Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
c0d6ec748c7d9def12a4b46149e08431_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c0d6ec748c7d9def12a4b46149e08431_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0d6ec748c7d9def12a4b46149e08431_JaffaCakes118.html
-
Size
27KB
-
MD5
c0d6ec748c7d9def12a4b46149e08431
-
SHA1
b7bf4313850fbe8ae06b641ff2f7e5bad7a1877c
-
SHA256
53142ddea282ab86f0f3da73c5cf549e5a8e4795ba730d93d4a8c6780e8c6909
-
SHA512
5f0c78e3047030de013b30312c988cf269395b0366372b31d286d74bdc4e2af713599fa74e663727ec815d0760a8d30643cad2d25657bd651c2862b4e4932ec8
-
SSDEEP
192:2z3zXR45RNd786DcyxF8C30xME871E8NWE8bD1E8ePSE8rGUE8o7NJkIPDnXDdsT:2nBSNF38nxZkd1Cae/T/g8g+9Hzl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430754197" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e96f54f2f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000008c1c23a216fcf8ac08ab9433834de43ffe4588d70acf9c6f1879fbbf5f6cc8f8000000000e8000000002000020000000d1bc5da481cacec2e92d4a4fe43acc22e05cd2e93a4d9047f8473b8585e838c220000000e47ff5d31d9daed0cbefa9271c53e27b09c9069ba0a013a1f775a03da5ea7a0740000000dfb8e7eb4e461f3a9b2279e573977d36bc1fbb763f90ae7da36393b7b12cee0e18a869f4031c32c45e01ca5e1216f21be5e07f7b609ea41b334cafc13be0d82d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7FCC9EE1-62E5-11EF-97E7-D22B03723C32} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1692 1712 iexplore.exe 30 PID 1712 wrote to memory of 1692 1712 iexplore.exe 30 PID 1712 wrote to memory of 1692 1712 iexplore.exe 30 PID 1712 wrote to memory of 1692 1712 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0d6ec748c7d9def12a4b46149e08431_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1046d1334ced8320f8d0a9e03cc5535
SHA1cabaac28ba28dc7dd8fc72550eff04f8dd6f903b
SHA2561411ce304bc818f54593fe3173e087dad4b308472b87e2ddcc96d6cb5bfa5513
SHA512e17e280c0ac203074e7a44db0cbe49639b6c5a1253ea7f2722e110587f23533b514e14c80e399aacee15704246c608ae68f8abb810581b09ec5f3f8ef279dde3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2e112c0a3b522ed119d601efeca2930
SHA1ab531da2ba46fc88d2021def60b51b2319c54d2c
SHA256d758a63a9863a82873d9984c6c685e2aec8ae2fe14ebd67f637e99d1c0f63d9a
SHA5129ba10b70ea485a38e44e55a80e05636aa278731f82e6aa7e8ef267883b8c1996b594627cfb517ec9e80a86f0a10f47328aade0e183e0c607258e51cc8802f69d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6b36eda81210f93c23221793e5d6ac5
SHA187d2f2046dde02e52ebc876da89cc8832fcc6c72
SHA256512b0a221afeacd8f10d43cd603929042b6d1135ecb9673246bc7343347ec2b4
SHA5120b80db8ef87d4c7231de12b3c201774d3e16b448f1ef77aa7b4e4002f0e543b3369667a9f56fa3403fe53cf5fa128b46ffeab15b872586009783c5690cc9ab86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586e2bb0c89be8ec7e2b276b277e3ffc3
SHA17a9e845a6b992ce652eb44f67ae45e29942dbe7b
SHA256de1d78d9c2e6cffaa976d21818aeccdd1ae3a613286c518cd63c090bd69c5a4d
SHA5125ab74639c6caece3ee910d125b222dae2aa657c8e3a6ccdfa6de73e3eb5bfb41e8d689868e765c7c0522ea5b4a27d2150a5dea71c04c19c34c07f56a1de38d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7d4621a971c8f83335cfcacaca2346d
SHA1c18112b261791742d5fa02e4cee3014172cf46a0
SHA256f41085847bea3dad76b790efcfe9ca3c186c3914d8e91d250d53d240ba570f21
SHA5128120861185f725ac3bb4ca3761e15161fba71f5701a2c3ddcead4ff3e6256a0398413feb7eb991834e9a7023d30a9cae7376512c76bd202db7204bc7bb9f1bd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a0b4ff4983e97478baa07cc1139dfd2
SHA19bf384364795dac0ce60c5efc9582256fba8b104
SHA2565f21af92e2a8592d8e7468ef9728800e573e49888661c09911a86ea0b50df852
SHA51281add674adc91139a3b0c1cb1c6e75303e9157859d324c0e257c57aa7d2054d99c4d64d6550dbeac342751b036761ad2f02129b6b1aa64ef760de064f673385b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c48dbdefc83cb23c6448ea7219746a9
SHA1b0e0081061c3ab642394353800aa2f9a99703d5f
SHA256101894abc421723569011897095eb6725bf79601110f46402e5c2c1f8345eca5
SHA51260e967883dc0441a47f83987d695686eb5154fc38ced86d53ad94e84cb9263d91209daf6ddbfb80032ffc2e6ea5b99055342084c2f4aea890f8478684211c265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566044b0193aac92e3ee3a751a1feae53
SHA149baebdc78f5624bfb24b28f73051fa33e6148e7
SHA25683047c532ce86eb486a499253f3611d25a958e7c4489ffb6699074dd09324e15
SHA51257f614d3d3b29adcbe8d8a14c462b3afa0220a63a00b44bbda5bc39fc1dca26689ebe16d09a17ef01f14b9281ed1d384d98f274b5ff98304016feff84903a108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2dcc23c517e4390ea7037f7b4e8cafd
SHA1b0c18f3e7203818a73d9c2af77e27066bafdb882
SHA256703c1fee6da542b4d7dc8a5ee9f28fced670d3cc0cc1ebc5f4fb1d73b2c586b5
SHA512a47917ab1e832786f257948ebd398deffdd686673105d8f97a73a4e15063b622a771efee8d099f555d068b4aaf099b3661f4d61448f08c2665afef580adae6c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590e58e83904f02115f717e5d25c7236a
SHA132a60bdaac72a6a960abe55de725ef4329e875bc
SHA2562e3c28fce8a2c93f7a4cd86411bbb5dc07aeae7fac93559d721017286bf5dca9
SHA512c6f44f86b344793c7caf9f4a423c44af47673ff119009d17b3c901bd596426d1dfbe9cda0fd7f7633486dbda6241993468836b67e54b26158404b3160133bf22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ab7d51b53a5a01dc266f8eab2e65c2c
SHA1d2eedf29aa03d44b3ad98423cdab5ed2de950030
SHA256bd32b1adeaa50464eb2e93cffbb20829e083bb3ae9cfa7326f442d53ff25ca25
SHA5120feeab6be9768dd425b8472dc056b27b3cf3fdd76ba6be16068088d416613027fce08d1dddcb1026a2acd238db2d5444d20b8663da5cc0efccac2f8daa936ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f017139f83bfb0d955b0d3f6639bddaf
SHA14e58fa50c50740baad8e4384f48080539a5115c3
SHA256a2e166266f66f2e56e353b4c26b3622af02c803fd817e2910c28e7824cd38258
SHA512df6a576533cbfc8fd36cb0933a3bb1c3fcd74afac768cddc185f694914588f68aa136e3e5a5cefe6ca16ce9a1cf521cf6b468a5228a9daa81a00224eb8278943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddb9f21e76b516fc555d84eed96b93c4
SHA1b94f53c9a22c629fa89179127f49c6c1bc6a6d82
SHA256eaa5b7c2c8d6991d6b2077dc4770bce0f2338776427c3eb313a4ccdef9cd3fb6
SHA512d1d8fa7ccb7802583ad46a189d2e13de31649cd9181865559121dcfd1eea3679c47bddf2983b12179c8c9dac88b7d568073d3827b258d12d77da253a6766cbf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9e276e39393a8534990a9af33bf60dd
SHA18c3cf721808b3eceb813f1eaf460e6d64d87e11a
SHA256ba0665215f77d572a2414f7383087b62cba396067084985bb29572f07ac654a4
SHA512c79c97d8dca90ed2fe05be42c02ac8242a706f9c505950cebc0e902a28f4420bdaee86fb1ee2289c1149447de5d86edca7fb7fc71040fb1030136ef0c283c8ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec3bf5b5b60703b29410706bdaaed151
SHA19923b356315a7035c1308033a0d5cbffee50dbd4
SHA256cb6a02aa24b2724a64d1bb1f9c17a59402fcc4ad355be9decebd42569c7e882b
SHA5126639f98ab872ade782dfe6dd4f928d05303efc5148c50671e0d58790cff8e52f40b1b4ec41a09d289b0e889dd54c585928098ba8e0c910b23fed5bb175ca0c0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500f068a7071bc636c7c093aad99f604c
SHA17a4cae9d8d61475e151b4e5673749ab7668b68cd
SHA2560fa79cb046c5ced52c3076399fc56aa5cc4518a709da9841093bfb40cca64780
SHA5129922d37b79562602513c22128bf8048c57de8d5f093f417e45651444d2040e839a8afe14dc345f4a2995e0d9ee795d54ef3767b8e00fa20f0e0ae65238c53597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fc1893cd77efaaa4db4c99c2180921f
SHA16e7985bed6fe482b6507c8b3a9f656b02e302b58
SHA2561f200045c5520a1c0f8e1ab7119c792a3aeb635a5fe3a154609a79e0b961359b
SHA512613c8593e08f77ce5aea2990844317508c6a936940e13205916325f03685b172f98edaee8bb95c1e260cdbdf8725302c29be4f8b446fbee59473596bfc6697e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aa7ba6645c9b29db5455b72778f4b40
SHA14412af2f5c8ba26f2e740f30c6e305409e8e065d
SHA2566a1a0f849a4708a00dafdaac5d0ab8727ad8e1b8cee45ef703952704b2373545
SHA5127e0cdc6991430184a814db626b9e2f4cc2a9688683ff32099ffa2721c8372ec2c8ffcd8b185f822196c6f0c9e0c5ef76325560f777581fc80d9081186c7ca542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b1567240465afd14f6524d965a06045
SHA1dfb36f4344f3755b4c5249db62cecc168adad1f3
SHA25626a5b093bb9945475f4285ffcb94de4db4f1f236abd1aaea33c6fdea051cea96
SHA512bc5a73a33ce70ff7c954c3f951664dd94c46a1dad8d709ea8fbcc8a3edec40a0cd6bb9ffe63d88e95de8cfda742e964d5f16c6c4d977310cdc5352158e883582
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b