Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
c76cd64edee44d45d5f84742619009ba_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c76cd64edee44d45d5f84742619009ba_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c76cd64edee44d45d5f84742619009ba_JaffaCakes118.html
-
Size
72KB
-
MD5
c76cd64edee44d45d5f84742619009ba
-
SHA1
e71d8abeeb7d845d27ad3e1b38d98b862e742638
-
SHA256
2c79d7f32ead070d7cfab3721eb2388e0522576e9e0e9ce75a956a24a0a1c245
-
SHA512
272f18bb40de2aa886b1e1f17c5b512949ad8f88f6c16ca395e06bcdac40343c3c53e57675fe5d7f75d19aa02c51593c34085c0cbb7b8e4ddf36f920fc17799b
-
SSDEEP
768:JimTwgc8nX9z+rbXT8LY4ZwJywH3oTyCC8koTnMdzbBnfBgN8ZYyxoogQFAG/syu:JpT7NNzVTipc0zbrga5TNnGx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431032288" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000002317ea9060e91adc1f6296d6acab821b629b36252592323c73a2b9a015f54f27000000000e8000000002000020000000e5aeccbdc66977b65f3003617d0d97c16bef481ba03473828f45d4356a6ebac22000000002a062eb462641d526ede00fa376d690c217273d9c862eb547558bd61a70de4b4000000071941f2b23a615fd94d4754bbb1e7dd7c8fade4b2c5b0431f93f17c7485fc395c23db0e922330f8792ed1af6fdb1fcf26d8f5b342bd2e971d992cbeaad68b58f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 205536cd79f9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7D33C81-656C-11EF-B3C2-F67F0CB12BFA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2544 iexplore.exe 2544 iexplore.exe 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2004 2544 iexplore.exe 30 PID 2544 wrote to memory of 2004 2544 iexplore.exe 30 PID 2544 wrote to memory of 2004 2544 iexplore.exe 30 PID 2544 wrote to memory of 2004 2544 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c76cd64edee44d45d5f84742619009ba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588548b37fa21ab5420769451c4a00e6b
SHA1a824af7e340bbeb2585b8edb93f9ba5bdbe5c29b
SHA256ec699c535c0f1c67c5fda13e53415a6702a5abb0f4701097e779a56c2f351cf0
SHA5125e66081891d214e90bdd28a595f9ef4ae6f0d754af4ce9857b70fbb6728ddee63865baff2a2f1abac7b6789a3fb55af3c350748a1f1656cf13da0cf9acf0d37c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a4076da38c759b17093d03d86ce1e54
SHA1a4d3bc02110d398514567bbb0a269625daf0dd18
SHA256f2417f35badb311c7aa696392a50df569aa9a48d36c227c2ea03d1c093c4a5d1
SHA51275617c0bd789c65eb89cb54aad0999dbebd1cdc40c2db4f5686199c340087b54c4f28984da0cc43632cb034429aef5ae4d4e884586c6b5988b3a836aaaf62103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdd3419318e2f8d017f0f98229e4f09d
SHA1c69c4d42fa8c6e553e44283da10c29f170ca0cd1
SHA2564b9f5f5b9fee80de760f6e4747fb5076eaea6494593e6f64f30961023ce43042
SHA5123e550b439e8888e1af8c8f049ef3ab9dd091f22db14887d753396c18a9d402c89ebf50938c67cb4432dd7dec668ced6dede155d7548dadeb48e1cb7cc3dd519b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cc37aed19c4bbe24e40fda5dd439a0b
SHA16b372596a29d795ed1143d6bd6802a3fd9e88893
SHA2566652c676610c9b71197fa523ee13352ee944ea2f2d9b95b44766835e82c70bb5
SHA512ff5a9e88e8e89eee3a428682c5120f5f3a9c957e7a0e9e21f7f86b19e67252c2c43189850de6743546414374cd9ccae570f2e1674d299069e031f3afe9df8edb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517833568155ce2af3c0623ac731c207f
SHA14378f263fb269a523f3bf8956edea0a7978a49ab
SHA256be4bed77774d2f593e59a18e0c652da9b4921190e407e5fa9bd9498a95a069fe
SHA512a32f2b59810c84469ba0feec882580ef86ece3d1d50dde1054f54172fccf08c6185f176c42c32f35cdd8ca7e80793e2ace25a0605f0e4aa49340b2e39f520344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e16197e7066be1d796c99a1366c42c
SHA14dcbcfe0ef4c3c7c8d1afd95b4336b853dd7db16
SHA256d0e54d86b676ffd8019a6bcdd686b95a6128b224dcde372e01bd4dbfb9c18a90
SHA512a4d5b248724bfecbbd5053ee97a6247d7f806b745cf2b9eaba6f01cbe9f6e99dd90c391f2a8fa225b6f0f34d2b89a7010524feb5a61e1094735b10f1dac3037a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e06d88b321aae491c55a272cf1426565
SHA1653c17035021bf2eb78ddcbf7d0ea119537986fb
SHA256fa2b09d4312d332fc5cab0e552d46648971df12d2a0062e098116b6d6b615300
SHA5125889fab2cac368a41218b6cee3f3c9d555b7e4982ad2d270ce44b4c45c0a0f2c418665a5023dc5173c67aeb149c48252cf69c70ddc1f9218a88d6787de1d6f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f52efcf81825f3d90df9dbc21effb888
SHA1e495fa077b3f6128d6dd7aa683ae9846072b42f3
SHA25645cab4045c1d27e27892eb73eb0341bf08bcd15332ea2c1737c06ff869bb10aa
SHA512ecf4592aeab13b317c9c33f5a8c79d2d0290ed01d2264bc36eb00edc3454f425c71e9b69975195a88d522d5a3b6b2c6c2fd10d1db3195958d45b00e9c6370d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51770aaf17256438a93618672806777b0
SHA156fe19916cfa350b16aa343948f9be819541f3f1
SHA25680fb3985af6bf1e37279553b3dd27581baf7968b302c20abfa441f074c7b1c83
SHA512db2abdb742e057eaffc5bc01bf1256e5bcde78f78cedddbf6b62fdcecc466d9afca5f037f95c4a9ac1cf54a9f3d861dff95ee7a269c7d29da21df8a889336fac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a7dda996af20c5945f4d360c4bf7248
SHA10b6acb8f0b162297618f59696108bda51597c674
SHA256aac7ae5dc51b5cf8ff7dd570a058f5065e5c48a201a59c2882766d16f0e34d32
SHA5127c2042719ab91d9ec8bc6b1d1c4132b1e2319b484140c223e31b9ac74e0f40d69a35ece7f58448098f815c98ef82065585ebf0d5613f7666f1989326f4ef180c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58167148c12038bffccb99a11f929ae1a
SHA1f1fb0947da592093b47a21bf3a963a245cf0d667
SHA256218319b2983d4e50decc7dd4df8f3f54c43e997cdac76c2beb7ceec5bf902f53
SHA51294cff800d0b7c6e1e2edff90339517d1cd742b178c1fd07048f393aa1214b8f37ff76bb90cacca26ba7468df72fc2e60f90279a06f368396aa1a2f26db890d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58acc7c166f1a07cabf9d359beb0a80f7
SHA1d8e0faece475e2ed3108665d82fb25038073928d
SHA2569c441fd8524af60e2b955bb50fb3f07aa1a4fedd30615cc0216badddd87e14a5
SHA51240b43e963d70e705f2ddc3c21f399716edc7c11608ef4004fd6fd5332bae3755eff5d4e4080b8b69c443d986c77b99903ed4488ef1a96276e239b3eed09f8a5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3535378c37911bb30f85e83122d47c7
SHA1e9707562e52c09395faa0e53bd334eeb2a0a0349
SHA256a173751246b4c085ed6a5576f38c24ff1b7675cfd80891eb75a6fc00d466c623
SHA512557e073ed25bda0ea8208c8b4724202110e5762314496acccce502551e6e37ca96e19011eca792e454287f5d6eb086e8c2c873638f6297c44723dda72efee953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549c9145f0083cdaaa4ed6bf70f2eb557
SHA1a96fdfd1b7c44e50567dc62026f55ba97726fc19
SHA256100766a305be76b0624095a12f3bf58d2e7a32ec960c17a558db0a61c0cb9c78
SHA512136585273f779c1d89187e016373d577ead61a60f4843b809a46891994a509963106f1d10d8f0d6d02aa2c87ad847a181837e93670d5b63ad981dbca2a8dcd90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5558ba94b002c6a422e3fb007bf01562f
SHA1ec9c870b772d4da92acd2564f17a3332accc3432
SHA25638d60ad72c2103c9657d20c74088d2ace0b68a9ef8a1261f6e42ea6e0e233d1a
SHA512c18deef84559d6e0eeadbdaaaf6c7e9ab6c040c00f1256e04c32baa58529264dc5d949b7071db8d2ef5c34960dd6c2d90b6c8f6a0c673f4bb745df5e7ab33a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514dfdf453721353589f3eea91fac8aff
SHA11afdb6661930a6489f44d546ebb6e86cbd89e674
SHA2568182ef976550e9e5c17c048448264ffd3eabf31fe6936e07071df2bfcf75ad9c
SHA512a1933427ccf34a1d10c75b1bee49b919218742411ae9852145976c16b6ea3f848e4595dba4570b79b97c40929beb84442c607a5c91f2c3af05267321400629f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537601aef6fa9ec17f8efc8bd7dbe3852
SHA16c37b388abee91586a2f1d260f05e97adaa1cd84
SHA256a12386389f757f2a9014d2c6afe090cd03fd78a2d77fc60abb2764f9df1bc7db
SHA512c57ec395814b36e879792953242e92c86587d145964c67ea6d48ab8420de67f6caf244760e44e57813533311eaec218efad0d2f61b9836ff03eeab5973a988fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533d6c1cd380fdceaaf72112fc7bd47b5
SHA11a49542823085e36ce2a945d0200438aaa67d059
SHA25622589dc2b30c5e90c6c221b6a1bee778d62368de74cdafaa585b70d31cd1d20e
SHA512abe8d05a2405be4ffcf67809e18b108dcaa84ef03930480b2e86222a4bf61f5eed347d7984c07bd1db9c2fe2d63dc182c5970f95995dcf795843c8f8d8b8a5cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ce628fd6ab1567df453b0a866ad4ee5
SHA16f4efd3bad22e834dae40d30eca9a3893c87afff
SHA256fcf37070920620b6a8504fe3ead439e092374af137e9944516edd4e9287c0f7a
SHA5124f106a43ff3e6b5890c35c5cd48cb653085810394d80edc459e788fc3c67d366930305b285e9f9e860000316c158aa934877b0ebe9cbbec75857e5825371e6c8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b