Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
c0e9b9125465b440ccc6f3ea9cae9956_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c0e9b9125465b440ccc6f3ea9cae9956_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0e9b9125465b440ccc6f3ea9cae9956_JaffaCakes118.html
-
Size
19KB
-
MD5
c0e9b9125465b440ccc6f3ea9cae9956
-
SHA1
c4967c22cc498dcd8b1d6dcfff5c266039ca0867
-
SHA256
49d0dc63cf1d2ca7f3e0911f6905609d3d2679e61106ca995ec55a0db501cb47
-
SHA512
7f57ef259b57663e2fb095e4c1c6d296749da9ff4dbf67f8b19293393d77a97ecd5b66d216327b7d8c3dad574eea77e0ffba00c0b69d7ef4db6b547152dd5c40
-
SSDEEP
384:zidK8vLWmVVBD8caQ3RL64a5WcmWsXucfIk99hej2zVc9B0x:ziNLWGgct3Jla/mAOIk9SjIqB0x
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c8f7f5f8f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{215A2B01-62EC-11EF-AC25-4298DBAE743E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000002a7dab8d6cac20c301e3032f0ebb5e0c0be86a83c9316668f71126eab8f3f33c000000000e8000000002000020000000125dc9ba35230225e5fe1037195f0988d00674b2ccd1872307bb22edc51a532c90000000a47630e0bba1448798865145fde8ca40d6664420234661f6adc45398dd9e94d1d7f6459a824a445b977b85d00920f40e5b4d580d1206cec8e8ac98b276cab2fa6b1eab7d188f468d6d7aa4248205c3d913eaee69509e2bdea4f9d994bb127e2665bbb6251b40b1c6ac9ab21ae0a0065081bf0c1d5fdcf4ad671038f9d52d9b4c02865be0fc0d0b57530e70296b6b2d8f400000008e975ee66a32f07a6907a4c759f65b1cf7e329ea88209b8aa49712aa54c0546d20615e901077b048765307008bec984755f623580eea2f0f86bb5f9edf71ee71 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000836be0d949358b635ae3c48bcfbfae2bb7b1f2608c9ed8079b21c9095911cb82000000000e800000000200002000000003833a505ea683fac6203b104544555c63569cb056637a007452b9c561b042c92000000071d590273c3ebb4f77d98ede1920ecc67bde4a4d1e1cf7d4fab4cc262edeb34d40000000226ff61a38ad3e42ffa080ab6dc8d4f6abb96d65f1ca7be282c482135209eda4a1c186036a6a06fb378ebc1ccfe6dc4b530286392d0580c6342a1cf49265c29c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430757048" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2124 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2124 iexplore.exe 2124 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2348 2124 iexplore.exe 29 PID 2124 wrote to memory of 2348 2124 iexplore.exe 29 PID 2124 wrote to memory of 2348 2124 iexplore.exe 29 PID 2124 wrote to memory of 2348 2124 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0e9b9125465b440ccc6f3ea9cae9956_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa35a08b55eeada2190f06d70f94634b
SHA1f0f4ec631de4fc64283c37f1c3bc6497545551e3
SHA256449fcb3b9c4ec64ad2c25891ad28370610f1921815ad445e50498a6ef24f5a38
SHA512e97858f6cfc21ed152ad048a8acf45f6a982f38003fae7f215be5f58582464c77812aa26b86e66a9ba95c77e41c063954b56349eb1c3782f97e53469e3b26844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5140e3f1411e3006579993a7a811a0dce
SHA1e230f1784f741df4c5e2f2ae37f4809f5bfd66a0
SHA2562f326028b889a748aff0948860e3da64354a015fc20f4ae4c567f7d032c86efa
SHA512608261866aad7b73bb187d3396fa525751b41a80a576fdbe3cc44bf859ff0049273d97b787e1fbebffee27b37ff139a49d1a6b35f889685cf6731162ed9be389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba4ed2c0846ce48d9c98724c775b19c7
SHA108102999407a6e30fd58c439678341509034e285
SHA256ee1d56a2dd0f231c1d32eb0cf463deb9ccdddd6d6df9e29e96dcea98f79a95ac
SHA512314fb3a618949fc5dbd49bd6697ce77f39b6317dd15988eee4923e0b9fddfa02574dead1d8b53d291b895af94968f438e48b8dbc99b68e1c3a6b4ba3ae5f804f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0c292799037f41aadeeaaa280639e52
SHA1651bff4433a3358a6eecc5e256d9d99d7db93543
SHA256bbbe0b5da8f4540e2e5145e5cae9974a1d8beff49f052e02ba8ec5b03384ceb0
SHA5120b75fbb95ed28ff9384c97320c12c052bd73251e4efe71f31f570870b0a070b42391518faf4c5d3f7247b1f77a402953085688b4babb26b5beac01976d5abdc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e794c2299b30ed1aa6a90f4edfcd591
SHA1e7b29ac0f82f7ef6117a46a816b9c2308200ec0b
SHA25697c47d559cd5258f49e42e0f8b735dfe08d85492e4911c1422ab64299d2b7ef8
SHA51227c4be94fe5e3f9377f9fe2f42e974d4e91367bf4a71160095bf1583cb4316b76542c1cb6404f69be7a10ee1a4ed4e77fa6b52243877e30c510de04936f62ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54784f92c3afe7f1587515399153f7911
SHA1becec4551ecf07106c07683f00a906122f59d7c8
SHA2568228ea6348fb85969cf7e1165dcda360241e53ef4b7660ce6b5d5298cf9d16ee
SHA51251368edcbbb55d458f570bb662a1afc833103810875b86592981eb0a105b4c3e5e5d54068171f6a8294ad6e46d97fbd91aee8ac19bf78000a1ab3d32793d5617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59efb1c36fd6f4cfe789e4693e2439468
SHA1aeb8591f7682e270693818ec7cc1331248d12f97
SHA256b39c0a4db3609614c051592a7c0b815c6692df833b7c83efa3be0dcd1705f31a
SHA5129de5b1ddd7681210b8f825124c63bab37b10e93196fc1885abbd2122a2d8005869b35e7b2264f111e1ea283bd5025c65c6523de6223b677a6a2af41f097727c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa4fd80882f5bca17b5fe581e831a279
SHA19686ffc098d2d0047516da74f702abfad65c09fc
SHA2562e91325f8ad1eae4c36bf32d77a10d500f58ce7d4f1ff7b4bac884c5cf4fa73f
SHA5123026d26463981cd7f4409146240de8d412adff18ffc076751b379d026c998610758e80735ef3cf238c6533e0da899a2f464f32a2a05881d5660d12c1727e81e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542a9dc3c006d38881e9dfd9ea940cd13
SHA11d48643541f45e927a1549862afb4a6314c093bd
SHA256d6572bc3c5726f89b0821171bb8fdf90c1ddf08ab3e7c326fa05b5f581b2c7ee
SHA5125fc1422e870ff62e11b0c5d63f9739173b42e07d8ad7a01eda8c0d962f40c9f6106809b3b541f4bdd90f28e620403b16574a72fa2961d28db7ee14db61fc602d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55660d60c10b6023be7b6c22887310f97
SHA1dd6cec1a3a22d85dfebc24cd788c8dc3f646ce8c
SHA256a8c35444bf6ba6993e7aece737244387e0ff189a634af83d26e9e5ace9ab4e8e
SHA51238e9d0ffdfca130144d88e786ec59a306843360b156a17f881691de71067b7280df1c1f1ee813416323b0799ea5493fd715b4e5c3ac22e15e65468ccabdd6bee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e250bff34eff7f8024d22b2f496c70a7
SHA141b8d2a4d44fee56ea1d77eb147c4c72dfb2f647
SHA256bb8079299913da312113676c6a4f203214b533f0dd0612d4a5c548e6b8da1de6
SHA5120f3cbed0959807668dc5cb9b88ecb8589d9d13afe30940cda957559e79278d83b8c959fc3c8cdfa8c4aa3f6a35d0aa3efcd64bdf664cac466f102149eb785bf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d4108941e0fda4a498769606a9e0128
SHA1e98f7879b49330b5423fd46966ff0d2d5f59ed09
SHA2567f405dbfe00078884e1af85664093b4d49cd7a7ffd561d520f52bb5c1df7aa9d
SHA512010d1b429c63610b1bcead78c697ea6d9b9dc7c044c3e3e7a1d404b32d52a73d5a0e8c99beef0f194401527b83cff3f9bf8c1e1208acff8ef4cd7466ff599b39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac4e9febf2b58a689dc5df0d9e13d00f
SHA1ad9923c43c122c225593cd08931037be5002809f
SHA2568d471e659726772775d255b4d26e892bef0d0d8c41bf5cb2d134d9cc54c89b01
SHA5126bd161d8a9522e0cf5894db85ca93639ec6f042ec89b4f353e4af10b95bd5ccc79b38399c303a9ceb9fd6e3e307376f344f5af6b442d4d32089d0dbe1f9a9cbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ffb522a6a061745a5100689b01e7d5c
SHA10e3eaf9ce49e8adc61df5ee38fb529d11d705c31
SHA256e266ce565ac31e1ce09317972ee7669e765e36ba7b5e2473914d61a8f6ce5e44
SHA5121e6ab19856ad7a38b060f29e9b4191ff966be877e51578c8b87846bb04fe5b6269732c2e7e04248199f8af8dd01118221da841ab456ccedacf137130e77cd0e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a63f6ee12ab0a8d7a80ad9ee916b7301
SHA1e0aca8c4040ab48f1c6676e597425bb248570c6c
SHA2560f176206b7aff9bac010f0d5700fedecdacaaa5d2de4849372eb7de7f357dd9c
SHA512f536d12ee6216d1ba485c3fcf9e84485da3575e0ba9b5c5682267da0482a2bfcd5b1d1bd9b050c6b9cf969b7e9af5f0518eb9d0e57b2facfbdd03bf3b14891e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7d7e32874634acc54656b1233242f7c
SHA17455e47b30d10ebf53eb758d5636658713ee9c00
SHA2569997098ffd6bee0cc3eaa906a55ffba6322cfa9c8033eeb0392d2927a09cd465
SHA5123b7767121f19787985f22156b3e5a3341372ea2fd5ecb5bac36900348c63e9065d92608973e65faf8bbf284e866651802a4383f95707ad36740cc7054230b8ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e18bb7a34f96541f3b4f9f4505229893
SHA19a044c890ae06f1a8c274b58053752b88bdee4f0
SHA2564b47429a95c4ebffdca36c55fce92ce45c6a9603d5b1e71dbb72c6bb1f21da0d
SHA512a3ae5558a03ce3b8e1934564a1af1ba0a2fcdae174ac4bdcce809eab30509f1986d75954fef5232e1976674797be894e6b083e970cc47bc5f9169d90ac09742a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bcf90ac5a3fb5d924dedfd5f0cbc20f
SHA1b9e6676e27ac6a7e328e1ecfc254f4d989ee315a
SHA25617510fc80ffb3246cf369b34045ce65012198add0e480afcd30d3e2df9d67c5c
SHA512f882baf5134a7a929505bd18a00649d3d6e51d475c57bfb6f693bf43131c243330c17dfaf1f72d0ea4a4cb5e9f38e17ef826e8b6142b24278fbfc1be2c3b0fad
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b