Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
757cda63605a80fa62347d60b3164b96_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
757cda63605a80fa62347d60b3164b96_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
757cda63605a80fa62347d60b3164b96_JaffaCakes118.html
-
Size
2KB
-
MD5
757cda63605a80fa62347d60b3164b96
-
SHA1
c53f1d376f2021748dec7add546e33d2abaee4df
-
SHA256
ff215e961ccff45b764e680738e13b7ea24750dfc4bb908b503fd94ec8c36cb5
-
SHA512
f785ed6b9ad54c1d2caa756243d7f5c31e361717d0f93a6ee6be50deca85759c1f60e5aeed6812cdce3352fac8187ba6d801307a604a40456ec1afe125dde0a9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 004f0155fddfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000054922a323e1522652978a03ecf627e451ccb670d42f342091723a0514a118fe2000000000e80000000020000200000006960e54706e03037ac0807a170bfdeb4b229f7018c77580e53ff91708f76764c20000000ccd5fc29fd622146a94d3fea36a211a67672d03c966399f7677a81854b271bde4000000057bc15ec7a6ca6da4f3158c02499211a9a7352302b835dbc34bfee2d46315478b2763c1d13228bb2664744daa7138166201ba4892467b381769342664db4b089 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428230046" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7FF59D61-4BF0-11EF-B7ED-52723B22090D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2304 iexplore.exe 2304 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2716 2304 iexplore.exe 31 PID 2304 wrote to memory of 2716 2304 iexplore.exe 31 PID 2304 wrote to memory of 2716 2304 iexplore.exe 31 PID 2304 wrote to memory of 2716 2304 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\757cda63605a80fa62347d60b3164b96_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2304 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5479a212f47a00131d16f08527d47321a
SHA1b49f10d81e47fdeaab571ab9d01c9b91d606859d
SHA256ec5fd6f0f587b774c225e745b95915c2462dce26177296e6a4a15424b8b8ea8c
SHA51287753ec436fcdef57f04afa75119f455045f592714e6d8d0e6f5fcbc369c6dfeedf11eb24d12b19625772110a60d25ae28986b4280c9270d7d3c7e1d559a5460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53965de7e7ec036ef3810b3d527ef965e
SHA1bb429816cba9003943a18c3ec0475e782b22b940
SHA256aae46a2f44f07f1b43ad005d8e4491ca33893fd0ea69943d7abd13cc4848ae2e
SHA5128a5700b6d45a499e8a8fc633bd241f79e6338cdebec7d162823b58cd66def3be1ec90021f74cd3cceb8a27a0f16bc9f821a545455aa05331dce97414c6d199c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58199b498944bf27c0a4d24a458e5014d
SHA13627892594e0d401d627d2d9ae89dd29d3e92dd9
SHA2564d2af86a5c7c253a84a398e1f106c8ff8c938196e1cd2861660573eccc93036d
SHA512be99baf61cb30652a93a21da09d0e3cb68c51edac6244c5be811f3a2c5c1c9829f682aa4e4cc2e2f5d7f63ebf4acd785e98ddaf41747bc9db632af4b1baa42a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c24ac521ea8aa6bccc600229453f5c
SHA16896d931c225585e761e1f5f17c6acae84d20854
SHA256961755aa3e942aec389ff466f6906b4bf028704ee33d594f513a0a9d4a08d355
SHA5120ba2eb982d0a83302a81331a48498fe146184924d92ee31c71b92934b2dac7312f68b5e356ca69f9908464c8d99205656d97668b1d41a1815b61a3497723a74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5846cdb414664b938876334b77548576b
SHA17736df54ae0d754d5ae504c0c14f0a42b2f8ec9d
SHA25685f356ed9407f8b7572fd624983898ccb13cc7e2658fdc16bf3b887ac099ff46
SHA5125aa27cbf0c2a25763cd424124f836a1ccfab5a898c5c9da3f7a2474368241c04f2b7f218866e9df18643343900775d9c5855b4ac37067be7194da43dac49c3c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0f291ae7763c199122d5589064ec331
SHA1e59004eb87562a70685407d30135c057f75a5bf1
SHA2566e7657369db39677b1c3b077c463974a9a2183b0937c8dd337e562690d9c3155
SHA512f9612868d5ddd07a5392d257713add28d23937aeb18720229e2417abe105f94de19a801713acbd838955a4531c91e2890223004a90865ddde44311ee5e8a2e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a67db90c4e9e37010d40aabbeadc97c4
SHA1b833d17fc61e7ae758985691407fef2b931ffe5b
SHA256bc925a346493ee9a0c99f1e5536a57135b22939610143fa1477f092a9a842f49
SHA512b067b9289c9f1247313b5edc5b72a5596d7f591890bd1b68dd9dbe3d81eb995847e1605075f5beb7e85dfc9d4510fed305bab6fd0ad3d1b1f07eb21427bd572a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b62db99da569cf1738d9e2ab2071bb
SHA147611e95d456a9c4f694c11b3cffc76589c0df73
SHA256e625d2f68f52b50babb2722fdc993445e01c09afe37f37931cdde55ae7cdd17d
SHA5121cba6139a4dccbe2a24f98bfec4387b29b2afdcc9123aa8602c4b56ac294d1bffdc97d998c9381fb2a65a20dee7f0dfc7e534b83f7b944948039fe57b60f653d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c314fd5d8a32585055a780f55585577
SHA19aa1532927d59178fc2800ba2b7bb30d5cc526e4
SHA256c94002bd040edc31160bb52fa06e364fc158d061de8c5eea47e4749d9ffad737
SHA512c7f73d90eb4519ac7fa9a1766ed6b355d4d90f24a34986a1f6ad3d4cee2d0e61f8c794f3c640ca4d767781a21fb5ca1ff7adccc406efcdc6121f28c4a3fcd7d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5fc739c5555d9914be218cabe9ff244
SHA1b91873f67e8fae4519df45d3c6ab11ef4887f25e
SHA25627c5f0e238c475cdf22752a7a61908c3b79a47f817736888e9b2f46f5a282ace
SHA5125ab30e32d427345f1fb49b4fabb56a14074f0f0a30ce9900efc8c479b9d9e163d1482c31913cb785b456a1278240ed05c3391f1cbb5cab43892a9a8c730fcab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d1f4e76056b5a60d51237d09bddc1a2
SHA191c7ff216827a0552e52799d4e6f746377f64ba1
SHA256ae1f80c20eb3e609a26f796fdd4b664e7585d4f0f9c2802b98ba8c3ab7f0cc81
SHA512ec691ad20b3e734c17166d286b8b8efea11d4e9f0a871ea75741178b26c3af640feebc5ebfaeb5324b1adc1b1e104a8863267484e400924e5031b2bd152d986f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec81b846cc0e372320cb524adaf6523d
SHA10a36d64d5c66f32e92800b5862a7a0b197791eb2
SHA25687dc71e8503441c55ae568234e67bacfcc6f2237a0731b587ec025dc74f959c0
SHA512c86856707a6bb03c4469c92c748c0bd99f7e5e1791f5ceabcd98b41affad82162c133ca90ec60f1ceecc6da19c9a1c706cb1d06545d7aaac8f0dfba5615c89dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4c4411a61b29990f3e7d1be6a358c04
SHA17043af9f3a03ab199fa68f3ac2a75969ac01ec39
SHA2561210c2f08a1961d6a2d6cbac05b04c400cccc342ec6497fb86326c79e8c019a3
SHA51224d6fcce6cfa01fd6cf7a166517009f25fb6b77592603b0922e89d184881ac0c8ec7672ab09ad84574fa04693dd9b7e1a07daa7ac439f9fbe5e62c4cd4ee5ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e6051777c0e93eb27fe6a087e8e3c43
SHA17a7fc7594204abc104c5cf21492de6d6e455120b
SHA256fb5bacb1415b00d2c2512cea2ba231d6275d3bf772c0d237654e9a84eff86ea2
SHA5127a14d58f28570585fc3bf2922033c539109ea643af6147d3edb352932336748b154193c87338aaef8b60868b04e0731893e28b2e40f7007bde92d43364b3a407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a6099792cc94ff7066a3b95c02f4b55
SHA129cf34116d3b3c18ab95383a4f306564639939a2
SHA25608400d550aebe43bbe1177865ad9be7c1ce287a5bfd15f7ae5a621dba6049182
SHA512bbf1393e466c51432f923e0203d340229c78692880af92284841d37904e4a682915904de5d66d24a9cac43ee8a9b2b9d3e08c4152187b051ff83b5300d88bba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5080f0b97fff065439d3da1f7c39fc906
SHA1949205c1ecb18698c218ddcb3e5f4e789c8f28aa
SHA25615b7b02815f9a8573dfabe79eca8d4a4da978dc3535b0ecf9aa35c0a0eba031c
SHA512e46866312a62e8e36db341272b01fa049c361cf3cfcf82083d5bc3d39ee4a2e284980601e35d2d9dd9bb0be6f51b8178fe0e50b76c5ea41141f8f6e09a4fb48e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ad1bb99ed42d67e59d18b0057a53b96
SHA12bdb15bee7ca15273c1184743018d177ac1c29f2
SHA2561104cb4af3da85f7f1804a14d7595a6b5412dc2e959ba84a47f5bd7a6d2bcd82
SHA512bef6279d8085b310d78b63e656bc1f62748f224d62e318023e3c3777c1230e00c92dee581730765778961b4fddfd85980428dfe4743c7144d3342ef42abfe9f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f14beeec4afc2187b15cc384dac31c7d
SHA1e42e8c8ea5367b7094b2d8d068bcfc7bbc10dbd7
SHA2560d75e94c82cbeac317e091bb524f6e291c776763bed46ab9e6cf3d837a7b0907
SHA5122a3ba3e338cd84bde737853a0962e929f4bea5fd0949134b325b4c0c6ac9df28b48602a5c27bcd2ece04e7722a5aad25ef992bb57970f7f286e3de1cdce5f91b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9274bd7832e582a0fff00dbfe6f5154
SHA110015d2b0d054dc38d3fedb8be19964b5fc63a5b
SHA2567a796a452b12e859d89355c60cac95157b48a101f9fcd05ebf9ab8059bbc964c
SHA512830c5b80c1aa79be01c8242de70fcb5981480051f322a9ed87421df221588cdc75da339c43129f7c8c856fc9e0c24f5b8674c5237aca2b37bc74039f70b2bfd7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M7GT0RRO\bOtLUfprt[1].js
Filesize33KB
MD554285d7f26ed4bc84ba79113426dcecb
SHA117dc89efec5df34a280459ffc0e27cb8467045ab
SHA256b0754afe500a24201f740ed9c023d64483ca9183fa6361d759bb329462d25344
SHA51288afabcad8dbb0f49cdea27c64783ec98ece295f139d50029d524950a5b40a7971f033529f7b60e5acdef5f0576bdcf107fa733bf439cc76693b654ebdd9a8df
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b