67134f40165a8288752dd18d1ed8ec23f18a0b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582961cc4912b7249581b3c00ec525386
SHA17698c9936a9d7eca6459628e69753ef80b686fa8
SHA256b80eab671626e43d62d620c82d3a2d54a7221d76405084feb73f5153280bcaf5
SHA512703d61a14d10c121d52055ea2f1f0534f9048679c707d2688f9bf96638c1a14b1c1c06232c00dde9a56cf3e153b39a9c2cdcf034e49dd211720a619897ca340d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b