Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
c03cc77dad836cec73b497cff31314ac_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c03cc77dad836cec73b497cff31314ac_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c03cc77dad836cec73b497cff31314ac_JaffaCakes118.html
-
Size
25KB
-
MD5
c03cc77dad836cec73b497cff31314ac
-
SHA1
c6584bb3bf100430de00929e3fa98ace66f24004
-
SHA256
3e7b4415c8b81f40e333060b583f9cd52161b99be6c62c88c8eea9bb936e7c17
-
SHA512
b6bb6a1b8ab6bf84fad223bebd71f9723bffade2c96344d15d7db2f209f2ecff5cec64871a01c6189a267e3d37dc4e278d4fb50776741447b416bb36a8f7c376
-
SSDEEP
384:cZ5irbI8JIHWVZp6FMHqtjRbHlKKWm/Z15+hJ0hfNqN5eORVtdrFjFSyiJNFDp+b:cZ53IpO9NuJUkkxC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000a4dfecff5493df1619841674e0c45e8e4720082b81d0ab4808894cdf3aabe726000000000e80000000020000200000007427d87b4d09b552ead0a7c7d07793b3b310a7d840b65560ae5623e911c0da5220000000ff11ac9bd3366ac3823b07d795789d501303c0c5eb9b28f1615085773c37d55c4000000015cd0e322b69c950783642d8258acbfcb112dd32114c377e7d63d760b0dd0a382a171596c10c232c8e0afc771b5a4d49bcfe3c33cee88dd48010c4e196311f67 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16CA7DE1-62B3-11EF-8153-46FE39DD2993} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b085fa13c0f6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430732553" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2544 2236 iexplore.exe 30 PID 2236 wrote to memory of 2544 2236 iexplore.exe 30 PID 2236 wrote to memory of 2544 2236 iexplore.exe 30 PID 2236 wrote to memory of 2544 2236 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c03cc77dad836cec73b497cff31314ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ad6e237aa340aa9ad938dcdb93c8e6eb
SHA17e5b4e48224c27318ea92ae7df0ab2de21ddcb3b
SHA256860625885808b8470d40dc8386c77e6f34cef6c1034b190e9e999211c421e312
SHA512bc6f266ae7c9dae6ebc473d979ebad1b414bb63f9036c4a2978ae2e2450cc6bc9b2ff11fb701bb30fc8a0443d6d10a085beb73df51844328d026e5307b85d8bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbc47ab5a7e9fbb36350f537fe1869cb
SHA1638d45398f241d59a7b21cd77907b5242c493eec
SHA256f04167f1667f9dd2eee4d5fadfa938a8aa90720bd89fafc4ecf519a7b9120b3a
SHA51263b2fb8dd8d82cfb700ac565baf80cca0f87f79d251f2416f3e7ce33128338f7f0be553c8cb0768d0cfca8a5e4915f4d07d4696678c741eef13034003892d713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b1d474d5c5cf45d6afa797a2f26d0de
SHA1f6e9ba3fec934c6d039cf40c1a9dff8259ee85ca
SHA2568e01519d62dfa76a810cc1b6cd38ea9fed53d8a4c5fd496f13ebbe52af741d04
SHA512f4117cc4b3bdb86e15378c17ecf744898a8ed2481df49e698a3e572082e8131bde270023ad9973bf7cb7a6ce95789645b66ba3087b18168c9d7282f5afe1210b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff5b89f098dfc6d2f4ea42e06833d975
SHA195a496edab4309019760aa663df4f77b82f9e144
SHA256d1e0988edf0cca4335973f64f1f787f1156bf2fd6d6139c9feedeb69a339de07
SHA512cbd0bd4ece16cd209a9247b96080df249f3d3f07eab410edf8911fcc0668926fe71f5cfcb7c73da1d8b89d74df9b4b35b3b6d98438add5c4c029fc9adf0cf543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56acd0ddb329652cf59e3e37938c70828
SHA1bfa0a91f4f1b35f9e38ccc61d99e0a3411d45eee
SHA2563caa3f87c2a930283e2ac49b16b2df622f488bcf083329a36297b2f1096e5d37
SHA5123573b96a79bbf38390d917793e83eb871933d63b3f6dd0ded858cc8b55a9390fda797708878805f128aff87aebb48f04b61c4e4771effa5560c3e28b3ea4daf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf84b7896f2ffdc1eb900f3f173370fc
SHA1c68201039b441d853064197656a7891009130f11
SHA256d97c2e834674a2929887894f4ef49fc8fdca4fe85f0cd0127a717f6056850c12
SHA512c323d2b92e9ea71d6c87fcbd91a3a78b2dfbcd8aee21a9156e39412e61c618207068188c09df7d9cdaf5606b3acad20b39b7db69e9445e32f40b3a7a13c79702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d51fb6cad855e5f92164f5f0bf0e8f39
SHA1dc8d1f1409ec2ad279d38282f8609d663d46a9e5
SHA256b8f22152853664145287ef331a94a44734b8501b4e5bed694d8acee12ef742ee
SHA5122ad8124d3eefc2c03b0aad8cfe918b380bdceb8b3e215d575b415e12ea61cbf6c969a95eb6b31fd5d3a2d07b82ad9f7f27615e9be9063c282d0c9af98bded892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56245353b11fcab8e6422ce54f14de096
SHA113ade4b5549fda2bb247c08d0865e2a249a47264
SHA256c728d0055f41af10681fd7818ccab2c2cf40bb877789129f54cf2fa1b32c3c28
SHA512ed16bd36510aba38490b13286837c8ac15fdb06b02a1f683b44ffa498d9c78131e1a05721635b2eefe3c4ff21a1eda325d66add74aca842b3c8063925c1b650c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dfacc3746aea7f13e0d08ae53d0d208
SHA1b70aaa876b951943c52755ee41c6f30a8fb9ec47
SHA25654c91dceaeb01966030c513d13bf963de71943f06cafe1b0e028404d04f3a225
SHA51276df03f15d1724b82da81001d48cbebb12f49369cd2342375b21a94059a03c3ec85a5531c327d9d31b5827f5843c74ce06fee9eba74fa1dde132692d8999ff9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560a6e1f7590657a3b9947ea6c4e7065a
SHA170d716c039700682b40c42936a84404b9e402334
SHA25630350e66053ec5bc4053e3765383657b0742330d2613da6742250f0ba0ff5c9a
SHA51275c9b47a4efccb718a03dfce74bb7e4cd94b6b02c43e07a039286b37d78f1b2235135eb637c152f180a7e7e8c80d11485b24a5164a20a886a26bf31aefdf8a4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506825256ec4900fbd279292a377babdf
SHA19ab4e0dcc5ac5c3d4f21031f4ddce43fd0e94b38
SHA256afd2c39b0bd51bbaba7aa21fffccc80ff3c4510d0717c427de340e4c9864ec0a
SHA5126136f55d884450c8d9d29d2be45df4f8a1845b05f786d3d6f9756c1de53097d5543d322098fb10f85e3d50f067cb5e0c07ac87e53d54b5ec2bd025e016744116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b328ca6075604ac3b90e59f990e12f47
SHA1bcfa7c6515796eb13d64e428cb0602ab3f4aae82
SHA256c54be71786bdf4ef2edb4c7b32a2bda98452ccc31a2e373dabb24de2ff11781d
SHA5124b5b23c0b7f4f69b04340324d1dfcdf8decf44a5e6890c2a51840d645b461c60d7d7cb17df32be2f841f2d6a228ebdfef0d5ba1a5f8205e4458564dc0b644a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD577ff332525cbdffde3da7fb177b6b58e
SHA1634e06408ddecb74e44304139d3face9786191fc
SHA256aefdacdd05229d6c5a0443f17e326e24199ffcc6900bcd97016d4ac5242acbd5
SHA512749585b73284afed51bd05bad8a2bfb36d1bedde8ef4fe441d8234e793f445bf14ec4f503534bc007d8f6e29121cd9efe8fd3cf4629c15a14e5df13c52085f68
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1VX38S3F\info[1].htm
Filesize559B
MD5b9cfcf5a130ad1e85424b2ed7508f3a1
SHA1edd5ed8cb9dea79ae1bd173de31fdc2867a4f616
SHA256dc4b6fc627405f030bd7beb65022365ea1203f6f7cd0f74ead1cc179181d29dc
SHA512fb0609e3e7e06c5cf19a1fa1eceb4b8ed9296eadde0d3dc7fd05a4ff31fbb87fcd28d1e27a9d01ab6ae83d4fd26b4164dec47a43d992dc5178ec34685702a578
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M7GT0RRO\splash[1].htm
Filesize9KB
MD50aecace01638d31f6a45e297a011f242
SHA1785e8f3d3090b448d7c8a571020b133ad5bf9e66
SHA256781072b3eb31a1a0d63f9edcdfc2d44f0ed404e1f8ac6f14eff3a73bc8a8d907
SHA512f355684e3e66dcf710f006203dff30bc3393030ee9738ce6dd09193f657b2eb493a63ec8c666be3e6d256f35a7e91c48d2f05d886875e45963e2de7d2a765939
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b