Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
6ac2300d82acd92c1892f0a7ad04b831_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6ac2300d82acd92c1892f0a7ad04b831_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6ac2300d82acd92c1892f0a7ad04b831_JaffaCakes118.html
-
Size
5KB
-
MD5
6ac2300d82acd92c1892f0a7ad04b831
-
SHA1
83d360eeeffa1ee99fe40d1b97df93e5877110e2
-
SHA256
3b3a53cb0073c326665b67f5109c2cf95da8a1504549313c96ee9c5fcfd6473d
-
SHA512
937c809b80798446560fc06f20507bc94256b77612890d9a3a11ec030c19736f83b1358ad0db942ea1418a7fd640678b07dfc7c73c9b4925dc21a40f031be246
-
SSDEEP
96:0Fw6nmqgJcbqMAPSA/pTCdajlQPwjhxblWN+HyMatXMxs1qxXT9SWptEsG21GqaY:0y6nm9cGMAPSAiaj8wjh1o+HyMJxvXTT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000c11470900893e0b49778937ba7bdcdd4e6e11355349d1f64c78c27666cc9a283000000000e80000000020000200000008e7edeab50779e409358cf5450957cca68fb4ffe6dbcc2aa148ee78c4645e39220000000b020e758bde2a3c2c7f35551bfa77bd6528395417d8c7bed324ab009517e2b9440000000cac9a7421a3a67f021a0025576534778eb391d90058c53ebe0f764d21b37901ceffd425579216b2d348d6c142c6b150b2b26a5e9a4db3af268981f0f4d6f0874 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 308547349cddda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427968424" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DB03A21-498F-11EF-B0F5-6E739D7B0BBB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2468 iexplore.exe 2468 iexplore.exe 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 1044 2468 iexplore.exe 31 PID 2468 wrote to memory of 1044 2468 iexplore.exe 31 PID 2468 wrote to memory of 1044 2468 iexplore.exe 31 PID 2468 wrote to memory of 1044 2468 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6ac2300d82acd92c1892f0a7ad04b831_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56dafdd396680f37c329afb8365f65869
SHA1473d4e51cb33fc3507a470bd924c0ab563bb1a69
SHA256919c460a1069d72dd437c9cea2a04502c3c0b298dc0bde1de66bdc17fa23204e
SHA5123f72e957cffc0b56f2c4aab6ad205963e6ebdb391e64261c95d33ac3eb617f8715c0ab01e4a368f3260e312dd579b615ed05afb36c4bb719227da62172cb5338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52a2e170097291511b9a829c20e3eefaa
SHA1fad0473a31bed9cdacd0d35cd9668af0993179ae
SHA256cd1ec6d891abcdb54437849c635591848577c41899b2ba337f42bb15c57fc729
SHA51292d1ac6affae56e2b520588ac22f49e81798884a199be201b497db22ce7e4e870dfa3ece0952c4ad129e7b4299cdb9467dc2c2eccc24b097c465fcbe2799a3d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58b6175423ce806939f813f8f47257619
SHA10245dc437740fe0426ac0c2886e3d1492fe4d40c
SHA25662b49b231ccfea103f338283aaf7bd37c9bfb01722a6616acd6c6e5ca9c02775
SHA5124fb8199f9d7fc8e7856c72f6f0561f609bf2b0cc5db53146b4f100814586bd13665c11b43ef4d1affa682950fe07ca479673baff976cc3518a120995e09ebe9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bc9c52a82d73e6b7eb6c21523be018f1
SHA1e0603eccb1f3ee3ef03619b37600c91859803013
SHA25696933f48ed300bfd6425ea58ac266df2a84c20c26bbcb07bdc0aecfce3fad343
SHA51206a3e9e912e57cae270130e67efe849e51a6235fae30e7b302cdf48b8239562492a2678300ae0b4609f226c73902e05dd5305e569b7f7e109c5b4e65efa42c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57d4b77dd84edd8c944a74cce87890890
SHA17727c46a24bdc9318857c4c082e78331784720df
SHA256d110e21951fb282f0913c6e1ae3b27dcce8f39406c1b19d7bdc6218d4437df00
SHA512339fda85c867467d89be93f6cba110c66ddf6ced93449026e72c23585a0f0e72168f224e3a82894b4300939dce523fdde35a0f40edd6f8fab88b14c38c50e30d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cf4a1cd45c473bbe2bdf9f31112a7007
SHA1fa47cae1572ed6be27c564ab253de33339c3e460
SHA25613dbf2cf2349f7f7b0fec9819eacf08529d40be6b96bf7a9c77072186e9e4b83
SHA51216bf42e1e40d046781d1c903d08968528a3d3137528302ffa8d73d7e21dee8077e8e0593c0d5a432c239320aa43b92245f655811de7865b76711f5622d6d6a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD555d504ab7af0c02aeab8250c3c8d84d1
SHA14a6db2b2039ceee298c80ab765a1f54881cb9b8d
SHA2568de4c707ae8e4e519da886b5d057898721e4f65cd592fe9557d096a983fd0f60
SHA5120618dca1181bdaf4f1a54f40dcbed47a4d6e0dbd689e33b3f2681f04239971a271c8cf8fd687e0aae04bfd9851cba3e2b4bcf816e81693b9c4428aa9f3d5db68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD570542126c8a3296ef6f402206445c8cc
SHA143e0c17a91fe4b05c28b1390b98215472d18f507
SHA256f8757998072864335e3c1181fd9e1f50396f9ff5c19a4e97f49e426cc8cd7faf
SHA5127a3906aa77dfe04c4248ed86b641b1d8e7ecb66642ff22a5124a265a69e87581ef0caf075fd97046a0caf8b9e3cb4f2e317e665584005c313bd751a0ba47b8fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51560f507c1eda672809b0e4a388fee59
SHA179f525f7edf72dd58edb23f967df0116b173a6cc
SHA2567b29b3fa0a4deb3dabf2fea0edf45b90f814edbfade3b4a2e188d5d6d57b3c4a
SHA512088412cde74c5ace852b9237da8431834de00976a12b93fd5796e57ca3dd073cbef6ba90739f5fc7bb01016c6d6990ea9c8700c50ace652112c37fcec62b6eda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58574108424c1cd853e36bec0d662ddae
SHA1e391ee58af18a9ed132b70fc04d4c173402d780e
SHA2561a882be92098469886510b58cf99a0778f22f6188cd21aede0e66fee0e253b85
SHA51237e7c61df1c1ed592debf61d0b578126cd8a935a9321d25a33f536cb3164235d10a27c12ecb2822482dcd72ec2aab6d7173d9276b53ef8c96f03fedba0d82968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52a865de654069923795eba29f5b2a06c
SHA1df67df87d13dc6e63790e169f32386e0315c822c
SHA25612c12cd20f7d889175bad5d1cee123256531613bfc80a5a86711b21a252fb3a4
SHA512bb207109b67f9bbede9f334d03271d7f6835f4a496995e5efd3ef2d1b3dcc579a382aacf115d9f253917feeefc79c3732346360237f1b3cd238dedf1093ffabf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c5f1acd080f87c60ed19062579925afb
SHA1b4197dd938ccbb3fbcd79ee4ed5cae6e0c6c9a5f
SHA256aff38f83a67539d48b66e969fa25a835c9a7b0b9a2fb6c1b06d9fab01fb4a53e
SHA51293dd3ffe65edf788ac6668d2979c6c4eb3ac25e5c333d813faced8ac5e533bfc2a4338042346e21774771e1efe7a2acad447536bc6708c1d67b1256ad8dbf89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e18eb77a08c7b0e4e9375e93da073beb
SHA14c6d1fd0a24dcd70bdd447d8474b04e9b31d6a3d
SHA2563a148136fa617f2f883f9472cb91f826c2062dc6d4d508e2e91cb43caabaedce
SHA512d9cd2df0a5519110aa386cfbe9a966f4c723ff93c5b6bc90c8abf8ec1fbbb9c4808b18cad7eda4705c5e26e32330a04ed9cde3abfcc913e17b29b0bf0afe4506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cda3df993ab7e0c14fe36d67016940fe
SHA10aa3ce1a7c8802d172bbb4bb92268366861a90f4
SHA256fd66ede50cd458ee9c184c5964f76377e7adbd5785f83916b8534ce9b292ac7c
SHA512dab841cd096367b1bfa86fe798acf327bc36b06a882180a74eb065ce942109c15aad9ae20c7529b771b82b0be015ad799b23fa05a21ed4e44e16b79037c4502a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54581e49e3582f5e0c82eabaa0b7fb463
SHA1dfd45b45240e76086c252b69955dc11ca8a36f37
SHA2564f0b186e320f338214bd7e5ed085b932db28c2fcb99f35f6b479d230fb906943
SHA512976b07e9967fcff35829099eea11299037dffbf0b6421d9ceeb7df653908cbd440e661add7e6e6e51a44acb2318793b17232f5b24d4afeb6d702e12db1202cbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5636b49dbdc7cd2a2b4e51b971fd5332a
SHA18971146b368ebe424e6dc3c41f173694a5321961
SHA2562b9f020e0c485d1ca3c1961fbb5dc33e7f7b3605923a3ca41c7e326744c59844
SHA512efbe7e7bcba9c78f085e2fd5d6f77a13be5934277387d74f17460359a1528c18ebcebb00c4df73c7bcf77d602623d2e109e8db79a36cae6f81f016d82e3558b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fdad936c0c760394064a7a73f020e98d
SHA1c3c2a482f4132ddc7a2ce9231db0f2218367cead
SHA256cc23029f9432ab5eddb1504ee2d5fd5fa25da58109faf238b24de58e50ef64cb
SHA512d68975590c3a9fe0db5e9e2fa2bf3f97fb87861bc01f902c4cf92d654b7af718655a95d823067c6a266cebd6f49f640c8e53e0d44e4ccef918f6fd081d6e631e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c2f5c53a5cd7418d0ad8bb7c95649038
SHA190756d4c18ddbba9a7ec74b6007ef9cfee56f52e
SHA2564f230c4b3259e51f9b97d565c590bd0afc2ab5cbb59d7c2a8648941e97edfc35
SHA512a363b69dca33f8a8fa4909088d8dd67d2caec3412a2e554fbe551380930a72698b60155944c3ba5d66c3e541b634a2e92b5ec3b8237c03343f21ffa270bb0140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5268dcb4cd21506c878e534dbbfac2f07
SHA18984aa2f7536d103a48ae79864491ffa1c297488
SHA256965b2b84ec5d57ad5d9480c8746ffa3e5b11c4e8371f973d75d1d59ce38d4d26
SHA5122c6241ed09aaf52a999cf49cca44a81420353659a0bc0619301233810f950e5f1411aca797a2a66b3efaf5703a0d60ab4b8d180237e94a7ed414d52ffcc9f03b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a4eea062be192c37d751318de22fab68
SHA1c2d8d5fb18c3f07bb0b2634554ed3e541c632253
SHA2562233ea6e0a0683d56577214d4405aa9528eab08b77df47ab03186489ccbf6de6
SHA51294f8ff481a046f5e80b62f7599b99a70e1bf4c26ef35f93b0cc434b4ee342fb4477f881e6f7e243d5db3860b762e4292a193178724abdff79528a5d6e251f110
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b