Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 09:33
Static task
static1
Behavioral task
behavioral1
Sample
c072f46725383d32a40a7175bac7ef98_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c072f46725383d32a40a7175bac7ef98_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c072f46725383d32a40a7175bac7ef98_JaffaCakes118.html
-
Size
461KB
-
MD5
c072f46725383d32a40a7175bac7ef98
-
SHA1
698cf7ba287dc0c2759c363cdf5b94f6dd62385a
-
SHA256
de69427ff9daf3376fc79efd9abf0ff8b8a94ae25ddca2a2af2aab0cb8443651
-
SHA512
69aef59942c7a56775b263c374ba2cf71a1edebfd639b1f7713c2cd1db4a3b917715f8bce89e7bf6986068008284aa98215ba213e0dff562c0fab967c7b2b497
-
SSDEEP
6144:SRsMYod+X3oI+YoZCMsMYod+X3oI+YXsMYod+X3oI+YLsMYod+X3oI+YQ:G5d+X325d+X3N5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00c512fbd1f6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000e581dcd40b31bc112acbeac83f22e365b49ec04cd33ae5c057470e83b0e85df2000000000e8000000002000020000000f754b0422cc6e53ed0f388e8dd437568ce6f1398642dec99050747eed26628a8200000002ebb7233727ae0ba9779c49d4ba7614282b182cf777d6f4f295d0a5feea5aba540000000c4d6a51f81c6c25f20147b2fe96cc49eba725b187b995c177d9695f1f3148e9577acde880e49c65d3829af41c72233375044c843a82647a214dfcc9b6dbc4a38 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430740295" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{20FB4C11-62C5-11EF-B5D6-4625F4E6DDF6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2392 2296 iexplore.exe 28 PID 2296 wrote to memory of 2392 2296 iexplore.exe 28 PID 2296 wrote to memory of 2392 2296 iexplore.exe 28 PID 2296 wrote to memory of 2392 2296 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c072f46725383d32a40a7175bac7ef98_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ac7caa218d9b946445b8bef8442759
SHA13cd7356bfacd79368dfe16713ff4f4476192ca39
SHA256a923d25685ef9671ce1190fe895ce6a9a6802bd49b8964ade8e27ac3bd1104f2
SHA5122b4612818459e08a9be5109fe091f08ebe0100f8fc974e5c1dc63bfcc32d075cb3761c5dcd8068b9de5fe9b647252615245c2a07318b585e365628aa53cc359d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559d96da772fd1b9f513c5f55a4e9c58b
SHA15b2a9dd1efa3d2dadb7ccf93c5112e1f78231231
SHA25643c358d8c53416e8df4bbfd35afc0557aaffdccecc62107ef793c7c53cda12b1
SHA51276be585356054fbdbe7263fcffee6fe384b54036f91ffd75e9746c1539119a7609f35e03ed0da405ecc97e889b46d8024f21414e5b14c0fbb47074f4bfc1e922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bb21dc7bb6e9e4c1736b0fa5e30b962
SHA1a0d9b93d6272406c6a07dd0e89e420594bedb4c6
SHA256da0965cf28348233bfa80c2b70dcc3adbcc1975b3c8e89e0fd9f35d4019e28ed
SHA512ef7fad3fc34e356e29c90f046b890d5191c764edcf44141a6470e2dcf1d74eb49af942427419706edb6c0d6f6d57a913a14865c960b4566e08269e3ce992e33e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a0953f4086bb07700a00044c48cad4a
SHA1ebf8468681666426128c524cc8a09a9d42c351ea
SHA256a413d7203418594bc1ce70a6041eb19a615c79a2ad12885eb79044c2a870fc7f
SHA512a0ee3fcae08d9a7feb7961e80aad7c0a4683592ad95825f1f10bf417d2172cceee6f8bba92320055fb0f8b7118d239294b7a7ff00b47cc999f6103e2aef550d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2ce37bae6e993e50fc78bee893dc4d
SHA1a51d1ec32ab41b342576f2b52cd6a360f66788f4
SHA256597fa5bac05f34360b4a507f3ce81a4ae5c95494e3500392f0d6e62fa76d063c
SHA5120c7c984c42548341bb64aa6a759acfc3baf54b9964bee00d6f841bc8744ac8fc86d5342933c975a9ad09a4d4620738978ae44ddb5fba99bf41cd733fd88a7f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbd6e01b45b7622e5fb6bd8ac85951e9
SHA12a978f01182bfa45c5d7c803148f23dd8d920e47
SHA2567ccd6766e3fa973a47a6b138b6190a570e49cf27bdfa51fe76fc593f17e3e63d
SHA512afb18d377bb71cd37518328893331997bc2f25566fe70e88854278e9525eb4efe9a4ef761c99854a8777efcd3513b92ce43157eaddbd3563e7ef76c49bd20ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d1f39be33b42b6c91cf1cfb77ce8cea
SHA16e846c8bb1d5cbf8930769862483c448bf3675c3
SHA2563fad19c66e20b867f18d50e57f65672698fa2512b15ee536f6e0e7a7db14b6ab
SHA512370a062bf2daab2e4064aa350d8ded9de79799ba47981806f579d9b1650a75b2e75a565c4ab3ceab3505f6d1ed066b19c8ca4b570851a6ec55d52c4247d858b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59584d9a803803b1cdb14207ff8b298a1
SHA15639fe43abea132755518af57e518a3c1f279989
SHA256fd7ac6d4bc59928b854a85031b7f4778f47d82613fae4cc8444b528b0b130157
SHA512cb988f3004bf3960b6286d25f9d5d1638ea5ce348aa7e1b981c0849bf0efc2f8bec07e3bde769bac1e50bdc8445fa26948bbaf8004e37df8c119fc4cbbb95bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5503a4788af5bb054f8cdedbb266f5e55
SHA1345a7a0cba2b0d913f99e884c9ec55f5134b9e17
SHA256fcefe27fea80a1397b4a9f536c25432a8e1fb06160bd97d2666d98ea7a77030a
SHA512bb1e28933b4d0a7bb48d08ca31051c75531d1a9be2cd8862dd86b97b02097999c10d641457fe63fb250d9935ca3575de851fcac72c3afefa497cc2f066b267a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52018487c5650ad53467bef80bad6aa82
SHA1eca223c784c06df9e7cbb058f4bc124abacd8e1c
SHA25668d52201eb2b6cd4f1017caf39f235cf120178af9342affdf7a895a3a08e0ffd
SHA5121079ae6d75b292850c8b2644f1c3df0aa323ed98400cba3e030fb1fc49ad6e78b796ce145c62e478b4c6b22d506dbc4324ae04842cc8afc934a75bed2fa2e519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c397cfa9eb3f230fb0868f562f92350f
SHA1faf46270ef64554b4365d56d29c11677fb912396
SHA25617c2f04a63979eb13afed1cce82e7413e8227617c46998fe28c67b7d87a3ca18
SHA51252ea776d222f748b2400ddf7c282cd0d2ca8163524cc8ce520158c086aed8b00628ac0190176b6576f90a1d519cf0bf133809b6c23f6555b23a2fe70e6b2b1c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e3791f6b86db04df0b5e77fd43b578b
SHA1737c3ac823869556ad405c7f0f0fcfce4c3e4761
SHA25662fa257995109f3da932e8e95a5fdff1f80bacc49af5676d20436f30a476d0ef
SHA512996a85a5213e2bf179a73fea38848a4984e84678e451d4d4eb3229db6eabcb09ff361c7e607f57855b05a94bb57be8487a5d93967da3fa15776aa789c1a2e6b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d033972f47d76ecba0d3888cef1369d2
SHA173d0f5bcf143fffc45d4c73f4e27f2dc760da30d
SHA256b4513fbf7ea2e297e64a108382bb7271b27806bdf885df7cb360711c6bf9d37b
SHA512032f97d0db669cb7bdfd451dbf6302c9f6677604c6f92598f9ec2879b82cb4f120ccfaf880d87697d8073a12ee5b1229ba789a3ef53c4e5d0d5601f94f3e4113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518598cd679f1b1cf9904a78aa6c4988f
SHA1a6d04de05cdda9af7c3e89414cb793bf99de8fc9
SHA256f6f1eb8e511a4c3dc682d3b39c86800db22445e950330fe50b17ae9f5b5b3ef5
SHA512bca14fd80a27ffee5c303dc35a229c1c78154aa289f4a03fcf482d1986b1b930ac6c28f902494ed97a88adfeaec8d79a4abd60a274834f5b4f8c5d80948613f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f79c470ecf41fa7a6694121f8729586a
SHA11cb572b0bed4650b9efd0a8080be560af94b3d69
SHA256a873042006889e91340d19b3331fb7a7f359314b84b7d7d778d87e89939e9d84
SHA512f2661ec3660c5cbbd586b9441a0f80871530cdd684559de94ca93970740ae3bc9870244c459b8f0be3c7809484839ac8d2f290a74cfffa52294a299ae155777a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2a1438ec8e638b11feac7d85e3ede65
SHA1493783b75f3835c5e234bc4049f510d3a4eb94fd
SHA2561aee258730e42c31fa0af465f7c85ef11d5ec898258280b823fa465b77696192
SHA5122fb803a62cf2b883a2c5723a1653a15108b9c89d95bf0794c41b7d021bd441389a1d38b7a39fc0f64ab67f48af6a9d7b20ec58afdfeb046ff7ab41cbaf8509aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57368a7c83801bea97d449a842a4716d9
SHA172e5bdfe283ebc1d9ebe899049bd877bb9cc0a1a
SHA256e412e51ccf9f9165bba257d7182f710539583161436407f2c2b07c492704bccd
SHA5128fca051685cb1f8bbd4fbbc48d4c3f29ba0236b3987ea2ac0a8b97922246e5d991de331a547dc17028ef55262aab7712cbc106359055d0982dbcb12a49a8d3dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567bf2924663f97a963737149c965f65f
SHA14e896f41a210b1bfb842535488e42e99bcaf2daf
SHA25694198d9678453ccf5d4c42967d0151ec49a3e18defeb2dc64038fe8ffdad79af
SHA51218162c8569d3fb6584f96a97453b17adcda4d059761aaf3d61b42df15bea0e7f7c5f23662a869346118755cb6e236c673a165c5916c16085fd428143bcecc902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fe1eb1a9e4155a3bd4697ed5cd3ef36
SHA13937419e0746af2bc9bf99abb0a1a7189aa4a36f
SHA256753ee47dde79ddeb16e7bb7e7426abd1c5b8aa090db68d8496a9c1bca92bf84f
SHA512666f2e316c24a021899957acfee7ce52cc9a7443eef701dd5385465c335244cab1324970e200052491b36e791caa1086ca45e0fcc8189dbfa73af6de6f9d3000
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b