Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 06:15
Static task
static1
Behavioral task
behavioral1
Sample
122b725cf6562d99eb2685e4ac580c78_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
122b725cf6562d99eb2685e4ac580c78_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
122b725cf6562d99eb2685e4ac580c78_JaffaCakes118.html
-
Size
19KB
-
MD5
122b725cf6562d99eb2685e4ac580c78
-
SHA1
80308671687edb95d02cd6163488b3b86ff77673
-
SHA256
dc0149d8e383b4ebc705a8a8fe860f604b93eecb50bf3f18eae4df108eb21dd7
-
SHA512
bf9ce124115012583a5fb6ee2391f3b6b6147d8f1925ef405041be8f49ab32e15ff6789f7bd90da5e409586aad33298d21e87b6ff28cd41130fb24343968aae6
-
SSDEEP
384:4dlDCJpWeSFSEuvFkk8diITJkbpv0a6qgAhvu9:uDCJpWeSFSE+kk8dYpv0a6qgAhvi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90189bdb2416db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434184383" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dc19b78e12ee9e428bf7c04c583f0e3a00000000020000000000106600000001000020000000a0916bc9eb41b7275a0a43f11d4b30fb653b05ccec18dbe4140bf161cdac9e9f000000000e80000000020000200000005ea2bc7879f5631618781ad78e8469a1c1870c9ef42504bad87761bdb599736c900000002579cb6ce2734c80392e27e170bcd583e570fd4d39fe4f79eaa7e140ad8ac950a87667f7a2c9ed045e91ec36372bf13f730a3bc8a8e337fd249c2c4f842c398a248f104d223082ec08dfbda8260f9c855b73b4e4c2981a16b487bf8ccbdf301b5833e1ad3088e48212b98e1516cb7d4a8ca2680f0be539d3e2edc3cac123167f42bae4b584894019a66a7c3f51b3267c4000000050351be13085d11ad670214ef561b52276108a8d0277f1ab9ba93c45ef0ab9497eb04a0230d23867949c268c212396e9fb0305bb07e71f06b9e0abeb2f30571f iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{056B1AD1-8218-11EF-8B50-EA829B7A1C2A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dc19b78e12ee9e428bf7c04c583f0e3a00000000020000000000106600000001000020000000ad306343e8c88766e08d309fc8de246813766e750536dea05a249d74e47d782a000000000e8000000002000020000000f1b4bbe02a90c51976ffad24843af2263ad7b4fa0070b5e6f628d20ee9731dbf200000001fcd239c1fea5a2a46953c16bec9e42f2ead2fc5272a7ff05bf67b33179621f440000000b754ce3378cbe053ebc0be5c5bd3113dee7286359dffd3eb3ada44ffa23b57358f3caee94e46a7e2d58412249ffaa9a8151d3334f02120734fde6859fc23b4e4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1676 iexplore.exe 1676 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1676 wrote to memory of 2360 1676 iexplore.exe 30 PID 1676 wrote to memory of 2360 1676 iexplore.exe 30 PID 1676 wrote to memory of 2360 1676 iexplore.exe 30 PID 1676 wrote to memory of 2360 1676 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\122b725cf6562d99eb2685e4ac580c78_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1676 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4f19110cf6c9b759c44915e430730fd
SHA1a2ed3b8a83f5459a36485a7b64b18eefaf3a8d31
SHA2562a059e084a8b92b673d6d372cbe024c3b4c81671073c9e18bb10acd7af4d79a0
SHA5120a15a4487ad6068e203a15a4630e78a416a79473d42335de3a15b1373be9e1311dacfd9966a4a4eeff428434dd2f0d487ffbcf76f44c614e5e98cba0b027e666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c623ea9fcbb2aace8707ffbff0de0455
SHA16aa03b1f578642b1ba76e359c01c08ea64fe485d
SHA256e154b931e36979c925d4f6facefc9ce1f33af70586ec05f4adcd4a2c4ac48841
SHA51252c797ae560e1e0c5e062b70493af39302c846785e27fd8170a7b4ce05cf94cc671a198cc170bb58e5cee7d2cd0a456a2adf4cc949a8ac2b2d27d6ba5102758c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8804cf9c5dcb651f9b1fa9457b8feef
SHA197654b1eae3260df02023c691dd95ff759c12f14
SHA25641c081353561d32a64911ae128d73448c2706271e8be47b3ead4fd601b5adc8f
SHA5125e2c85da46e8d8f4397298aa9f463e8f10efcc4d0101e5837b4cff00c0b0808206f999886fa1a077c05f1edf6774de6803a3eb24340755ad8c1cf114471ae377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551d161774aaf9fe1de4210255f286513
SHA118031c9085dc8911f2aab1558d00ff7464e80029
SHA25672747c8676c13ad773d5c82b94747dc4b7fc46341175f2da4541cd840488c441
SHA512a32d949abd1a03995e2a7d6486334fa913cc1217e4f27182fd369821f6e79cc7ec6a5203d85dc08a9761a074207a11a43817101bb71a2a8968ae3c4c70f93b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e86b655b7d5f3852fb933c72404a3a7f
SHA18dbeda534e7c451d249e7548c5366e304a7f8926
SHA25635123a354f9f5eac6c9f3d36030300996e6f41693b077b9c7eab021e5f384bcf
SHA512bdbf3e468552c63f4d1b5466a52725618510c3390a4a5b6bbdc42f44f454f63a8637bedd6e151d24b9539d6ae4c315d56cf4db48e16cc01044edc4a402cddb2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e9d7162509d32388f2f2253b1243788
SHA14a743523503f787242a0e87e8a207255dec355dc
SHA2564b6b8e063cd425ff0031a85f13d55b72f687d7a678c4bfb4fa9239c6c91c5356
SHA512e1cba78bafc423bedcfc4c3a605d081801ce0cf517298101d633101fc0532394ea53beafcb3a6ff45abf5536e54948907be073332da225a82afef59b46dfc4e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3c649dbaa2e9039d4d2e35aeb3977f7
SHA126ce47efac2a7db2ff4affb82f0bd1fc28c3f0a3
SHA256b484c300e276754f69717d886fcddbc15fd06679b1415bed9b6e99fe0a2bae8a
SHA51268f8ffcf5deff027e12a5340a465f208e907fcc1785220b040be88a2adfd2925efc1423ad6bec4e293b9c9071a79354d1cab4bba439da7cefb2f439764c6a318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a96f58f829e45f7f6d0addc91f8c1cb
SHA1fc976d7e41c43929a6f548cb8f6859e7f71a3a04
SHA256d12ccf11c8750e173dfc1baad1a738519e6f1b3671726b864bbcf65846a53787
SHA512eebdb5d0e8590b3ce6e685fc530b402849689871815a972ec6341247961c8042eb8063b06a730a47d41098f69fed529f84ca13d6bfdaa5d0dbc1b1a6c3678eb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffe2ee99c65d43bb594eea99b4893391
SHA109a136242b741b3dbce67eb0f9e9745d9443cd01
SHA256786995df019d36473c71bfa613b5ab69881441d4ba5c39996f28cf7005836397
SHA5126454bcabaef6e5661c9e905b94d7593021c154b1fdf8e644fee561046e4f89ce321858e78e409f50bafd9d21d25e3ff13ff168bb0d5e636800c844c135de7f93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5957d96e15a4218566fdbcbab88c49422
SHA1113baba603228187c85ca13fdd07f369270209a3
SHA25684c2c28aa498a0d7f99329d315a490b33830b32e4f2e57f8a463308d9dc68d43
SHA512d13433bb6dcc82591f057c6e0817e304816d888e7879722361100ece9d41c0f4ab76d92e5cde26e8471881c8894bf9af7618dd32b34c81a38eec031ea98edd03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5474dd62a2bf6d034adfe2524f051a320
SHA1ba9afe2d4a1b32dfc3042462e906d18a3bfbe6af
SHA256655b87eebe74cf8a4d9efdb4a066d7d5d0929e91d6571b9fbe25d8b08045734e
SHA51288599a42050d4cdd5eb5f78feea002dd30bea485d07ee7ce4c946295f7a2fc476ac63259d8b7452289f0b046ef3ad50d9436164d4fe404d23327273caf8d7ff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcdfd4c84c2e2dc9a3be15ce7e38f54c
SHA15ac0904de72c16d02813d7a9b8a6c33d1622df72
SHA256f2c039c3ec7ed7815a2d1fdc01cb43b0d677f61dedb70272ec23368652273640
SHA512f7ff7c52a1ce215f565850405b5c4b9c47cbf635af25b26947698aaf49cb5b2056139d14d29d76992555c32f770b062892cf6728559e106d337799befbc9066d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5037894da466335ff676c5d937db4ade7
SHA1a2908383d5fbec20ede5517180b3de80dee60436
SHA256ecbca1b6c900c5115317c0199f6623bbff1fcfea7107717bcb4bdc1e1185d33c
SHA5122cf5ffacbfca8c031631ab4c9b53e3c901fbcf5a75346b986cce3cbf74cdbf1261399fa538fc31b3983b3b9d530c2eb613b123dd0ef068a7fa7ee31003b26712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56582d9705ae4838519743890e3945156
SHA1a506f3bcfdd2f5db7c420028ab083586b129fd87
SHA256d2e7dfe0d66dcbe3c1d1b1b6e2964c27c65346e7ab1b048fd693156045e630cb
SHA512a74f03d62ff8ab658c9ff1ea727c039e19b0dc99ab24d1c0bffa7815fdb0b6c1d8496377279e3919445af608e9adc7d15a905898b55c234da6e9e830b5868e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d62c4a4753a452262c3a656ab08ca0fb
SHA188b064477e940b8a485050ec4e8c3fb4356029c2
SHA256d449ef56fe833dbffeae2efb4d48865933bbbcceceb073a0356d8df58ec0e9be
SHA5123aa5ffac23adb85c03ad53f9138d9aaf5ef5d170b19627cc014bb093a6c863294fc634770d1efb42763044dd46b643df8983a42fe494bd4763990997812bb5fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51219bc31b02b801c0a8d0eb37e1961eb
SHA1011edb874429c483fd7e5a8008c2b499cb139a46
SHA256e41bbaa1206a9145f900ed1fbf2bf9e7cd32ef1d875505cbe7f45b3d62cb6607
SHA512096769504da8b8be25ffb84e1c9be04e97ead42f9ad09b7e05e9ac585056aa7a9ec369ab5c2715498c1e3705b01900c38ce634c9bf53fc01464d63937d004f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f92d6db2fdb7688b5530fcf0f909bf0
SHA189b62366c34c33a3fdc7345711132d95ecdf9a50
SHA25622ef245781b77eed7c677fa83c325838937c966e706831fa721c69fccfa5e2f1
SHA5129e29eef07b58e2741bb447e1952f131ea54ea1b96872a4f70644c100cca08a203ddc34257ee54ff25bfce140f1251c8b4172ad33430e5e55c5b7152c663881c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d66f399bb42406a91263c02a3ea1219
SHA1381c2ae96466bfe46b117e298b393de522cda20c
SHA25626ebdb156b4fe2b54d8301f804e32e9affd8e4cdf390831e73df15e39ca7c780
SHA5124ada0798e8b2ef7bee45647911e18bf3f4d0221beaca4acdd55afcab5814603323ba3ca248f22b65177fad9994395ed93a1a27c0d7d1efe394fa8d8f8303e24e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b