Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 09:51
Static task
static1
Behavioral task
behavioral1
Sample
00b74839685e6598168ecaba4a44c634_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
00b74839685e6598168ecaba4a44c634_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
00b74839685e6598168ecaba4a44c634_JaffaCakes118.html
-
Size
106KB
-
MD5
00b74839685e6598168ecaba4a44c634
-
SHA1
a44f2ad99fafdec33e21f90905e4c24f1896790f
-
SHA256
f11193d38061f69617ae7c63f0a2436798c04a492dc79467019c95dcf6073e5b
-
SHA512
1d46f10fcf80b18fb674954674c79e9e8aa6b91f1598026bcf2f6417d491eb53533fc4fb922d38570b5bd138e58cb1b94802c4e0c54908f90e6c7df475a8ab05
-
SSDEEP
768:VkZUqQc/Vzv2/NzOtXrUnSLK4QXF/HVHzF9g25U:QUMNLKrF9G
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000e948b5fac6b8459bc5ef226f0c4f6187ca2e284a94539ea6639a4390e3f0cd2d000000000e8000000002000020000000822340999dc680418b98ecd495ae1b946d80366f7ec5b00eb30d5b8fd547dd16900000001aae0049098553209f5f3aa62797a2baf6c020c70565273b747b73e20d4c98ca604c1e4aa73f417e311ffb9ebd77720da0eed5342dd0f5cff3e89d8265180860fbcd9db3a56d25f6b3f03977750bf3a70e8abbba701a561e56893e0d4c1efd585d761384e6b4d034ee5f48b687d84c66f8b9bd3888a5698aa0e485a3384ee8770ebc6144ad583251f459e0ec8955b0a940000000f368c500e9ead84a07a874388649013661ba26a54e41730118b665d5814ac23006596a14ca3361bd7238e5283c8b21c0b2a464cbf87a5356b2d5fbf3038f68e7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{89AEE1F1-7F11-11EF-A0B2-6AE4CEDF004B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433851745" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a02bae9f1e13db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000005ce7e7e1a5b2aebcbb9bd2bde5438b5e97f94509c1dc4f08d39cd864a8599252000000000e8000000002000020000000c6e7394e1227ea8752e8447a53cd11142e7292696dc6cd74fab17a7fe3d9321520000000d17c26cca4cd8efc4bd2374fc3b054ae88c1c4ccd1ad8fecae17bec2bd76337f4000000002d521e6dbb1927654bc4651dd479a4ff0954e40be4dcb947da290c12ae9798bb33b8fc904dd3cbe089ea80277f40cd3aa82a9226fa7b41468be6df4c7b0e88b iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2244 3056 iexplore.exe 30 PID 3056 wrote to memory of 2244 3056 iexplore.exe 30 PID 3056 wrote to memory of 2244 3056 iexplore.exe 30 PID 3056 wrote to memory of 2244 3056 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00b74839685e6598168ecaba4a44c634_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5621d35a7b3e916bea03575af2b8caeb9
SHA16b0e69236b8e048c67885b12d57d6c6fe1b3df93
SHA25618be57049a3413f91ca9b26b65417e533654a257546db68521d5bd65fa050c39
SHA512c80050d2257274613d3904d7bc13acaad4de49c41f43572431bc8a9bd57c05d6a85f16b48a1694c9df4e4d61fca0b0684344d2ee27894b3b0d9ff2f623237d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e83a45b82c8d2cf6d3cfc4d5c3c11a4
SHA132a28f66c4f1b18f333e5532eddcb4c84827f6b6
SHA2565d19a9beab0d95e880c9ec9ea37d54aab23452e0f79cde47150e59eae8b120eb
SHA512fab4f85662e715da63f236bfc897023b3fb91c873a20d5b3739be352706ab4529d3ef709d8ce149bf84ad1f14affa814decaa36aded1b746f512fb31a80a7e53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5473d5e4ab2f9ea38a48fb7720330dfa3
SHA1137aa0162534a43c9e6a6c608620041afd356a03
SHA25677c630514c671402eabcd239588eb68cce9cb07c5f766fb7254c082419ae75f7
SHA51250d6ce6be3760618d019fc3c0b8931a28be8cc34ab753c144d5ee437c716ae62583151441ffee9963383d936fad6b618be8abf13e512de0537f05cf17f16c080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bffe92144af6d5ecbad38a8468b763ca
SHA1783e124f2aaf0f6a40d02c3357ce00b290f29118
SHA25626b7e97306a8219b17a24c6b30c0839ff72b21dafecba30f95f772be6677f201
SHA51208a6b5be045f5c94fdb13d53a50ace265fea1f7f970705e4949934803e98065c036b4eecdd56f98ded70cb5bf3729e61d71a2543e2abfb765dfe280b651ddb83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5624750094c2d8ea2bf09458550be9e9c
SHA15854dbf09c54152c4eb83763bc855c34c2f997dc
SHA25620e684eade0537e426cff788ed411d6331ef34c949a09771fbba135842ac1484
SHA5127d614a30473c90f01f850a433bda1f1f781652146e62bdb0d05cf609bcd3e8bc0f93857c1d88cf5412b24187876db9aba30fcf127f3a1d1a9e0e13a6931cb25c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bb9e389e5acdf3f0aa5d7ca3a71149b
SHA10540a7fc2fefd06ea9851f63fc7da5b0e2e435fe
SHA25696d59a293c3b796b4d2e05360afb293f41a1f5293147db91589dc5252c22d150
SHA5126fac1f33864104464e67e32e0df340705d7a2a484c10c169c9d1ead7f23856b8f0ab7320f15a38c608bae84472b93c900a01c23b83e7b623e19a6e8e6f472afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a407f3a94ffc8b42e1577a3265125f7
SHA167fcdfe6f2bce9ac37be1d7b127b1b6601ee7770
SHA256f54db6171e1f4d135f2fccb04bda1d1d74e97b5bc93eaf66115b1bb9144e20c8
SHA5123e7d5a7855ae79e3145ff194896db9214fd46f47f07b058ee2e284db783a9babb4e4bfa97fb6a99dc51fdaba268ca964d6607d133feabdacaa58b7895a4fc289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f50dff7b4668a4d9cb41eedcc0d4837
SHA175c4ec2b3784303d51b9dae13dc32004294cbe66
SHA2561ea00eb834deee756e33c78f1ea93215fd18557cbc42f39337131b513b71bcd4
SHA51213ea49268a0ac9a7535cd3d037e7e1b60269ed6f176e9595f29ca7bdeae6d653208e255c60886a1594a502df8b049450300049e4f89de0a2079c44e715ded3eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5396ec37680d15d86a91d8b7e895bf2e3
SHA14d86a909a08059b2cbac438e8e66293d071488c3
SHA256592dbab426bffd4fd6b195347410a2ed3aa3965a51291eeb9761ec38bbef5fdc
SHA512bbcb9719041351a0d953aeecc098e9098638ddb144ba901d24bf9c8ce5cc899d2d014c18d1b49129fcd39af234f79b85992ebc2b8e1cb1125d429d8b2d8ed265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56341697df046e8ab321e9b782ff5d24c
SHA18de2bcc4aee212b8b881a7794868b06afe440fb4
SHA25693159d2b4e858b07085e5129bfd81aec638ef0f8e6f7cb3fd9a9cbd0bf47f36b
SHA5124ed55aaefe2551a18aa828553fc774941c4ef11a99ecc29722e3c85d87b800ac2d43e7bf7a452772c1b1a5f488aa8d4e9113fc2492df654905c8eb1b3f94616e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b32e761f19ea8659e699b8c8bcf367bc
SHA16868b423c8638b5fe77885a82d94268d66224e3b
SHA256ef9e0da6bf9b97ef537d9da221491286687a040c09ea495bdfe40fd97feeaec1
SHA5126a6a593b769a4d807bef3dd66c4192157ac86c909f2fd7cfd728e618e8fa92e35527a89c9e02afd96cba7c69dd18e200abe19d055d233852ce7d9435697cad4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2c024c83e0af3473a257cd368ee6276
SHA180eb3ebdcf23d0fa0e160a733d8f589cf073b398
SHA25635a531e825d3cebec57c69e474a0570b4113f01eed3a3db26d369c135d989955
SHA5121704943be29041821805d06fe8e210b5ee368307170ea7711976077933ef8d8f43ab8590e1c82a76d24f4ff0c979b3e73ae4e7769c137267075e1752c5df586a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4d7c7f2fe469c8c8256c7a6db9afd6f
SHA1838a65b6cb60ff89c8c37cce39ca6b84d1f6ca10
SHA2569fb40bae471dcd7f30fb6ea582dd2499f94b0ae2ebe630451d131610ca727196
SHA5120c349f2f10e213c5adc248472345cc3b6d18c73cb953ec9272f9da41740284b04f067d6b5673ea9acab57de94fdd02577dd37a5a833463e9429506eee9bce38a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD561ee00b47b055680e3a50c18616ae52d
SHA18b5784f42363ed0e5357b741cefa66ccb99e1264
SHA256bda7301b6605df6ed7310b4812e3d0296839cfa70b0d2123392b0786fb5db1dd
SHA5129fca7dd4ff385bfa05d46994676a85ca8d3f05adeb7b73d62bb0bc548c806d20bcb503054e743edbf0fa3b6dfa3180b74b768d92ef904261cad14df58c1c805a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WHDSWW5V\js15_as[1].js
Filesize11KB
MD5e959fbdd13def4b9a9d0a5fc9a7de4d4
SHA11e39712307e3673b40c0bdb8c7d3e86a3e8b60a0
SHA2562defe59e357a7d0683c8283ac42841db404a0884cae2eaecebf4b676e559dede
SHA512590b22282634411002c9467c6c0d20d27979f841bffcf893e715a2b61301a873457a9cbe0a765a11592e7f5cb81fc50d5bd436bd5d47dc93bfb776515b02e2c9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b