Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
a762b6357f3fe58e11b975644495a154_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a762b6357f3fe58e11b975644495a154_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a762b6357f3fe58e11b975644495a154_JaffaCakes118.html
-
Size
27KB
-
MD5
a762b6357f3fe58e11b975644495a154
-
SHA1
80713a564087965bc213cfc12d7eae7c2de56164
-
SHA256
38c75d38535b17623b2a65063ce0f13ae41c1307151fdd954aaf72c9ec3c1eb5
-
SHA512
0473254496e5f08bb90e13b96756764d1ec4e6dbdc4b1b760da4f0f45706a6798ea42c07f36bdefa273ef928f5022045dd0dc1d3a00fc531e84d6b183b13de3d
-
SSDEEP
384:x53H8mf53H8mf53H8mKZfQUdI/j0PtwwBwowtTZ:x538W538W538lndI/j0PewBwowt9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5A758E11-5D7F-11EF-BB68-FA57F1690589} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000629dddd11382e89c170000fa5273d5e1c33138a33e99138099fb70c6072fcf15000000000e800000000200002000000081aba0315b4115f759325424216c9cec7ed5156ba5cee5487b94089168a57ac020000000e9b60a26813e51bc1a7dfe989efd12c12f6cebfb178a702e450ddfca9887273f4000000053f03c8f27f0c2880b1a35bc711ec09201b81b5cc89be37cf9a4e3cf5f181aa03e670a40a14fa0b827126199e4ee6dbb7498b766d15fcaa76b0364b80c2a667f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000024615c83956abb962c8fb26bdb6e98cf1faeb45a2f1b367d5cbbe15c415aef0a000000000e8000000002000020000000e0af966844bd7bbf092a27210cbce34f3696bf9c3f2e5345fa48f1ca3f4053f5900000008e4968eec66fd52b42aa74ef3b9ece66d150c325eebaa33778173f80e379da24c11d8efc37d3d43ad1afb151194daa4bfb29beca72192d26e732c33847da6b9e7ce4b96f88c2066c41d5a6e3d5e0152d005a2208e6c17346ce2d9fcbb9b36f4da5d4d11d7fc0f2f1bff98163f4070fdcf466deab4fe58ebc95c1f56f886680c862dd64e567bc16df87e4bb2e9461ad774000000025aaac20d75b0189bf25f62cf4ddfe942eb2735c758e8b4f22d6553da6938ea662fdd7f495722465b10ea3ad0d6cb7019bcf4ba3846933ee192637d6f1d9c31c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0872b328cf1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430160573" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2152 iexplore.exe 2152 iexplore.exe 1304 IEXPLORE.EXE 1304 IEXPLORE.EXE 1304 IEXPLORE.EXE 1304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 1304 2152 iexplore.exe 29 PID 2152 wrote to memory of 1304 2152 iexplore.exe 29 PID 2152 wrote to memory of 1304 2152 iexplore.exe 29 PID 2152 wrote to memory of 1304 2152 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a762b6357f3fe58e11b975644495a154_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2152 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57657421ba40946d652dbd93b9b9456ad
SHA18f19348020ded3e2b3481d77dfa9075b350d7c49
SHA25670070911fb20fbc255d6b47f0b0a627d74da47be5444e09ccee6b9403d28139f
SHA512f96009fb9e6e850c6d9f27c08c18d67f0e8941224a5a03f2d220fded2cfb33a865bb0891d64d49c30300c3600016650273333bb150023a9623494dd917f32aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caf3e8eb42ca6960a071a187019cc4f3
SHA1b13bb4f0f4d591be518cc52fc4166fecb7d6727f
SHA25616036f6c84ee77f3be7c17c8ca565a3f1405e6af29bd729fcff8e9666bf14458
SHA51280b2be6937edf8dc470fb377fbd7007dc67180d6300a484123de56132ba971f1a3a8926d10d1d69ea7800b823534870c0a2639cb60210ee4f148fc39ec7a8b2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5874269916198c549bb071f7bce152392
SHA11978448868006ed6c18690538c99bc09fccc9c5c
SHA25634926d5d93e3451a207be31118ae6547ad25950b6634329329b98bdf4b0b4ce2
SHA512110b746deee651f1880a0f3c539625fac31d99e2bf37ff8e92f989c80840b35f9aa6719e92f1c60eb39a70af6d408264bc51fb838685333b3be0c9d361b4fb3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b634f710d74882b45fd32e2fad6874d1
SHA149ec7f76ce83d0df0fe9a194526f9763e828d7e4
SHA25620694444c6d6e4f9c91bdb149771432c7b070e19749318e562f3c0507581ba52
SHA512206fbdc8dbb9ab549af4d5a23d5350a6da82edc44a902b4febe6ec2d507d1f8b1b96a4e194f90df6f90686ccb2913bc3761b1bcdb5efaa0e7583a8239a749673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf12a1630f8740846883afb4ffab534e
SHA1d68a2e6c7d2c5c5049d995d41aa245a19e703d68
SHA256a5e63538575a3226f1e212c50e4e166f6ccdce023bb156b8be0ffdf5b2641df5
SHA512e96576b82b20f5e8e96ac576c76f367e302e1ba60ddd70fb5ffb21483dc0655f10a6033fc4b81dd5e49e7c4f0dfec4beb27b2b0b22ed0db27a190e5bb29aea49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e0882a59193473ee2a1d5b22d6e30e7
SHA1c8a74972ec1971b4b23a16b53486edecaafce8a9
SHA25646431cd913a45ad2556c77c7633dafb9f309d545f26317b247c448a43b26afd1
SHA51284a8f70f922214a6ed91b6359304857aa8cc41b8d63acdd129f7a12aebfcd12b1088efb8f9d852eb7a585eec9d0fc8880e2c548048ee9167573bb208b0b58722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52db890b46d9c805f4d14e56c63304e84
SHA1e85b47479f92d8b74cffd94780c39e785ff78efc
SHA256c25c3a41ee2c6ce948a1279a7957ac600f507819f62562ff9657112e95627e98
SHA5124316f35ce3454a0ec022b7c1c6dac2a73054d2def0fb239cd4e7c64353f9cb2147afaa577b88d137ba58fe0012de96de2c3b6b2e2160a16b571fbc45032e5022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597bcfc7ff2a569f7b7f0a41f20d1dfb2
SHA119a45cd5dc18e387ebbf63bf5fcad2323be755f1
SHA25690c68119200af9984bb502c20b24a246fa37048c651e414ccfecf0d2a312457f
SHA512bcc1e02480cebd290c2aab9378c90923edc06eed8eb0c20ad8fa6a3668589ff5e1cba0061e2c9fed6d5a7d92b127fa424cabeccd344f1a059de81cb3959724ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2f3666845e45c9a85e8a855f200cc9f
SHA1204898cf437df8a1b1bc1e88aabd5fb10a4fa683
SHA256ee1decc58dc12452622a24193408b876f4c55816d2ba93895d7b5a916f615506
SHA512792dc9b3745be89663b28b420d248ad5981424a1bfb738c0943f41646b41a495264bf070917266ce8633047f35ece5293d0e5b651c38fae06e17f431be9c67df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cad22916e2924744d1b79a766bf31dbb
SHA13022c3a507ad73560947e67cd452ecd769ad7168
SHA2569e8230b2926b90e7013a793168fd89293889fc28eeca5a7e8021101e0c0ca3a9
SHA5120414712a8d31957c75fc7de5bb6a50cb67b1e6b2acdd2c907c8efa80d984ea93f3cf9ce960ace4aa7925530cbb4752457b65085e5fc8e73a682ebf25cd7dd383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568168e17650ea02c7f5cd2d2d7b24f72
SHA16776717a2c7ae2ce7fe48ec9ba66c238c5081e2a
SHA256a5ff446bca0110fccda0a20b56654dc9f80ae0cb3a337f14ae998726d74131a6
SHA5125679a7679ec4a0ad162096dea8b73eb3d9e07d4f7ce9742bf77861f57c03d5b6191ccd2720e80cee476abddec06eeb1f676caf4f5e8c86ae14e40286c40a7e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb4cb592dcd4122747c6f1e38f5eba46
SHA175cdcc7c7cd7630244f3a6b0a1a77c02eb6ea63a
SHA256f4f099f059e8b975baf74c18590e580d1beba1fc0b241ad7f5375057b317b79e
SHA51250059ddc8c0552f0ad7aeb89e7278ca24bf0503078f6dae2630dba83a89bebb9dd94f1b72f41678ff89c68b9181567164519126b44da883906f598ebeffa5726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51295ed2e0073cba404bcd793bc23531a
SHA1558f788431de300f95c1d59a950a78cfa9ef6189
SHA25656ca6d34bd788f22cab7c122b6ac05852b56b47c0ede293d36308deaef91a2c5
SHA51298d49b3c18da1cc4d7a47ba4c7eca1a72a2adb235dea40354a35a68407c842ba8255a99157c8898b56255a28beab285577d1ea86029a2d388cd81fcd7461d244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a212e72c016df29d35676f8413a177a7
SHA1ad2f5d547088b7b661fe1948a065a428b1457c8f
SHA256b8fd61a084f7381ba907bf38a7937add5a5e629f5647ae74093abe953f4db613
SHA512ed96e93e71d23b9194945ab88c1bc861a87a022e9b79821fccb3f7527015ab5c8a21b4b0e8d4ec85d6342c041a619509588f04bb3a6e85a3f26ecfad6b16487a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52289c50f8aa3c0176f11737b82ad1fc5
SHA14341296b2277444e50b59b5bad56eb55076c506a
SHA2562934ae62b0aec5e0538ce678edbec6be1f2c9ff53e4370ddbad1874947c1b68f
SHA5123f14162ac0f77c1c703f9e712fe3e010c95205bb898017c8a2a943fb83bbd626f3773ffc6dabd0ae32c6c886cdf28793502b51f7163c75300e1f77840ebd9965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5829a2c3894de8104868c2a9a90346bb1
SHA18cb2d5f0acf8d7e2e0ca4f1551e2030fc6a1ebd6
SHA25619bc2bdca94f9c6490a7d32d635fece8c6a7323015b0aa58a982e946d9f00937
SHA5126af231e49107ef86815bbe4d8bbd05d811b6be1008904c56c70060ccda4fe27ed2456b204625db3dcca3c52b0aa78c59e7991764f7773dddb3d47207b163f76f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529afb0ff9708893f93fa8374ddbc9d5e
SHA179ef9f0e1c99eb2d6055a0513c7b76770b583e21
SHA256890288bb3b2c65c2eb6c8b8168b997794d91bae4e1b87f9646cec8062a647ccc
SHA51207a4ea6a5ae98d020ce50877a8c2dd4da886f58e23d6b300d904cbf3dcbba7cf26967d04e7e968ff3c0696de8a76c74293573532c24b5520a2edea0da8b29502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572f45b7ed06ac9ce383d3115119c3a69
SHA14e301940f0f79ad8ae21e7dc0b101cb14b32cb27
SHA256d522cfceebddfa8da5f5f67226e17ae0b9f108b14d6ae0c63dc39c73d0ce33d9
SHA5123908aa8667f69d16a073b8a5cd1c060b2164724f1d7ee9505bf269465c318a81ecb44180d83dac79fb51db407631491582c3cb5fe02c17c9dc7812f6b1ce4e61
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b