Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16/03/2025, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_79d1007e9250e64defa1e31e05689e0a.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_79d1007e9250e64defa1e31e05689e0a.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_79d1007e9250e64defa1e31e05689e0a.html
-
Size
55KB
-
MD5
79d1007e9250e64defa1e31e05689e0a
-
SHA1
432eed750e3935812840b8894e370d38b6f27a6c
-
SHA256
0562461825397e82ac413b904a6e72f82e1ed6b7c3fddc7ac02e85d7a372e51b
-
SHA512
75fb3686cd435e2c691c1db582da732ef68031499a8ab396e5209da3639dd50958a46de4801b8bf2fb9625bfb188d514719f75770d15d0f937cbd2692719b686
-
SSDEEP
768:vpGhKRcghp1Np18hKSoudNZRiZRNXINvjH06qDMs9tmnXb:Jvp1318ISou7ZUoLH06qQs9tmnL
Malware Config
Signatures
-
flow pid Process 62 2608 IEXPLORE.EXE 63 2608 IEXPLORE.EXE -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 40 sites.google.com 47 sites.google.com 48 sites.google.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{992641E1-024D-11F0-ACA4-66AD3A2062CD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "448281144" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2864 iexplore.exe 2864 iexplore.exe 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2608 2864 iexplore.exe 31 PID 2864 wrote to memory of 2608 2864 iexplore.exe 31 PID 2864 wrote to memory of 2608 2864 iexplore.exe 31 PID 2864 wrote to memory of 2608 2864 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_79d1007e9250e64defa1e31e05689e0a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:22⤵
- Detected google phishing page
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5058d0ca7060636b9df56b2294a08ffed
SHA17bec6e61bde0fa08ed26ade7def7813924d333fb
SHA256d0627dbe29a325306d112aa2aeeeb57d95bc42a132f8c98f7e8d6bb3e9d2d374
SHA512e3a4a37eadc385e854c54275e0f21b3536ef41605f55dab1c89eee3c0877ccbe6cf0f04720b0a4680e9f0c85446968b50e3fa0034a7e20ecfafeea2047cb010e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fae8a504989ed1fe78a008ccb75e6e5
SHA18abccfa103b55904394755bafbc3e7fd345325f5
SHA25677533794c8102ac50e08a32cd18a67ea89a9b82dd232cff1d0bce2e9081eea0a
SHA512cc8172976eace8be1d7b35091e7742c9521944361c3049744f08260a0d5d5ad03ac5325e5a0fd00ddf786763eb159c87c08f27231107bbfa997bb70aa19c7d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52aaccca15ac6ef4479fcd3fd5e413a87
SHA12f253cacc044c418ad3135e4fe563626046a745b
SHA256ba526e153a77199138efe8e8f2cb6d31ed227bc7177fa90557d4726463914e82
SHA512394bf2e758243ff9228d47e816bffac68638cf36fa4aff16d52de626cf4e44f2d24bea82253ebecf32be3bd50ca059ffbd743cee452cae6ed7fbf1a2121d921c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56979a3b41fda1126ce0d8a60f1388475
SHA12ac1c7a7fecf8e8a20b72ab0e8361ba96f4c1b64
SHA25663b66665e139f8f2b0f8eca559e92e04300450cc202c87c5747ac40f14b9b528
SHA512cc8ad4ee217b170b76d522260d959b7a626a3274de8caf01347999a683f0033192cb24b12ce15f9b45463b0275ea4d624fa69e1cba19ea8567092aa79f8f4186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50010911e1a07a409b82f612ec14b13de
SHA1f6b3586d848471d17d937e1d29fe236fff03d5d6
SHA256ba8cc06422a9b30247d5b42379f20ae3c02b8f0bd5a8464fdc57dd1ac1b74dfb
SHA512a7c307bf240360169cf8fdd6b607832bf7bf479f365800410eedd3ba24fb1c273739494072105431e48450d6ea58342dcf08dd98c1d829b941b74f26a1b3b832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8ab90e7082e49f40929c0b0fb1e6bf3
SHA1dfb51dd74fcbbccf5073e4fd2ac754428e45da3f
SHA256c1a4a8e26dfa4e0eb995e32850386cd19c42f4ea5907b6c2ae5b9fc19911ef5e
SHA51258a9cf06326cbc6cbf2d5799713802411011972b613cfa7587cd0523de3c8a439c7c7bbb78d5b2f3f4c2c72acdff69563b7cac813bb0d6b4d3c72db224345742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bb40b216136aeb130494baf89a63916
SHA1b72636576d215a6c207b6ac4e072ef538c6c01bf
SHA256ef69bae0c19c4c920fa63e7c294a2acebfeaa818f5bd7fdb312528260fec69ff
SHA51209c3729e7f22afd80c37d0d2991c5d50e0c5608105b57fca3666bdfa21a9c94de64f08145ee3a32f9a1ae4263f64f5a91234232b3ce51fa3b7183e3bcc6ad10d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e109cc1784c5cb08bcf8c2abf6919f9
SHA18b4760eb0efd3993e222e03c573595eda17edacb
SHA256925445d725bed8c2eb8839e65c9265ee4594c0ca2caa7b321a637386e0e55da2
SHA5129b13585d4750655288749f2401df1a281d4dcb2e0f720017c5d28d3d3c12b795575a2c3e2ad68cfafb187617274195eebc1e07c333bf0ffbf2187c839fc9bef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d84a4b13789bc1159922d4d17166bf11
SHA1204fad9cfc9e9f380cf3cc01cd07282146127683
SHA256fc44ba721c73e9c2e6fe0924abaae98fdab755dcdbff5a37c622c3d5ea13709a
SHA51280c68606b3fa74414c359dfad0ca67def7f6bf2f176f1c62b86f4ce185df7bff7359ae7965ea18501071553c3f72a3db5acafc05238734e868eda6abd90e4f43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f7a5c057fab935f4473dbb22b28bd0b
SHA14266f8e51d2aad49a71baf689560385c5883bddd
SHA256eb3812193a5526b30c452757ed2ba1224a351c9f9d5233cc9db2b7c7214b98f5
SHA512cd931d36e0406b12ad7e787d54070aba105646813d1717c12bd54b62f2aa5b49c2094c3cc4c8e1be90d32e730d3e3b75c44a4e7610354432875a191f197d6d13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d5de1cc356e302d58c88920c95ff3aa8
SHA17db849fed59239a80a3569f749533c73b4644a4d
SHA256ebfd45837fe5c4f50f5062d4837dd6a5b327282ec699e55552bd1b436032562f
SHA512eb6d7275c1e67f9d9b7e4d6c0fbc99d34e055d3ec999f6f629f2ceab7c2bf8c5f5cfdb7477bc0dfe62fe9ff4d174dcefab89878ff29ca85d123fcbca6c7edd22
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K0PVW9XR\f[1].txt
Filesize40KB
MD5a59eea5875655da11e93279e26b9df17
SHA1823df28dca6a2d50a9a0b45dfc5810313d038e19
SHA256598d78128351e8948657fc6b1b4251b34f15046ac6c0907bc5257835125c767a
SHA51273f9718b3569085b56191f9839cb9ffe6b4e74b9861c213de83a425def0381b9145349e2e7f07d7ef7dfecb62a009107ddeebea3e366512935fe59d51d04e7a9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc