Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
6f5f094585e75726891f785954cee44d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6f5f094585e75726891f785954cee44d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6f5f094585e75726891f785954cee44d_JaffaCakes118.html
-
Size
55KB
-
MD5
6f5f094585e75726891f785954cee44d
-
SHA1
740ac2e348e9d25cf215a514c99da7dd23674a9c
-
SHA256
1c34fb06223bf476ad2c72a3b00524998dec03f2b1ba0d4dabd3e2f33241230b
-
SHA512
f6a6edd3f355c2b35ebf9175d4d1bbcd20c8c4c7f672010c0c67d15b42321782f728ecbcafab01e051349e7d21fcf0ac5e8afd729b37cf226000dd039eec552e
-
SSDEEP
1536:gQZBCCOdq0IxC9Z1EVK7dUCJfmTxSOV7Nzt7VvvZueI7YTJsxqCpyB6FNNxldxpN:gk2c0Ix8EVK7dUCJfmTxSOV7Nzt7Vvvu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b071b74d87deda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428069392" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000064e37c1b563af4370bb47abfc6056952f6c275f0087267354783016e53490b18000000000e800000000200002000000041b08152520883e6adab377541a41edd7f0a9ecf1b4d107c6c3c6570eed9c2c0200000009dc23dddf9469cb42c5dc1078d49e3a28ebd4af9e2fab0f4e8f0c8bc9132aec240000000309642f57a29e96d2379d8bf3c2edf71befcadce2c7033a308791cb23ab696d2495c01e7c26c0c8d89b00e515b25724eb9f5c08fd85b0c525a87ad353f228ed4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{72BF7431-4A7A-11EF-A2BE-5E235017FF15} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1328 iexplore.exe 1328 iexplore.exe 588 IEXPLORE.EXE 588 IEXPLORE.EXE 588 IEXPLORE.EXE 588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1328 wrote to memory of 588 1328 iexplore.exe 30 PID 1328 wrote to memory of 588 1328 iexplore.exe 30 PID 1328 wrote to memory of 588 1328 iexplore.exe 30 PID 1328 wrote to memory of 588 1328 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f5f094585e75726891f785954cee44d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5387e980a2b98d6f4b7ad92abf024b830
SHA1608448d208aa1f51a24d3690ff7f0cc79247ec5b
SHA256336cc322bf89578c46faad2df299b4a8dc20f96b4f77ae39ee54d2c2017190df
SHA512ea087706d8d11d8bb45136e219b134207b206c289b4fc26e11377fd12d23a7522a4bc02a2627e6268b89213bb52aa33a5b3030a460e9414195f0139789407208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a9e80107a6f399efaf12646cc373126
SHA183eb896d3bfeeed19768fdbf7c6bcc2766d14865
SHA256f2a3e1b42d1d7f5bf879675f5453a80b2fe0a7a8b70af374b91af77e3189d0da
SHA512283b6127b1feed60204e0f5454c4f2085e4fd23373a382a9f5726b9f280c1d03eeccfd3eeceda65e0fd60c8438101354174a51e56b15bebcac0d427dfa175ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508bfccecfc5f5e9d1615df65f4058c60
SHA1e206e9b5e1712c94205bcd1fa5e1ef116a71df2d
SHA256759aba4ee219747cbd1582f038f83b5615556ca8ebac4759d1738f6e02b558ce
SHA512aba09e094df2564ac05453a6afc8fad5a05062b9fd71f4a71e98ead8e7aff0c1caa0ae2afe8050f5e02424ae07595615d3575705feaeb40bc1e5a77b47e8bfd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c627fc9402044332e5aba030eaa1e292
SHA19c8dc07bf62777fabd8f874d28786593d35e99bd
SHA2569b279a364e331c09c1e6b0364c0f50ffea0d5dc47f5b96b82b4e9ce027290e73
SHA5121d94e958f78ef4a0f3355d003dae50a46de32accdaf0cfe347d47c3e20ad8850d3996ff1de375ba4a96cc285a17ba35c3643a7d3640d432af75175ea7b0c7f3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d9c725ff322e931f3a205a7c03ba4ba
SHA1ca08f94123c779af4d14dc6f19497d94d8528bda
SHA256e5d9b714307c804b0261298113b09a83aa297b671ebe92f95cb95499c17cda1f
SHA512d0c6c2e61c7da5f4626020e55f7fc363686323286d832336d53ad44ac0701e3054d55e6d94885af44180eb7d6861673a0381bea9df3206861b6a7dc523db8068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5770ed5877e7d9cb4b1f35f4a5f731e
SHA103c3a1a9595575819fc071ca08161a84fbfb8830
SHA256bffade6a364b09236982d4f8d70299aa48408699b3e57983c538743c113c78c0
SHA5123a9f27e0911fec43917d13aa559f5eb758683f5ffc382441c7d563eb08054cdb184ed0e95dbc5048627142099def15c94f192416e6ae5efe6ba25b364f659d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54316e2c10655f72f51646922a70472be
SHA1e42a3c780769ab9ba9ba56e18fe6042ee9f703d0
SHA256615fc41bcedc593b27d1675505d4fad3e58cf3d6d0c3545ea6507cf585321dcf
SHA51232cb628d86cd37322448f0ee70caded1f08f0f000e734efd0843eb63b46db3b17e31bbdd72d30b52e876320d3954047003b87a762a5d804b74cdadf4877ff3bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5fe018b065d1bc7a93b1f72c5b04608
SHA106293055eaffabdb2e0fb136a6df1d9f6de2eb8e
SHA256141869028a37c97d1efbb5747196cd9786ce4efa9ee16aa8832210c58015a781
SHA512ad181b25dd8d5e962e079654720ba9f7724a1589ea192b0acffbd56804ce5721260b15d8174b028fb31bf5abaf43d9b5c077f3238c2d25356ac031274323c422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acd1fe8863ada1a82fbb7386d9a4d2be
SHA1e1a6cc6a00e72c6147e70f9dac483f756e1f4711
SHA2560e052326dd5017015a8ead34e3b9a8562928cf223d37f23e4de6be234af72d52
SHA512cc5b6927acc3bf0a6404ff6c7faf3a65a3647d6b494a032c1f7bf7e747407382bcfdcd9e1b78cee35460aec53239b5af11a547af9d4f3435c31551c7f23d098c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541aafd5019fb0fbb2a9cf263b5f5ea4c
SHA192459f70ba7066c23ae07116f3f0f0cda78c413f
SHA256a4fc881a0aba716ee0ad3e65a4fbe02cb61f41d14ea5d81132c6e4ed54c2dc05
SHA512af9a178d5102a0774733a87d19ccd0c85f49c69da9d4a21b555cfce5c2e92389377fcec09a377fa66600eaeb1eaeefe5a959cabade4df95e6c29c0d65f83b36d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b03a77a2e5544199d683100816da523c
SHA109abcb17c05008f0ea221c2bd35856e1e134236f
SHA2562d8165fd0a84a95ea4dae5e19f055cff02f731be0a71139c4173c2abc8020f72
SHA512143b0dbbff5ad46f3373f4bf081e086ea69586083446e3f5eb054307ab3f80c3d6053eccee7f6fc028c3279090f81b695eec8aeed5f2c0caac734ac2d02b2a49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e8defbdc34a95bbd8e6114e320cc647
SHA1da7c198c814d962d71bac53b1df6450292ccc527
SHA256eb64aa6f5f82c004f2d0ba139e989fb9ed8118cc290d7d21580d84abb9c76349
SHA51225824237155af02cfe5340e8af89161e1098fe1c2b77f517249dfba78902b369ede9f71e3322c3baea016b5c0723ae25d8ef9eccebdb6462709b301e634e4625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50327d4dcfef6f910595e5f55c7b4f4ec
SHA1381ce1fa5e54e9fa493d9b78d1a1c3b642bcb2ce
SHA256bbae3274915f2f201685fdec66c915a43afb9bc27577c3a564c724c4fcc335c0
SHA5120076ea88025aca942d1e251d16475c9be7d55383be1b86906a434fdc4af637234957d5d33430c1355332ac4bef622a36a5d0c8be7222413db380c099b6c780b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5085b7f26f0d1b5e237dd922aea67a80f
SHA1573f27fce912ef36e25481c2de4c6c47ce0ea6f0
SHA2564e3aeacec482bb35e417eaf69fe21cda3758beb5acb05c42502fa591a1e375cd
SHA51221f4ce75a54e349e89c132470b554c4543bdde6f17c69d3b9e5d1a001ed1bc12323a6b20af28af5040f6915fbcd60c5a582b66ee595eaedd93e7016afdf11bb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f92fa4019ff52920a64f9c74ebc5091a
SHA145fd29f15b4a9372db0e31548a28661bbab03178
SHA2563a2993ee83e4e3d878d41c12e3ad5e2ef27711904023e1559bb1920aec1a1ae1
SHA51272882c64f70d20440b16181ac7a029cec3068881e7238039a42f033ce96c2daa1f933ed2df80c398055fe99487ddd19c008620c4ae98189841842534fb6cfc88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6b2d65e07c1eb61d8b747021cafd1cd
SHA124cf40b21633d83c048a358df0cf56fb42a47614
SHA256d6a71cc4f713d953293e8bad386070312a2845016d9d7a1c1c2c8740c874ab2f
SHA5122c1d6998a5bbf7add616433bfedb572b1ebe76a7f4d055cc736b78156884dc374ef3ea6714471d17273a27798fc5a4b1c702bf7370555431be29c0fb3c89a49a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548249fa25481153aa4b0fdf494006032
SHA1415b63746d23d7be9b47e797f3a9915f0861c2b9
SHA256a975c142577d2578580792080a7ce75fd434ccf318652ad22ae7db88bc5b57f7
SHA512e9fb219ef9638e192481a03aa2d6cc68ce718c178895be45d9fba34a8eb44ade9d485962d03b636bae0d67e318d98541d54ecce5fb99a74a9cb6e0075b4e5d58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd0438b0b12146db64ac20384282d9bf
SHA142aaed7b226355dae5614f856ae6ee15b9a364a4
SHA256b36edcc3146eed2e9451f7e3406353b7f5d29f40c7a761e6467bdaa0a5767863
SHA51218059618e43214b70a44a5d7dbff1fed564052d4091fab24d621442b085ce696869a82e7c10e22f6e9ee6da2216c1f2d6578427679ca867d42b8040a1c09fe09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e0c8f0a3a163c0f21e550d36e24f26b
SHA1252620802417e8a60fea0ce47424c078d0dd07ea
SHA256829c4db17f9115b267dd30c063b87f623fef74d6549b03279a51305c56723cba
SHA51223b5c5d64bf0b19b5d120e8c54d8e6c8bc6dff218b4a1ba9ffa1e56924d7d329810a9292c9d1533c4f00c3fcb2311fc8dd74120dc3b11280684752edc6f5ca21
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b