Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 01:52
Static task
static1
Behavioral task
behavioral1
Sample
c20c639f00832587857ad567146686c1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c20c639f00832587857ad567146686c1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c20c639f00832587857ad567146686c1_JaffaCakes118.html
-
Size
77KB
-
MD5
c20c639f00832587857ad567146686c1
-
SHA1
45e01533ab844baf6b4812ef9aed6f0754832059
-
SHA256
6aab23ef9b365830ceef91f94c59cb2e441d7e9d6600d01e879467be558f781c
-
SHA512
9843a56c20bbd32f7fab4925c3e5b8970a71873181986216b9b95f764b05381fbed667f2dd81f9fb79876f6b168f288f922d40cf2a17bf8308829acc474b0ee8
-
SSDEEP
1536:DJ0SH7QENtijqwqV4Q1JiM1j367S0winuuA+pzSgeq3V3X:d0k8ENti2H4Q1Jpj367S0winuuA+pvh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f01bff9d5af7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430799010" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D5D37761-634D-11EF-9E0F-4E18907FF899} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000db6689c35930bfac99c7ff3c5f1302252e936bb23a1e34c311d7a1a90a15fa47000000000e80000000020000200000007d2f4b3a2856e260549c54166f7b03d40053da5b9cf0041a0c66422a54ae406520000000522d2a838e80e94e5dbfb60ef89d213e0fcc19fc90f7afa9a3b8aaa8f1be99f640000000c5986125ac52e5034abaa3d88d3b4c89284917be10d0162aa066371c405db7b3d01879e9f78d4fa49d11c5e7500f18644d7584f37ff16b8ddb8ac6609088eaa3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2472 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2472 iexplore.exe 2472 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2140 2472 iexplore.exe 30 PID 2472 wrote to memory of 2140 2472 iexplore.exe 30 PID 2472 wrote to memory of 2140 2472 iexplore.exe 30 PID 2472 wrote to memory of 2140 2472 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c20c639f00832587857ad567146686c1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d418f0dd2ebaf5ddbebed02f02b296bd
SHA1c47bd93471b46830eae518a68333fdce404d7f8a
SHA256d8e6c13687ffcacb7450b1280b540e2db49809f6526cbf2ef4aa8a016c5ab5f7
SHA512c24403018c5dbd54fa7d828008498fffa5f002200ab05cd005ccf9fbbddf4baad8387724342719a16dc2f0de6305a54d75d36298e469838a236e16a0e711fdce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfff5e1d9a911d8eb77ddf94f8d8b21e
SHA13e8c5cf04a07ac061e94bad0031f8c829afa3cc0
SHA25675fee7fbe28a43f909c15b4df1467e711b94d45d3569ef2d4b26bec8bc3354cc
SHA5129d8824c2894640570930c269d531f1a3894b015501ab60cbe350364eda190f068cf8d61cc037e406fbdf31b4dccde91152e6a6d095266f3e006f38f38d6f6e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0407e6807b36ec5f3dc0100f001508f
SHA1905609dd45b51b41091118f0d3aebc09c40e8670
SHA256624753fbfcb7c8475f39b313a71e40a6f527c92551c3c90337993fb05b9bae12
SHA512457fd7f2fde48476e51143d35ac57d211e9fda24eb982a388340141ea7600bc019ed0db803b1862dfbd44e6adca3416ca8bed564e086d84a051c4a3e3be297ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa5a31b27ff4542caf16f6af513dbda1
SHA1f3c4ac600543d5552a9cbe1225c7102691ed83f2
SHA25641eb3bfcc38a251e5aca21190f9d1788515e998c6e4b61a792da8139ec50c47c
SHA5129e72eb09b2d5abf8c3436761064aac8bb15637fcbe499cc282742788513d5ae2117980da0baea319de86ef42398b269b460ddeafb2787f891caba56ce3dd3174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515105a3a6260082c7a60d8d9f9cd4d9b
SHA100bbde38ffc1c1bd843b7c2c3a65cba614568703
SHA25632156ee4eb82cccb17003b867d48adb9b8a1d6f6e518c8b84396140d4be88bf9
SHA51216d345360bcdfb9da9329d3794a992cafbd91f164b7dd7e7fbebaa5acc9c64c2ed53228289f69c8671fd7b46417872021e18dfca3a8e66d5bc23f0f132dc94bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54031dec273211e3ecee966e5579b86a7
SHA1e5479d6c5279ca1ca456d9f6b13353439a8eb166
SHA256361ca0eeb3796a57d1091e77ef55ebe545220ee02ec6d501f6a97d16c12d5bda
SHA512e92b0a4e78d7ce103a1dd3974bac6fab2888c9d76446fc45c8870d3e97aaa769a8e0fb1e3bf526b0b9682a3b833e9a891ca577a101e437eaf474927261dbcfa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5697594ebd6cb6fe0413d9c99c14834cd
SHA1dc08a76cd68113d12128175ab5dc7b23483640fe
SHA2560e5c64778938faea19b719cf34045de05750794895328a9ed8bd08a92cb93cfa
SHA512c2ea10d82bd3fd626b7f77501c30ebb1f34d36339e31f9ae30ed4d68d216e894bb234f1ca76a4308e0596d0a15d90245f0f3610b538ba1500c42fb96e912884e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d714b89ec20636304ccbf239689a4463
SHA15e83cd6538d269ecbdc674c843e899d3b6ecd0ab
SHA2564ad7fd824993f78fec84facfbb0c3b8941ca0e5f793660f78241f35f686a0ba6
SHA512034b0ce42a46b3b1aa4643ba8b393a482a5c84205b9eaf79cc2ff9520d6ea6eafbf1780c05b1711b2951f28f6e6fba6cee8fd1ef5ab6b48dd7c92c959cbf1d1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50078c244cc95b49a7165eb7cf131b130
SHA180a24de7b550393676ccbc248a8664f32bcb193a
SHA25655dc2150f13315278a7a76f1e815ff9c7ad13ea049963a205954cbab406d8b53
SHA5127abc7bd9efc67d856156648743f84094473c2957bec38266eba25ea968fb96578a77944c88f03dbe6efb3008d5efb865554e51b57baf67a541a4fef4e33d7b0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b979837e93ec5592bbe8f722c56c62e
SHA160566860cf35091337f347064aefa46e80fe8c01
SHA256e12e4e0678bced936de5c351d55bfcfb93abb74fd63b58c6b6651e11b4cf1225
SHA51215aa150c4389be49972e03f24f3ea707e99405947b7a779c72c0bed6d561b84b4aa147731faa7699bed2d538fd4fcc5d11586ca4db50c966345101dedf1299fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520abc25b6893a71abd075c916a4f9a80
SHA1268dd64e4471f51271ebf5e337c0fed63f232ca9
SHA256b67196d56d7caf88ca259c9a7235516bf52567affb76c7874dc2b5ec544042c5
SHA512ab5f2515b65ca0b14e076bc30b3b3a861a21ceca994b6db3b5c37cf2415a70a06d56c6ea27e719fda52eb4086cc04959300d5abcebf5fa24fba47e614dc75697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534be04499a00a0da1fccbf25cbbc5add
SHA1e3e15d6480f4fcd1488af9258d1fd8661729f1b2
SHA25694571eaa72eb46c79db960b9cd505ce177143c61089c91a0d11a34c262119efb
SHA5124a92fe37df425d2c9dae5ad6ecc70eca96acbced3152f7b53faa89d7dec87273b05057a082e08570e9752b088c1875dcaac05fd1ee886d0835670ea65b357f7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf9a8c5f95f3caf08e796da1d8b6a76d
SHA103bca8db71a6b68b19eb12c563ec67f63c0c0051
SHA256b2552bb356dfb03f1781da51f160188177140f8e524a0075625e254fd7da33fd
SHA512ace6ddbd28463896231be3ecf0c5730f3c6845d154bc651ca4ec964edf04ee881f64d7c14a306f9d271f4e26a021782c72d52633ea1f75adad2487f53d02c3b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a68d841d2f066896a814297d703e9bf9
SHA1a71cd91a6bbdfaceb969d4b602dce8645ed71bb8
SHA256114c245c6d48c773ed3d528371413567ddfd0fae4b1c30a9be54b4135d243d1a
SHA512a04ce598cce9bfc9d01feea7d8687a76121eca0e3e25fc1001c434249e3bd74dc12d424c3d1d4a99169fbf350c5c1af60f8520cadbc42f89493b7a7caa7aa3b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8225ce36c82f786bf1bf1b59dac014f
SHA1ff4da5504e1f8c194c0b0467e1726d9444c2d0a2
SHA256430087c5f061766d17493b7b058d62deb7096af83257198246abfb5bb744007c
SHA512ecc88c57a50c89826988ef8973fb74aa35f8568e03a9cae06c4888595a6c58215d84953c07d74ae6adc4f7e802bb29c63ff14515c1d0217086c1b7e504b9a89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9a0e82c62be7071fcc75a7e54dfeb4a
SHA12326dc932bdc4f89dc793c118cc44e4c235daccc
SHA256d29daba1234621dc6b614ecb007575b0ebc169fed4869123fb39e391637ec50b
SHA512451f06f4d482bec9497d1cdcc51f6f684b677e5863c81a4090c6ad82b3f7d2ce9ea859fc50ae331ac25049f1cef4ab0223d21c5aee0efc48f6e33b8fac8a465c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a6db3c54437ca0211ee0de03656663b
SHA157b5011841da9f87985b7cfbcf94aa5f473b4efe
SHA256137d246da9530808af7764a78a36e2a31898ba2ed1083def5fe75c4341c6bf02
SHA51234e305c4f9611b119405f69bf880e7a4b2d40f5fad15ecf5854ec2c2b27ccfd87fc6da41c7e3f5703266405c7e96636d3958c4e11c3bf1d06ab956619cc321db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549fe8f405f26640490fca6cf29c5aa95
SHA196eec35883f2ad7838396d690d29f9e2da1ed566
SHA256c4d61912f1d28085e8dc16a20b20bcafc3312e3e402787efd0d1c9c1386224b5
SHA5126b9679f9bd74436ba747ee6d0ca1cd20040ba91d65d9ce09297599444cd467c97b640e7cdc4ccd063b14d700e3ffd554c28c820258147aec3022fb1352ed9173
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b