Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 00:06
Static task
static1
Behavioral task
behavioral1
Sample
71d09c3b95631be6b36d733048317344_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
71d09c3b95631be6b36d733048317344_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
71d09c3b95631be6b36d733048317344_JaffaCakes118.html
-
Size
8KB
-
MD5
71d09c3b95631be6b36d733048317344
-
SHA1
43e959c7e0c43cbcbd20718d2bcfd59d9a099e4c
-
SHA256
263b2790fe23e7ad18e1f7ce4852634f48711525d380d2e86c10ebba1423783b
-
SHA512
a5e0f0c1ff9afe8693d0fe6d0a92c6fd40fd56b72610268f2f8808db04ff03a4049442ef0801dd1fd5f61b8304db67c5673140f2bfa1bd568a4edcc7739ac01d
-
SSDEEP
192:/fNS+9Ib2dk1+qrVWocs3QDroGvQzBoizWJTvQuiOolq:D1qrVWo33yJvWBlgvnBo8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E1150451-4AE2-11EF-81BB-526249468C57} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 803831b6efdeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000368a2b58da08d0cf97ca1df958429f8412295e12c731b2966c70552b3d6013f2000000000e80000000020000200000005ee7014baa0986a2d387439ba18396ce738e49536ca13a88284809d1d63abad820000000a5d0dd7864afdb5332ed225c2e8f538e2e764414815d1d706006e55c72515dac4000000070cf63a2c275a49b7e9603e24968163ca292859c6a6fd4b51b2e314a45ae280de1e6bb4b49bd69aeba966c78c4f26ebc79e72de95a3bbef79f9c42f5cbc8d3be iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000362f06059b0d437310e14cc196ca035b65746a5eabb6961f64773d6c1f666784000000000e8000000002000020000000396344a1aa01e9ddbca6b206fab5dda37fca0c04972426f580765041cb237aec90000000932a87a71b7115f2a8e8c7aaf21651667522b31a704c8fe348d1c6b070a4f308ff0c6261c5bda63e86f8a0f364ca25133f07640ea4d5f88491ff567656ec897f98f06f76ddce330b11a7639a012bdcfe9182ed3e4b2bb763c93455f6c33a4e9539db792016c2f7f3fe0fd47b473e2b9ddef046b39a29ef7db15b47bfa76a7671e0660937a8b6eee9fa0bbf5357920fad40000000b7b82c6e4418429729978d20a23eb529a1d4f1ad8bca86eb9ae5eb825c410ec5ef9a75b94a4372d7b6a4168388f890fca3b4207a39c7e0a8609f548bed5544b4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428114246" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2588 2488 iexplore.exe 29 PID 2488 wrote to memory of 2588 2488 iexplore.exe 29 PID 2488 wrote to memory of 2588 2488 iexplore.exe 29 PID 2488 wrote to memory of 2588 2488 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\71d09c3b95631be6b36d733048317344_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe3c11963acce94efb7838ab873514dd
SHA146557927b2798d29fdd21822ffc433fc1a764712
SHA2566bd8795e4f691da3def77a74ec07a3989e80e09774b2e5674ef018300dd454a1
SHA512746d9e266277631fa7ee6c0a61ff68abbfdca874ffa7deadae85c5887d151e48bcd1a643bf451f263e1f66c338a4338c3f07a8cf57cf23ce3fb8f296fcdf8ad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbd55dec209b373183b5cc08894662f7
SHA153b35d6fcb326532adeccec7be228e87cb7e661f
SHA25676bce336aa4696bab42d6bb855e1ff9e9011c2ca8b154c0787e0ce729fc47aa8
SHA512329639ab49197e2d1ee892ea3aadb4b79182745a8f39a653df03337edbd5efcf89f96ed2672f71909b61169614a251f311495591f957d73669a37cdc7ef4064f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b0fb071deb7f9f6d144acc836a4f5f5
SHA1e2fc8560038292b453215f1cb262205718dc900c
SHA2561b21f04b6d5b2023ea146f779b3d0f6aa856bb0fcbbad0ee348aa9144992efe4
SHA512a6e7e75f6f0d3596cdb180d7ae88106ed2b8df8a88baa5dca301c96863b8c9410be0548919029ffb94c1b4c42eb9ea2c6453cd9ff0c04b8dda85f6a49f828cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d13719e9f4426d9ba3e8b207906b4634
SHA11298ef0bace87f9e7f4d636e722ff7833fdb8f0a
SHA256dd7483b94c7f56734c8235c56df1f8c6fcbbad8dce7fe4bd70d073d156595224
SHA512d100908fb466a6e6e8a822ffe3032e5eb2131b47e1c6f22c5e54c4cb658422844b2b88bda387b79e4ff067a81a1f0855d15afb5786992753a744405177ccaab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b5f6fc392e8c12336cebd418b23359c
SHA19c3345d91e8bb303cb212b4a8152d3d425b5df79
SHA256355050ca32f885b04316003726269e6c65e3bc952e76d80fae23cd6cbc8f9a56
SHA512cafdfc0437acc6ec46c46d86eb6b319a5fca6476a413724a71996a052ecca7d665bbc09bed4759be555183ebf5e6eb55c0fda219cad60d57dacea85cfbc99a58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f6bed7b025e7c366295dd325f7917de
SHA1c8d683ff6509e4baf7e0ab3bb63fff46543e7954
SHA256db1a274b5e461c4f59f83a1c00ef1a707292cbccf9b970cf2f371224b78a86cc
SHA512c17d804fd7b334dc7d37994fce72d68c1c4a2b35c6f4d347b7f10de5d03b8139eaf7aa266565d0f131cb5fae7a41df99b5514cf6206ab766db4f1cf4ce0abf91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b28d0428734c8c5f07ad67c30293442d
SHA1ef3b9ed23b61d721c5463a0a8af5d50c78b396df
SHA2561936399927dda17060803dd7c18f54df23571eab84e811dc43fb94ba788be4c4
SHA512671527e20a52863f0b12625949cf22fecb1a58315c83a3caf4f6394ec6c31113dffc45a937b2c1178de8eb7556b975fc507095767f069fe99a3c93492c5e8c55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b6fae0472165e5d7441107891415e3b
SHA137426034eca9e9e0e94f3e4e52557a7868a2bc6d
SHA256d94d5fe1adfd57e62b237058d4932991b978b7d2fce5c9b0e452116bd5613aa1
SHA512fed5e5c65f18ca8bb999dd8b1cb94f0de5abce25ca7ad0c0a2382edd2e7e793b900e22f55a0ef81bba08c75496c0e7a7a0ff2853c3fdc1a4e7efe550ad82cd96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bed9ec78616dd61f455d3cf93ecd8b8
SHA16571b5fe53d552cf3d7ce4b4d703cab8c0f18bba
SHA2565aac6b497cdc0fd5516dce08de4732c9c2702b0d814ab8887331f8cd20976746
SHA512086217576024e589f9e566daea65b0f1d0af35d82ce171a5b16262e9655084a54ec4cff99d78f34b18fa78478b6cce84f2777663d6b92a4ffd4ebb4d364a6704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526ec8cba768765912ea09b2f49e92af0
SHA1744ed7803442ebe87692c874bd2e50eef6845e83
SHA25601cdde5328df7ee0a172500e45c723c9f6e025b3ca85423a190b20f60cf9c15a
SHA5127d73f25b32c124e970462a654b6db795276fc5790f1fb08533df34d9e6a7d9e832e788bd8b026abc1c826c918e33c2a7ae2e010a71ac2c7fe797d85b8c9946e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5cc4a941a08beb73b49105da64d5038
SHA11eadeca3ccc2d564764dcb521677d48d36f28a0d
SHA2565227741a0d5c50a34b061e9b5bc5c6319599d2793567f6cc0233626ee8ecdb21
SHA512a05acac839ed5a7e80c46f5299a9e7737df125e46196f8e59dbd10b0374942c98a11d2fe26469a6e713cfde6a5ba3ed7c61c8b9591cdcfa678fb3534891484d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2629fed190fdfbb46185a9320de9445
SHA130a92f19470480ae76311c32996537fbcdfade39
SHA256e89a9cfecfcb15bfbf7297ff3cb81d999998a198e7232698fec1d47ad58f9d7b
SHA51260e5717d718b9da516820fae56c13150745b8f17aa92ca8b8e71445b451f0f51bf28bc68490bf0b9fa33d0d0ef4dfdde627bba1a291b7657701984b54dd23c0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5603053343b17574fe005fdbb4a266d1c
SHA1e65807f9615c02edd054c24ce5d8895da1fae2a0
SHA256efa8b71ef0025cb4787a0c293a3a67e588173116d464f83556785231a4b8dda0
SHA512da7783a8163b0bcb59de386c9e8b76b276d8d8062c7302fc28d897a39b0c073e2ae18918bbe18082af0b11fb9d642e360ecfee12f83b4a3f11c1e691c346d9bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fc27f997d233915a1b5dc96fb021f08
SHA159ffcdf2c308d1920475439b7e0a47ad49ef194b
SHA256ce28603727788e8bbc3afd5ea7e795e36bde50fd101972c3287957527b1a1ec4
SHA512482b94798e3e75c575ce99e7c6a3916bf6cc783fd08f51b99466cf351a3bae67c3776e5caf9f02ca49e3ca101e006c7781281265ae373bbef8badd4d5493220a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576527cfd8452d735df240f8878db128d
SHA1de00c4bb273205348f69416677dee64f89b633a3
SHA256d5fb8a4906e4f2b622ace65692b153b6560e533e760670067af2200b3dd4bf76
SHA512cf56d3c289208b0aeef4a3f5f1db64c0a5fc34c189b9cfc7bbff61c58a4d737fbd76b6bb1509da349707ead01fa98b36d05fcab4f38fa5344c73e5bb781ebdb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570ae1ae117637842fcf1828ecc3bffa5
SHA153d569f1d30cf3742d70d5f0d817e747996c1458
SHA2563f98c955a1df4ba22bd328fa8bf0a3b2ca2b5a5c76c4a65f4871cea334bb85e1
SHA512aabaf8e41b01865b6113b4572804a55a27e328f0c1570a857c6518970e7cd7ff139973a2b60dca077676d6eae0416be3123b56416f1fd7cd966d90c17086341d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db635d72c35960fc209a6a55e742d9e1
SHA17a0baa6d5e1d2196dd4556be4b2c6e9e6740fb85
SHA256274fc9ff582295848d9ef5552a2ba46bbb5166f040485213c88f2f91dc56845b
SHA51294b6116407c4173b7ab4ae9c2d10904901e93a9bc4255c330fe0d9bc38d68e82703ba617d0b78f112a38c65b461766bf8831e8fa185b627fb5ae237dcabf80eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52561d865bc4fa2ac312059c4629fdf8a
SHA1d2b14343962cb0c805161b0fd2a6d5cfa4262fc8
SHA256494cc8b3d31a8732f4b0bb1422e926199fb8a40a15b96ed32c3db44f4d82bd4d
SHA5128c52323aefda4e0f2fb90cb591f4e423ef2127880ae9b642fca0c8363fc9c0b247b11585ec1f57eecd1315e1d680d6dbc288021b5adc991f95fb216568b79e20
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b