Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 01:01
Static task
static1
Behavioral task
behavioral1
Sample
826ebcbeada7326320fa068e154818af_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
826ebcbeada7326320fa068e154818af_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
826ebcbeada7326320fa068e154818af_JaffaCakes118.html
-
Size
55KB
-
MD5
826ebcbeada7326320fa068e154818af
-
SHA1
3e8e3df9c84d618452a9fef84c751fff774643c4
-
SHA256
a86f241b4feba6c81710b7ea8eb0bd9785db39b3472baaf059bcacc9254e638c
-
SHA512
311296be3bf8c9db58a1a8991434f402ea460f7c2b85fbd4aac419ac73c001b0e281512525ad7ee47668850a1212c0440037860d15fdb061ff8a889c8c1f7573
-
SSDEEP
768:iuCauJumYwbc9sAJ/nUba4OD2nC4mvGfeNPemcfJm/0mJm40FHFKdxNU9lQHRRmi:QZJumlosAdUba0C3vGIRljc40cRmi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0db04a977e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428722388" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000e0252e156513caec9a1f53f6861b5375d9877b1acc29162d9b0a2accb79af0c2000000000e80000000020000200000007215fe211053c4caea0e517d5e690e2a2c772081e23a31f1d5d2b2c5e2c481f7200000008eaefd63d8c530f9caa0c8e0428f55de84c90f5b1aee85afd263c96f61d4381d40000000588930c71fcd4234c327dd48d5fce254fe7cd266882b9358efef6ac38a105b803f93ecb9544991129b2b13e052563635937d8021aa94b204c7c87eeaea94f471 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D2B76321-506A-11EF-BDB6-FE3EAF6E2A14} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3008 iexplore.exe 3008 iexplore.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2564 3008 iexplore.exe 30 PID 3008 wrote to memory of 2564 3008 iexplore.exe 30 PID 3008 wrote to memory of 2564 3008 iexplore.exe 30 PID 3008 wrote to memory of 2564 3008 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\826ebcbeada7326320fa068e154818af_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c737158b43c6e45fef54932e20dc959c
SHA13ba9bdd1b0d94e2f4e89d2da4d0afc7945499cf8
SHA256dc75c6f819fd0adc919b04e61eb8595a4059ab6614aa3172bb6a5e6fa219434a
SHA5120959df7852b7402099b0700ad342f4d2bbbc455abb29fdedc9de20e8556a0ba81ca4a8447d44ad9c8c539786666bc22c5ea431cddeaa702361f10b6edf7874db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4a92df167e70e915d1e1a09a755b3cd
SHA1fd0e0c00dc699448510a39c322c9b61b68ec8e6a
SHA2568df316650f667f07cdaa8a1d88bb178624319d96fc81c739fcacb2da6e6962c2
SHA5125b06ccf0a4dbb25989f687fc78854f431066f6de7c92facfad5f9df8b0c4f7106bb78327214650f5cfb9837cf6c5dac78dcadacd9e61aed1bcce9aa144632bcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6abf13a50596b7d63d242437d00da28
SHA18aa71a4de92d8e864026578d83b90b4d5fbfa805
SHA2567ac91821a583b77c6526e1de4f6790b6304040fe28353cd2ddddc620cb8899c4
SHA512df7bc3b2a6c14d6d9fc54da8e0930d9f8f8ced17b983f1968bcb6fd393722df7d60fb1d33bf6b611f07ec7331c60ad007110d3839959e3d91f66c04e05310a71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5604f90e2ecc9942937a619892b6b8cfa
SHA11e183a56501c5152c3cd643f8a14c159682ac8a0
SHA256130b9c24eee696508bc3d2a627b0f87634426c84455d4e03093dad6cb833a417
SHA5129ba2d6b45579e0f816af32d023ad2706ffc5b4b2ee62b20dbac36ea350154a6c28c9cdb701357d6a825c8612cfced4b952713fc591262242cc9c509935b5e87d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c65e124d1a8b27644a29d67a0ad86cd6
SHA1eb3e5457a9e2a48f2fd9f587e828f1f05e418358
SHA256a91346f040be51851747b4afb1e5007b204ea7e57fcca6558d1cd306fa2e3442
SHA51204c944759f540f1471257d73e435e55d39f8ab2040aaac8556facde3b6cc7d46fdf1a784ac76ba75f47bca298797662f74a756b3b6eb874f6c410a69b3505714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ea5f4627371663ab1331cc350bc44b8
SHA18fd6ba29f811f8b3ddfb885281017ca100e7ab3b
SHA256827468268dd0193f48063106c357a5dedb9e6a19c0d22946e8849bdfa38f4156
SHA512994b15b96ece51103ec2ebc0f79d38862cc3a9cd3cf7f0cfb2b999fc272227b1e10ac4e9cdacfa378c945df62ce1b3644c989c2411a9999d086193e36a3d6fb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad787431ab6ab34f1da46a919a0f8916
SHA115edfaa14762cf4e54a47718c824225a70bb3845
SHA2568c76d579f8303bc9a258bb85372128dc7eb9a5b07bff836b2c70100826788216
SHA512012de4460cde83898b7112a9727124a1475ffe743c067cf7ab777eccc71c80624bcc7b82886525899834bf921e22b32b8553dccf57f6b847243112e793ba79c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2586c978fe8351653afadc0263b0cc
SHA1274b6851a3bc07f288f6b99c0eac82cc5151caba
SHA2565dff16136123646cd2ab7f672f04fa067207709231a329233679f3ff76df0cc5
SHA5126f04b6f535cc5577e61202b4e862d49612bd38ad4f7910888717167ac0575142d1b62441574fc9a00db8d34ce1db652e7848d956f272533d7e35142dd6e0d8b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9b98e5827e56e76d0b198b0cb701eee
SHA11cccb0617f3379a7a3cb4fe66b2187e35607ce24
SHA2568624e0479e34fb38a01bf1d8763c19c69eb05b644f9813680103ca1c45ae4411
SHA512be23174830c89a4afe4ff19d58949e6963aff2e46c663f5dbf9cac4362f343e758d0eba55fcf38844053b0528f1fa5dae45ad4aa42c4b09aaf6d9df2bd051fd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f41147cde34d48f042899a7194919f62
SHA1ae9b4e61a36ff6de0189ef57b3d4b12e02d4c457
SHA256d432aadcff00d8cf1131d1d9189a1032a495c02a55c5e5cd6a740dd641a5caef
SHA5129221c40ba36576428291b72634f160849f1aca567a96797703ca554002ef74360c961f520e6ceec8afa6b4d95ca2a22ab7cfd1ca1d247e5ab745622810dd1dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0aabc31993723b84b1ad67c58a8f1c3
SHA1420067dfb899fd1dbf3839d513f6ccddd32a9099
SHA256a02c674124d6c2c83ac6b253abca05bec651d82246368dd41fda8b956f7dfd1a
SHA512a76eae6af206c54be4e2e96d376bc438635fea5ed3b61348355aaf003a77729d0e958349193da120824ad529366bbbd320a841812b72df1d8594d95d3f07718d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cccf88bbc71759b55413c8b15d5789b4
SHA115de63abaea9d43e97fbe3bfd55b98eab366fe62
SHA256be07162a6276f79168b877e73fe118b4b0cb07fe05f275e5541e947d05395e08
SHA512eae35a8fc5e87a883e3e7e3579f2a0c293ad3fe28574a1b81dbb86188e8cbf40fd0eea4e3782a0111998d57bafb5b213121629a3ec34bb72c19bc9316ad0a0b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a59db0eb4e4d87f0cad2a2c32829549
SHA19426d8bb7f3004a01eee8bdc05ad0a1affb7502f
SHA256e398ce3d8187522f2d11efdfde84acbec7a45a40410ab5f974434246741237bc
SHA512ca7584848a474fef1f16033f967f82f979d18277d45aba3440fc39baf48a176e4a9d414f3fe2af4104ee61e0e3d30f18acb81715bf6e235fa7fbecb905f13367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58242c02f33378f2fb0b485f4029fee8e
SHA1a7e86f6cb9143ee03842b0792121bf8c24d94030
SHA256c4945012642ef9f3ff5d96e62a7fe6d29a291954ebc7744d9b67c7d5cd9bb6f4
SHA512b64fdb0565656931b6fd929645f9e3c5c0172d7a02b7fc60387b029f7f0d0294d3b481ccacb38632a59dbcdd6152ffedcea58ee0290637f439fdd237746ee222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f018c6353f4429b0f646e901cd1e493
SHA1c7cb268fb96e363a6aa83576d5ffdac3f0c027e1
SHA2567789d9f096c3c806ee2dc3a822e682c2dcf7192a688ad2492a81f27f2a73b15f
SHA5123cce824008bb432052a6a91ca08b00209b034da7b2cdf019084871cf22c0fb04a9dec6c6d398a9cb2492411cd2e8ebba6d337617f1ce755710bdac82142d4302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ead1fe8c106c027111c54e8d2a111603
SHA1aaffa2b2338560e22a763558206ad7140bb33539
SHA2562fa845e0e6cb2261f132e0deb25d97b140ebaa4d4bf0bfde568787314a1d221a
SHA5129c913396d18f353e861e85c7d9d36e45e6d3a405edabc037df2e7543a26b71008bc391e66c98602623d422fb888c51401477dacc1d3f21159535c2c509a5365b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ea9f7c1d79397a1b130bddb9b20e175
SHA16cb62c3dc5ba544aa7e7be9d2216d2e64a0d7050
SHA25608a0da046183b228c8379289553167cef51e34c57904f6ccfa4280b5c767ef11
SHA5127ffdfb0d4f22d897d0ceb02872292b4d900d279b7b2152318f367fde328d44a3e97a0cff47b8558a4b46384276450410d5618e320b1a1d91fa63cecaab09541b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59489dfd4150cc66a03b32d8d46e6b7cc
SHA1f6060ee550e5d13c894d03844275ecb8f6064695
SHA256f04c4d8f386f7ffb90227973b0be169ff4d9792f4ea1d61cb2f25b975c16f4ce
SHA512f94bef59055d862427cba4cef39cb1a556609d12fb8af990582635832b11083bdb165e50f7f617327aed8d512745278ac2e8a5ed513c6e580deaa24de43a3cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b68013bf315d73dfd2319e922b3b6b5
SHA130e8457d5ab9b640ff37f1f562a23d05d270d31b
SHA256948884b1831e5dae894235349d3a8ce296d76c4dddff19c93790e5ee0ec19a45
SHA512a4ff8a43ebb1aa2364bf49dd45bce70a98e0f924b355e10b43eea04c3c4ef32400315b3c6c70c0f0a8af49a6e459e437dc14947ec8f484857e0a46cf419eed94
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b