Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 21:22
Static task
static1
Behavioral task
behavioral1
Sample
25a32d052bd12e5ee7a4d72eea90b12f_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
25a32d052bd12e5ee7a4d72eea90b12f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
25a32d052bd12e5ee7a4d72eea90b12f_JaffaCakes118.html
-
Size
154KB
-
MD5
25a32d052bd12e5ee7a4d72eea90b12f
-
SHA1
52b1be8ab9f4a3b973de64714a2fbec4a3f7f670
-
SHA256
e65ffcb7374f410ede2f25bbdb0161e4d462719495513b70c5c8a7383581abfc
-
SHA512
7d7376161b4d570cd5a54c892ce6205a6637e8d97da64c88df8f8ff0e239db3983ab4ed2850f23d2d36a911be45fe44f002a8e83f27fd3f6aa7ca8437355213b
-
SSDEEP
1536:WvLb0YtfUGQHc3ykJvUaBbyPYOjgsHAJRz6EHxrBZ:WnPtfRQrCvUaBtl6EHxrBZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000a017ed4ea9764eeca6cb9696ca57ecc843cdc7927294a66e610d5c1cd2cbde42000000000e800000000200002000000089a6c2ead3c001d1d44e2eca9e2337638209fb60aff637ee34e72f1adcd3212620000000c4f4026b8654f64cf03d72d25ad25bf1872e89192a06745c3f78747e9adb02d5400000002487249096ad9b8509575459f737e57b86701e75107abe1f809fcefc6bceb9658653695754af1fb1007d0b04b4e35c383c849aa7733ddcd2ddd60ff4cc33f965 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1AB3D071-85ED-11EF-9188-62D153EDECD4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10840930fa19db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434605754" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2932 2184 iexplore.exe 30 PID 2184 wrote to memory of 2932 2184 iexplore.exe 30 PID 2184 wrote to memory of 2932 2184 iexplore.exe 30 PID 2184 wrote to memory of 2932 2184 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\25a32d052bd12e5ee7a4d72eea90b12f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1f424f88a7d74c5f10abfbce70b7fd3
SHA12893af43c2a9fb1c7524793013c812f9f26cac79
SHA256ab0724c43b1b3cd70c59e937411dd7ed060e6e071dccf84967e52c273c54057e
SHA512892f9e978f9ef8aeef277c811b86ac7f9c95713493305486ac38f278895a9f12f2b0232685670806347b2a833bc8e65a793b080bca4ab748affc0e3f98f81fcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e9541462d26484d4b0809d921a6dd77
SHA117d7cf256eaf63d34d0a60468d57420f38c295b2
SHA2564e96c83981a82275fc02a6305a53605c37c4aab74e391b1ffca075fe773ea262
SHA512d1641b60d9f8fe712de5cb1e0e4c78d6f17156fbe9bc77c8d5e94a166dd1440e06a182becc05f86d6b68ae16629c732b09925cc75d25b8520276265246478104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5791e0fe516e81963344c9eca2aa7de9f
SHA1b92b32eda38fea0d26c557c65a84c412e6b968f6
SHA2563c5bd83955ec414c0538ca3fd902c8833bd3d687d9e3a4d4a9756ed9fbecda69
SHA512346b245e995238b29bc6737af67197602b49532325b1c4308ef7083f081ed520654dfb9401390204bf731ca14354bc79aefcfb999ad51d8e485751a86f5e47e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a617cb7d1ac18c1aa1a263b977db44a9
SHA1aedea8152fbb920e6bcba3daa0a8a79a897a7807
SHA2568a9734576bfea953db2a61b531a2763bb4a844ab135022fcd8420af0b066f268
SHA512daa764a3f7605e7ee9a3d3e5d4cd2df6feb380a5b107f248ac5e1ea006a3fdc85c1f72cd5a25bff7c5e5234ba7281f7e1a0bdc310299557269eee429a7aab04f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51788af204b5ed56b9e4fb2e90de14c84
SHA179354c6bf35bc64690589fedda9620f0a63cd86a
SHA2560c146c5fb8716dc0caac2761c27de3188d138f52a61a1b1184eeaac9cf9bc7e4
SHA5124fa98028683eb294c0f6de963a6d07f0ae8a7300ee53e6b9824cd3ad10c2d117aa74c162ea5affc2ac64450a94ad0ac93ba6966f65fffe3b5c83c8522d41f56b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a042bb4d404273c46187e2770d622c4
SHA16a5ac21f537121d20ec269d1525d1b136fae3662
SHA2567e9826f4838873d387db2feb2f685d0ca37d2c1f99b53aab93fb2854bf722e32
SHA51208f1833309c1bea79dd7ef5c2b3c029e0f47a0f8ed32184cf13bb0696abe70966db8616b9e7b1e1ed64620b5569aeac3da33f39dc3e3d40aa6898fe52bc9be34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4ce6266ac655b83f7d592dd2ce401b6
SHA17ce4062d69ab92652e48c04d5e5eb32d3e46a732
SHA256dbfbdfcc22dde248a8f565168cea84686e77de3614a6dcb8799f57f66214bdc4
SHA51258ae94fec324d33a45b19ff4cdb67547bcd1cfe15368c657482461957b77c3b6002c21e7574cd2ff8156008b50b75c854871441483a16946ceff8a69c20cc2e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fb225c48a076ed78326347b7d8e065e
SHA1d46016e4dc901137ab724aedbeac3b57c8f9c852
SHA256d8d7c0bcc887f85f4ea4253b28ab5b32e1ea2cc719021accab03e0f319aeba3d
SHA512a5adbf97df9a02595125403b4836a2058e7f0eb13d42782ba836c030cf82e4ecb1ccd9c112180cfc2cbca0676a4e3a8c90f7fb71754368d826c42b6e14ddcfff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a65e8b4ea3f616df962c3cf4f3c194f9
SHA1c5904707b8d5d16964082b33e88f12d70e25a500
SHA256e3f97ee4e6c6b384db18ed550e526194d0330e6299ffcdafb912f22865140cf5
SHA512c4472ce3661e1458744644c98011e2521acffe0259ce2b12268c9d67d47e9c1d0b84ad193b393e9cb7ddd8eeebf60be32a072ae8f9b2d15361d05f89fdeaeb92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598d30c49083e5015efbd0d871ecebf2c
SHA187367220415af727160b06d30ae24adf6cebf424
SHA2568f08efcad9976201f17f247b8d1a56bcbb3e7bf21ea5b0bba86639775d6f0f31
SHA512850e0d0a9f6430edd7e9803964a232dba9853ec9143a9d4cd183e7d4d717ab672d1a00e0f76c82a6a6852d5d1508083cda843e23d0e7e2a86565c06cd0f29be3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3496c463b3c4ef0acb766e8f63ef0e8
SHA1f1f3a5fc1ac74d807ccc75530bf42c016f04ec36
SHA256449ddede168a5d0fea328b947b50b7f751e25ff5f321ef9146c2d49bfdcb61db
SHA512bcf3ad8ff35c8c61b8df364b0a9e875315b5167293434a02a01ef7d5452acd6b304f91911740342d9adc13663cb2ad840c226e4ca516f22d876555a137a4dc3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587733a10b6003e37f96c3d675a5eb5f7
SHA1058c3f73d8eaf72440f355e319f3e9434e842526
SHA2562c93239213f7b3085959d15615f72b74d65f16ff8a60bb1055a8062bb0c2d74a
SHA51283663e62e79d6a2cdb76c6b0fd1bee7c0829dd4a87cfb25c1d73c43f43a77c8b1cfdbc9fa5df55b0ca0ff1b134d1b16d58c791aac69779262e8f809648d4edf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb1777c5c79291a6d38641510f37ef3a
SHA12d0c3a41a78666f991014c0e5b20faf1065f2e50
SHA256769772217eabd6bd87a136724913dea7747a8d8fa24856748b8e5e98f6b2bd42
SHA5123211d4544700d01c70f7efebd7263ef737378aa8a346451b89e1ddbdae97d7a1f83cffcd51511d4902de44bfe7cafdb49194b2ceceec8440a2db07c80d833aed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca3f6bd4b28f390aacb436fca73eed73
SHA1fd46623d5c1e2e98537a7d16f24fbccb74d176e1
SHA256780b24dae5c7b34bc2b53313af69a94978250606adb4dcdbdc60ea12110ed0c2
SHA512550333b6c829d4c489830d495c19a381dd742f69bbf2cf5e42d73fa5dde2669cad71d68a67f88df539ddf6e8fd56ee1a57ffa782726e634dab40e60e741deba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5124d54fbad40b7a11b5be997dd223bf8
SHA1b2f17d923e89008b53e0b353bf0159abdb5a2e92
SHA25661c8cb1d059ad18b0738331977cc2829215790cc90749a8cb37dd10a005f0a6d
SHA512c1e7c4bed659fe659c65ff179a28f9a1fbe118ee4038d08d086e3078916e8ee776ac3b2d2e3b032c2b957b5d950f1e99dda5067e68c847e1aaee7eacba60984c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5888164e2a85cdc0421893d0273f3b0b2
SHA1fa45c1dab4e788b156e84630a0962b512d38bf99
SHA256f0e020d091628d8769808600b87e144d6b02548ad961759b16a8cb8b9682daf3
SHA512a0c45f291fc26c6b0e4dafb8c21a90ec4dc5a3faf05afeac79f255edab239de7983aa3caa7886d1970233f0cc74f9f52900d60bec43c7bcab51969998cf651a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5151d5f488655d0cc81f2f0fe74b66587
SHA15034353e21788368ca204cfc99cd682dc387399a
SHA256117efde5b2bf48eb04aedc8546bc8597816cb7de546f02a62886b4c83df10eed
SHA512e6f2fc24b691848e2594360e7b6486d95abdcf59edbc59e6ee162c2a263408785465c0913e340c0eb343179e9a868b1f724f9e759cf24350d6ed23fb0ac3e84a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8da4dbd6d487a5d03355f71700a0770
SHA17ba477311909fca5ebb2ede38511c285e36b3331
SHA25640ed53ce32e1c01bbaba8d42c6c0a2ab3e07fe251b3b420c8df2d912503d6197
SHA5128a8d6bebcccf6df4714a4129aa0a33eca18ebe304ec5f6d9679d53ef83ee6376379e4099895ebb289e817090080e5060001bb0429e0332f0d268f745c4504b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a7789872de105c60c4d3acd1790262e
SHA15890f1e0731f0cd685e777f6f9f33e65b1ce43ae
SHA256dca9048e38b4e080cfaf61cdd6b3f192b44a2abc6ff2fe8af9c74ef84ecf3650
SHA5123dbe9f7c838fe5795cb038cafe90169d678e8e38f63781a99e1978677f8c529949133f70441f4ef2faf1787845741207f2c98fe67fb073e54a31345d567ee45e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b