Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
6984343f2a12903e9cef1db9e684d1dc_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6984343f2a12903e9cef1db9e684d1dc_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6984343f2a12903e9cef1db9e684d1dc_JaffaCakes118.html
-
Size
59KB
-
MD5
6984343f2a12903e9cef1db9e684d1dc
-
SHA1
d0093c29231d2387abf2a0e2f902a6ed5004c31f
-
SHA256
d5de1e0ae00e3a7560e7009170b9c75a4c6852c8c0e344085091aa2da19ae449
-
SHA512
524051640a976051666c81d1b81634dad6dca190aa732b8a07f8fa50ec7d0dfa7440923f41f23a4885fa9e53d2f5ba694a224de85118089f3dd926509ee2d41d
-
SSDEEP
1536:gQZBCCOdk0IxCflzXiMBAGTdX8dmXM6N+EBa7WYjBUrp6l5ZiTVhZ01trTi/yDnR:gk220Ix0XiMBAGTdX8dmXM6N+EBa7WYb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{30E0F311-4951-11EF-AB29-72E825B5BD5B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000639b9d335984254f201fbfe47cfbe46f816005a9527c5465d1afea32b825268d000000000e8000000002000020000000bd02d54e2b3fc5831534a22b32d15bc153f0f6dab2b9409ef2fce997a86df79f2000000017baa2e5c96a384de7cdbc3651330a82575f709a67dc994366e23aaa46ea45a740000000dcbe1b96e72035e0c8b327b8a40b759b41a0cb1d432e2de7aae4fecbc06b1e0d6021ef8a018cb85e92673ea5ba484f1b20aa657b5e75fbc59782c5ef7cf0400f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427941721" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e00b8a085eddda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1540 iexplore.exe 1540 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2636 1540 iexplore.exe 30 PID 1540 wrote to memory of 2636 1540 iexplore.exe 30 PID 1540 wrote to memory of 2636 1540 iexplore.exe 30 PID 1540 wrote to memory of 2636 1540 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6984343f2a12903e9cef1db9e684d1dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1540 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3f6e766ba2d8f5ba66cabdc3e26e3b2
SHA1bd29739b1714877e60aaed8483e627c60e023e86
SHA2564e66505bc493574b6fcc229576f6b14bc741e31daa67b107ed6aab4fc6bde57e
SHA512447843cb1543f27984420094154342fd2545a1b2b2f762e81f00ebabc8790122388a42d43463194d0c2b568044b89219cfb8bc9813cc162a7eea4663c3c19578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee5dc71124ba7ba0b302f2386b52d201
SHA18965ffdaf1f086adfde18a927749b621b8fb4e68
SHA256b370c025d535c185c824b0ec29018a2da18e5d917427002469876c6fa241c64c
SHA51255f0d78a46d5de29772973ae9bf6b91962b19a18125dc8fb7749cb657d09c3b9c5250733ca20d9aceb4eb7f3c6c50c885b767f2a0effa3f7082050b0fb24ef13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edbc6dbde678d1bb831639af2314b440
SHA174d4fbea3e1ba30265a46d8e65c1181e2709fbdb
SHA2561d8c4bad9246b856933d9e2cc92c4b1101fd714787dc2630787e02c267c6dafd
SHA512ba6595355295fb36e3397fce44afeb965468915f00d9641812044294ec391645f66f0453834e9de27cdbacfea588ecd6764ec308e1fe3d8e770972cfc9dca37d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e107bc57f9a942af3cf792a033e4b5c1
SHA147f3cdf0bd955108bb79e64f27e66b3e72d50c81
SHA256e8c5f518544bf0882e629b7a26e1a48ba6e07d43b8dbfc37e042510f3ff802d0
SHA512c94c4b576f978db5cb328544892ab8bb187ef4b29991f54af7c166407a496fa34eb9a75fd3a4882311ecfef4929d3c5c443a4f6cb5524eed2c0acb83ae0e9ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505e825b9f63892fb8e4fc2d273618c02
SHA13a52e031e83434ca63dd33259edf5953bc8ea7af
SHA256901c97e998ea4ab4b1787783e620edefc3f1705aa45f027950f6d424e5899e31
SHA51242ffe2fa218aba6f83e8182ee45a1d4fc8df2cadaf6cef962ca569ec923db52cb9db7e4e455155fc02de301a76ccd6c74df357477fda758530f483f48a0f69ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506c1008c56fc3350c1f321965a56c8a4
SHA1038d3cc4057171fa2862d031b661f108ed379923
SHA25683452df4ed1d6922bf1b6a96b14c0c27876bb53acab7b8ea9d9676c5076be5fe
SHA512bdcfda8288207b28f44dc6d2326f1b69f2356520fe172a11f351ac2c827f131f60b4ca4605bc27f82978be0bff21acd3cd0dc0aef64d2f222f324ce09e13a83a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f64ed89e98be075206337822736bc3c
SHA16c1cfe3c84577aad20806179a7e6dbced05488eb
SHA25693cea4030737b8908379d5fbe4779a336faa6189ce3ead6cae3612ac15eebae1
SHA512ff8916690f68a6c6a8d7268329387997885bd277aabf777fe030d5fd5b53eaa81f806ea75b274b69551941a36cb5b6131557616f2c6044f5b574912a45080e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb278a1f00d45e8d3f86821f503a85b1
SHA17563185fa79fda50e867265c62a7a44476e16eab
SHA2569fbf2dbe69bc605025ad3cf2f736b88a5d15439d8a05300a27d68e02191f4faf
SHA512b1ca60e7524e06f7c1cecce1a80fd588bd99952a37993d3ac1ac015ed3ac87078c9804dcf57f7433bc4ab5be84127e3f54801a502ca7007bb962467e4440280f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b3cde47cb44c4bce925a3b86005acdc
SHA1d9396c515f3b99d535d587e032d610e57fc8469b
SHA256c2f7d43110a468df9e64942a2cfee8e7f963bfb09dcc3f9061ff646bfb27607d
SHA512cf4e3ebf9361aa1a9bfca21a3076170a397c1a99a1c6f770b8af52346af9ea23aa7ab525e276580eab04a041f3af6968c9fe56b0e542f146c605088bd59b2ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d62c451463364647915138576f5133cc
SHA139b726af51431a6c2950e1cdda55691ea5317b38
SHA2567c84d9f2d4113242523d086f0cc013d08067d2fce353aa6e3dc4ce5721113c7c
SHA512a3129e423621576b6a9801846bb7c09fadca31ab982dea0fe2ebdf4f741bac23f96792e624ee7d523cf0f341080f320155fd7782a93602c11ea2c8a2866b88b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a088101ac6b82cc7288d924e1a046f78
SHA1c64a1eae36d292c84662a30b028cd26a3649eae9
SHA2569f80dde0c5b05c2cee6607f8f75f03c6547a47e347b4ac66c916113f701a6459
SHA51298940edb5c5ce0344fc5899f8880dd006230e4d105403d6119a33987dd8f925eea2255935f3ac29e3d8945f03573b9ad3c23df1827df0026510fc63d7593c855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d15a29e5c422e14b8892ba8c8993cac5
SHA108fe44e8e4afa95a9e9b396faa9191ec47369313
SHA256f97da8022907cd6684a9dfcb3228a1367903b4d0977b3debca55178f061ffb27
SHA512fb26e73dff55e780766aef9c34348ffdc8d70830d0e7dcb8f27fcd9df936ee1bc98286a2fe73f216aa6fce5b9c76628e8436c85a529ab3412988d068dea36293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd886558513ac6a297d7eda73d7d432f
SHA11e842231dcc84588c25fa07740d015695fad220c
SHA256ee46bd83906249c3dd525efdca0325899228b5d45d62279bd40b018530a73229
SHA51242dcda40526b59605fd1f6f8148a2823afbe158f797c73fe6a4d80a3005dec50096f906606fb5080147564bd8372393c5e3cbddd65c059a19b8184db5667baad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a74a7ba0f9b8e5ab7820d9eb35dda910
SHA1f19039f824d28885c3590215d93921379b069383
SHA25644af122868017978eb46d425c10e470b2606d4463104c8224210c9cff543a567
SHA512603822544dee786fd37fad3a1f560a623dcc4b77a68fd8ca1b1b0844e1aab4dfbf7347bd54b20851132ec02559d4c19726c94a2beca4e178248ec7e07288ba25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8f70d72b36e82a99a2b5d8b36ed73e1
SHA164baaa39e12c532782136e1e7fc4a0ccbaf1b42d
SHA25661a41af98c5df9ea811d9fa1419937626a92f4aa99fee629ade9e816811c20cb
SHA51241d8e3989330240acfff1cc19face7acbb728e1749ef7084e13197b4ff85f1b0599ff78ab497e3094ce3e722c674d08522de9e2047cc9b06600b6f0b3de5fe2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56954562faaef3dc433113d04b86ad2cb
SHA1e16323d5ea7e56d545e61ac78894037d20c59ed3
SHA256260d7c79444000621afe1e838ff4ce7cc78931be23bc140ed82f302fef23e4c3
SHA512552ce08c4deeea610c397ce15ad5daad0f653a1db4a2051f0fe17dd29caf4f75177bf5964c273cf09f6049debcc533549522c3f51ede6890e924c36f7e2e1a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fa64bec98d88a57ab7c28589b114948
SHA1658f9de9b612913225a2865b6f2124d941976e6d
SHA256457bdee7cbd037e622eccb6c0c925f9eb4fe3905132bff5fafed6c36fa7bc6d5
SHA5120f09aa55ab3cf63d9dde28281d19ea5d68eba71d0cba8b77e0e2449d9072e09895cf9c508c6f1ec6ff8b58c734fa22f7f5779ed064ca0dcf7ee90e63de0ee632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fdf747c13deda989a35ff3d9e2b0cc8
SHA14aeadc0024e4c7a44525f0ccbd04c4f44f3ef35b
SHA256cd0fc4f33edcc31e38d553b2ef8d439f9d25a6fcaa12eddfdb02f6fc1bb81283
SHA5120e35cdef5bfb075bd22962fecfa9bec7515786b57d12ac2c8b8a7b31ece6ecaa951196ac35c27884c9aa3e8a94e709f363280a77bcddba45fb12f1d8c10c3a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de2a23463fc0fba7318ed5bb37882edc
SHA125be37ac7c4643a7429b8c53286fb9422b5d3f5e
SHA256a6e86c30bfbc0556abef7e60e0656f3feda899be99a6dd1ab9a97a4dfe070796
SHA512481325d82679e09a439368b87ec9fea548590c48aa7a2f7beb5335bf8ab57666a4494ca3439a24902ae06831dece85ccd418288d1f56dab08d19c175f6853a05
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b