Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 10:25
Static task
static1
Behavioral task
behavioral1
Sample
6f31e45b02d4d94490a7768b9fef0005_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6f31e45b02d4d94490a7768b9fef0005_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6f31e45b02d4d94490a7768b9fef0005_JaffaCakes118.html
-
Size
42KB
-
MD5
6f31e45b02d4d94490a7768b9fef0005
-
SHA1
87c2dd4cca848e96974ba0d9f83355dcdd9b09bf
-
SHA256
487cd6267cc5c00cb8a59aa4bf2a70ea16dd7531166bd2034d786648c3691aea
-
SHA512
fafb644d40376c02888e909ed8295e6dd353dc24cbe9d9e05d25133ca4289725505416d7152ff1b7dc5e70fc2776f54246568e153077bf660355959f92b3b29c
-
SSDEEP
768:Zcd9QZBC7mOdMMvpC5I9nC4FTUVEAIjZQROG3vXnlADpLIv5M4X3LWouKuGryY5Q:gQZBCCOd70IxCeTUVEAIjZQROG3vXlAh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 102281f57ddeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000f76f31256a5ef700eddd7d66ca59dae30621c16b0b9e2bb4bcc88be4e658d45d000000000e8000000002000020000000fc8e06778ca25e6899bce04928eb7c6d1bc0ac8cc0f242003a938157e8ad798e200000007a58e1b0bd09f3b84cb948ff3301a5cc6ad203f68b09ae556b89707e1b0a1034400000009d4a27e2743a63095ef66a33f7b0164eccd441c83b1f75dbc20ea7253ed2a9bbe7fce4fdc28dff5c71697e7f4ca00c4eff902ae0de48effdb3eec551c260c067 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428065381" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C2705B1-4A71-11EF-AB23-E297BF49BD91} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1984 3012 iexplore.exe 30 PID 3012 wrote to memory of 1984 3012 iexplore.exe 30 PID 3012 wrote to memory of 1984 3012 iexplore.exe 30 PID 3012 wrote to memory of 1984 3012 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f31e45b02d4d94490a7768b9fef0005_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a80c81bb1770f66ebe7ff35d87af297
SHA1b3c78a6244b93312379eef881db00f6da965565d
SHA256b25d8041381df93cf218c6ea28651b3c41ce998fd24dd062ea295128bddc9fed
SHA51234f1827e4f1f200078307397e0d7877992fb88672ef15cfd51d6ccebb198277ec9540536b3c6ac51cb14fd5832cd8e54f0bdf4919fcb4cb5a9793bf7e680e8cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6ddf5b49fe56741f1c64da970d7f3f3
SHA1baff759c36cdd531460bc2e0174a707c61834f3d
SHA256ab52b29d25252f443cd5746262d405c9a20d49ca58cb7b8bbddd20f4dce4dad4
SHA512d6f42eaa6699c3d8109b7a613eaac8c69ca53e205302254ad103ffb8212b1ee36164032f6a5198d85a8e37683779638ea1075b06b035f189fdbe42cbcfe8dcff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b03883c38d8ed2b4adf50af5040022a
SHA1c45fdc1a4157d5bb403958c9baf28d3738a21f68
SHA2569f7d584697cfcc9e5c28a67f38a870d7057bd49d3ae7838b7ffb6eb794b4fc62
SHA5128c8910f7fd19c32fe902fad1bb227cbbdf4add75ce646eda44627efd8617f94a959ff41fa97b40409345af0ac447f91e9137206d9afd170800eda41e67fe74ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5509325f6df9f4f56922c3d7b821587f0
SHA10320cb3bae0091560beb748b961c0343c9a02f01
SHA2560fbefb9dd6ca1d3a05d61410f32c44aa6aaff249eae9ab91e4180bd38462b35e
SHA5128d0d13d6a1c6884f61ee8a88b71371f3b6da1e40e0ed74d8c2fcef77408b53785ec628e655e03e43ac0971cd83fdb44954d3ecd4a28e75e1ef26b12f5300d9ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab79497c5135a34cd6bcc9162f503809
SHA1a807ae3068ab50355453d415e870b87cb0f75110
SHA2564644d1d29f4652165eba2d006491caae032ae9298b817bcf3c4520a80b187a50
SHA512277a759570301c736fcc10bc90c9e3b65eed3cc17b1d289e61d6f0f2b254616f520f15b7001419ec2878bd64bd7e4653d67fb74969f02c203774867b7a18ec56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5321eaa9cf5240a73d38708c11c3a643f
SHA17216089f48a7aae446696720eb1aa087e1d2c948
SHA256350f71b40ac53ca75bd1c9bbc4a7fc099a9abd6adfc12184d2e362d89b87746f
SHA512c741c19a9827f9651d94527399a6bb9a3c02d5b83a76c153a6b0ef0c0b6be0452555b996a52ffa36b441974f793f243422c172cc91de8e3c4d0a301875da11a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cbdcbebef8b285a62f8a46818d3f61d
SHA1a446395d702c90432a547189d50eab2235f64d06
SHA2562b49c3a0152c0ece682477bf9c3bf6d01860cb3ec3e6490be14fe9b84514c12b
SHA51221048f04aec5c5565414d638affa15abefee4dcaaafcc792071127a8a107ba44b5e33a27a173ed0749a6eb99d35705a186b691ea5f429ac48f811b8143edacc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5896a337bf610faf43f08673d27eb78c2
SHA1a6f5c2a4991fb9e393c0aff3b741688a28f462ea
SHA25677239a2ef59f295a5d18108627e6b2c21cf01378d66602c1e08ae1c4939dad23
SHA512683560c1d21085b8b2c09aae5cd43639e7372a2bed8efd4e6c1aefc81173046bdd440f914e06e33ec4d5d691da03951a52c48fc534621057fe7bc99c0cc02271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c864c540f9dc5b589684052680bf6719
SHA15ed336724d4bb3312aaef60b27c474a0029c4b68
SHA256e99ab90be8ca8879352fe9a7b17f8ea83745f9bc0a3dd4e15627ac3f09189a6e
SHA512ed7f3151416171b17e4e59a704d8ac1e4d4c3373d075766de42a7e29d8b571f6da6c667d979dc1d12545281118351bc3d7339e6865117ffc55010d334feb36f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d7cbc1877197da09dd89b42fd6e8f3b
SHA1b766035dd8950a247fc1089f9726918a66b6c243
SHA256bcba9ef21fc77aaaa44fc74f3dd28e19f12c4c01d041815135a32f0ca7953b69
SHA512212875a3bb178ad73e2adfdb8bf1bb4e1a7650fe6ea36013605262cbf8e6835b28cf00fd255bedb65a65e615135d19a9e5887486015fbcc1b3afd1fe88471286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d78a9e68cb093de90c2060604faffc2c
SHA1f980d1f5cc6842d14673c0e782afca993df926fb
SHA2569c65575ed5eaf7ca4c61d33900dc46e466e9de2c7dd041aec1541a70ee564b27
SHA51245b94313f0048aa8de714741dd9a2af368480222cee9c17e8cefc881aa43661f40ad2d289a66186024f722a6d18d4f0eef02dea07eb85ec26f141eb714c03bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d881b31ca7f5cb72365125662ec7f686
SHA1a990c25ef2889603fc39cf3f241a7d744dccd622
SHA25676296ab7fd2187b9bd1982f630de1a0e3ca89f443cefeb12d912a8f8f1e4c53c
SHA512bd0e05d87de1408fbb63a6febbf2e16eef57dfab1ddbf0d139542d7ed760262f86e6e61e3dc034f823bcbe403f9b34afb5a713e8c4b649a83059bd7de07811a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575516469edf9c8f10019367f1a25ee9c
SHA124062f0c4e05fd9b050fa8e34afe53e0c9ddee39
SHA256e8acbef2b5f768bb9f5b4b185dd9ff79fc9569fe9c6776f7d82db829338e3c69
SHA512c892cd08eef02d29c2df8b73209f5dd550df7849bd6050df2cb4b3c2e41b3d44810feb06cd93ec4e45df3526b50f3130bfd87e17e1dec610684081dc2d101277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591eb91357e6d4fad36a81699c09ab7d6
SHA1df66159077a4bc7b42af210a06dc7851a93713db
SHA256fa29f64bb32db1f3ab06894bcc0b0d13ec600becf09aaf32c7fe13fa9459a1e1
SHA51245855ef253b2cf0a01ae319fb9417246fd5175957cf213c02e36f9507b4cb91b2c454e6af0fbe49388b4e830ac816d0edd280e37960a0e7ab84cd8a4c6afd8bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9677eba018d7e38259b1200df3a200f
SHA1f43fc56d8a05d9fcacb521b58364f709b417e246
SHA256b85002a1c76f0c7cee69a9ff24748a0b855892fb54e4276f0317ff3cf67969ea
SHA51230b3b82612f7b43208312b2f13560b13943ef2db7c832be45440230ea01240d97dfe4d30274b0c3c5ea088e158c6fa7ae87041cd9b75f678cb3e34c3b1a5a204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535afa0ecba103005cb2d92571a9115e9
SHA16359aa7ede2c457dd86c46a83cf2cca86aeb6731
SHA25616c91c359126f29c6d8a47bd674fd914ed16ca206a2ed23c730567c41bfdac25
SHA5123e422488ef297c3b3670054b70c6895b73eb58f39df76ba60fd7fb88dd358dd71a6ffd50304364ed57ec78af842d9c27220ffcdf029ed6dc1d0e2e8601ea527f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d83fe89c90c11057f104d9ec5e756afe
SHA16fe7c7db0a231148597adb797b80a42c8012d8b1
SHA256c3cdfdb5b90af038186c1cc50a884416b8c5f138882f57cd5ac8c465b384262e
SHA512d7a847166d1b8a82daeb098656f3ced609a5f841d44ed04757270d727c7ce1d344afa2f0ff494dfb7a37756bbd633c84ca467e31c92d5ada9cda9987db28f146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b162f965dea271d934d2198162903586
SHA1928b89cb87c2403dec441578d89ec8898a00921a
SHA2561d21ec0effdcf27223168b7f04da6d0ad37eaa88dd2844509b1b45b59a59ff1e
SHA512fbaaf30b87b63c23266d40444729e7ac42c95fa292fe48219ce5df98d155c02033df3b601f16b84f89097952f6e4a1b5937e97ad916aedbd1d957bc6679a928d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5058bf9544c35ff4144b0b7502fb45ed2
SHA106474f7680a554689b4814125b639b8bab686711
SHA2560b4ae1bd109df5e45d505d7faabf4dff6c5b2c97deae4c3b57c81cd9facd1908
SHA5125f2699e97fe54aa2ed13ea2f4242d45f0c0451bc03cdd2721b8071df860d318ad9b428cbd64d20c17fbfe1a79209fe4cd94f891bf053b9f71a0245ccea7243b9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b