Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 09:36
Static task
static1
Behavioral task
behavioral1
Sample
c0740df0a195c03d361d6e9b4d559117_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c0740df0a195c03d361d6e9b4d559117_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0740df0a195c03d361d6e9b4d559117_JaffaCakes118.html
-
Size
68KB
-
MD5
c0740df0a195c03d361d6e9b4d559117
-
SHA1
5dc5fadc1a49a5356410ac95f3061ceaf259a1d8
-
SHA256
7519c902b65fdfb3744f325bd60bebcfe35ace3d8a00c9719d6ee0b406dd61f1
-
SHA512
0a9b95d10d2c1c72e496d5c101edba509ff780a7f8ca41383f3d512954e9d2ba0cdfafc1eb9cdf3aca157f145ae17781471d32a2c23696fee31484810ff30a25
-
SSDEEP
768:Ji3GWgcMiR3sI2PDDnX0g6gncfIidxoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:JHJj4IidGTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000006b5e7c4b1f4cfc1cfdf3f4eaad359cd19046b9b6b7b09a5824e1de5c8450877c000000000e8000000002000020000000e74121690030f890dd342482bb8e6552588b10e850e97416c537626a47e6d3f790000000902420a546f4a5ff0279cadb0d49ea397e54c149069bd874370493c973287fb0c4a18b24ab1bbbe6761ac5e4745a3fa57c8b5aedc8985f46bb15f9fd9f93a832daa4743a3c04fb03cf3027c045768fd9987ca5c9c1c81cf937f622e8215df508dab834773371c3f44e41816d37a1bb6ce98f7ffa9f66031b16ea12e8aea01a68839d181da5b93fe07fb2b2d84525b33540000000f9fe04d29d759d35e680e6bf8e6d2f7a9825c9b75948575093ebe640516b3610be444dd363660e6c1873fced628efe677b4f91b5e3fda2379294d964276986d3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0f7e752d2f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000db509843cac80e09430c1f0c9c73f7d21cf7d536c6b49790c610947e1f33ec33000000000e800000000200002000000033757acb97ed68e87309dc2de3305c556391a56db63a08540b69a23c98ec6618200000007d18c415b9c0aba7eea43cac5374242cfb2dffc2670defc2fbd114127781f0f4400000008eb6253af1055507650eaef830192cb7e4b95f08aa11804f3bd5df226c11a4410108d2241184bf5a4c7d2858ce701b446c5143fc32d7f1c0aecb12066ef57a69 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430740462" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7CC3E8E1-62C5-11EF-A7C8-6EB28AAB65BF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1452 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1452 iexplore.exe 1452 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1452 wrote to memory of 2388 1452 iexplore.exe 30 PID 1452 wrote to memory of 2388 1452 iexplore.exe 30 PID 1452 wrote to memory of 2388 1452 iexplore.exe 30 PID 1452 wrote to memory of 2388 1452 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0740df0a195c03d361d6e9b4d559117_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1452 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586e2c7fc59953f0e4581af3b8c697744
SHA1a9b2e7536a4fd791f154a84a13ab00529087ceff
SHA256a3459080d384b86bbe07fb568d2568e4f910b0561e8d8ae800a4680fad27b8fd
SHA512937c00ef1cbe6051da555ced1e0a6fd3cae061c17498d2e0826327248d5c204e9f40be510815cda464adf18ecbf18f370ddbd917657e32643cd9af8f1e7e5a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581b1f208b6494407e34be42dd4e16f81
SHA16b9ad5e5fc2528f55fb02de0db02c978d8078da5
SHA256b037735e9e9b12a7a10eb19b53662171f93e55b11e5d1b48d4d79a6dd71984d5
SHA5126bbac667e99ad0c7d2dcbe3f41bdc4913a90eb97b0b137279d2de68367cb636c9a0a65f0fc6cfda15a991547f2781c510ae7a9706760c30cb31f7ad3be9b901e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc44bba311408fea261e1d305d1f5a7a
SHA13cacb0eee78124ec875db799ee4a3fe36dee5659
SHA25618c78cc5f7d973b6ea38fdefa9d3496158831b5cd4d739b7c8c0ad0f0c159974
SHA512fae516ee78b894e33941a012439429ef78c363d863ed0dd4f96795e3b0855609625045f8a2e7205208760b55ec808ec8ffd1d00d233dee7db161168a2eaaa135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ccac1dfae2334d7cf9fde3d68bf8c4e
SHA1276d31ae1cca0583be2a805869e9d1b0354e8c1f
SHA256014ffb3a82beebe084a1f84d4dded6f42768cd874a40b7c95921c859caafd0e7
SHA51215a8ddbc0ec25717f11c2b59b22aec8eabd8878196808d13ea5ba3ff9aba12fe572b24451f8a183cd2906c71af5e9b3839ccdc71f3ef3a8059f167cfa9d44003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fe17c5375ff8d6c57e01e323dc2002b
SHA1b48e3643eb53b72f0c8cec1941edb5ed2563817a
SHA2566ffebabb1275751132aa722351fc35f7356f354650fb3921cf9b19fec512d620
SHA512b75d922a12847e386b41fc9585e2c1af3eb0c4c43b9f84cf078fbe9f1a6bc8555d52bd6c9c18a93fc3488982fc0a7ddfd1d9be49e4a4e36459c9faf8ce2457f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529eb9a70c15dff409a027040d52b8e11
SHA13d48aaf4ed1d9e3f92c5d73a2d7b574e407cd14a
SHA256f4a36eb66257da156a6f5a084ad28db7b39e93627354ebb7b2c0e327273a08b9
SHA5124a648a3fcd29e4e38a677563540fd59e3e254c4abe70bf2054bd98635b2122858f13854b334b9d93f2e9b725ccdf8aa4090852e883dc9195ecd8df9c3cb6a0d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525440442d4db60555ced55135c49a270
SHA16dea98d40e96a0d8f600c24ce3e8293fc763135c
SHA25656b640e6d647861611402a3f2641c762303416e59df2b4c512ed757f6d822d5b
SHA512fac9f425e657c882d36778c12525caaa214748c4ead45984f0ca4fb54796805945d0c484e2980c16368910d874729bdcb9342f3074cf67b774a3651e5f06bd3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cb3e64f7472dfb69b799151eb49fb11
SHA1117b76309b9272ae405bb515de768c16d0ba1e89
SHA256152d6d81568cdbdb430f04d859e20996ac88343a9db81b99c3b7af9c73198c65
SHA512be8bc560211718dea4d8675594020323849d6b9856663d3f739c127d9b00e8dff82ec210aa87e398a81537f3cbf384e21c5aaed1e54eeece5ab9992fb69df3d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51732b4956d99df4c4de8e5e6e7c35c8a
SHA14a76c28c119d4fbaccb8e76fea804200bc486551
SHA25696c5076f4cb9930774968420e7087bc6a132b0e5ecda1c6b055fe7b413bd70c8
SHA51216b8fb859d562a0c8c838f1714859aa606eab92a0e3e79df4fe251a0f8f007f0564bcda6903f511510583a7bf91501be194f431829c699202e8afe2503a7939d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e06f98ffdda005517a0eb1ba60e5aae7
SHA129c66f78935f0b0001bbf9eb6e0bc677dabb2679
SHA25669d6c0ded9328318dc33c38a0a99c3c6986e96ec3ba2b26d21b4ff76f03c6c10
SHA5128c346aaf851d7a578c5a2e798acfa5e855b0e98c513b605dc3366102b44e096e858034b1c1a77ca60e18ff3f89fd988de82a5c1d59a0c1f16a731c3179ca9d20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b883fc84ada9aef3838eadf00f0380d
SHA1faec5dfe2e103883108fdb11d0cb22b21653ce6a
SHA256414ff07b1ea48a595be133dd0274687daf989255b5f0d4c1e00010a7d496755e
SHA512370494284702dd5e3b0a8a5f9735ac7c64a519239100b1b33bc4ad84f626ac9f49fd7d936b4c1e04958eab3184adbe331678a94d61caa9dd234b782619feed79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515548be049e040032f271a38417efa32
SHA18ad3e0823007ec9b0f8ec9415e636d538e7c28c4
SHA2566023e586ab6c20a919cd0cee9b6490efeb24aa6cfc63be26b3c1b7e64217b75d
SHA512e75f5583c8b1925a63090832e97ea5a381b3b2e48bbb7880fa7a5884de06d786e647ce19bd17aeb505ef5893e0833d25a71b98993e3fc89e20a669c1ba96956e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bb65c6fa8688e8139dde760c8961633
SHA17677d5dbc74ca6646474d17118ee1df4c193f9d7
SHA256435ac297cd1d4bedf1158bb1fe5405031dc42dffa5b1c42e1ba9764dbfdbb4d9
SHA51261ca4b2e77fe5cf4413c8cc8db79cdfc759943688d94a18cca3b2c952ba6786d06e9b356d7d63361851cfd21dc5fa56977466050535175896799ae544424c062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5198962938b6726883bc34c981bd88dcb
SHA1eb9b2a0968ce55f1c939f4a85e591aa0b1fd67d9
SHA25692211a0d43c5e8a1bead6aa0ff97330b6c9d98c198ea71846a9663a047e16ca6
SHA5128269e1abdc691b9831e865281da1924ae5933d36cb19f1a028c7728931829aa3669e212b0019036816a6dc87b91585075e8d22b22ed8a3a957e9fff2880e5779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566997dc0d8813b7f4e2f208745e43513
SHA17b2a6e271a29c4433bfd7c3e317c410904972858
SHA256069ccf3bfd540ad7f99d11655d07c6d60661b945a46fce8e96c60a98cc23c947
SHA51216be15607bf1bd21c462fc87794aac550db4a6e2cc5373b3582fee0fab440e595649fbf3c56e5c7a8153f5cd47794f4932367dc6401c32a885b0fcefe37b1c34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d2eb2a441ad8e9ce6f286053ea8e536
SHA1af3f07670cafaf499737e7e3432245bce3aaa876
SHA256e8a0cb6f767d860355d4a9e3986ec4fe4611e2536b42dd3baf52409625004d6d
SHA51228968a8e7e08c039ea34516beba71f6f8d7f316593143a745e590e6eb1cc145092a6ee25f7adda2bb450d79dcf168eb5a2894f36442a73b940ede9a073d029c8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b