Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 04:59
Static task
static1
Behavioral task
behavioral1
Sample
831fe6087d943cee81762532bd37b46c_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
831fe6087d943cee81762532bd37b46c_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
831fe6087d943cee81762532bd37b46c_JaffaCakes118.html
-
Size
21KB
-
MD5
831fe6087d943cee81762532bd37b46c
-
SHA1
f3a8ffa37a855edf72589a45fc7a6780163e3b27
-
SHA256
94aef649da8e1847d93872e41111ab3c5012d17bd0b17c59de1f7d71743429c3
-
SHA512
78a2fc482667e62759acf4b5fd289b2b0bd55e9bc05544c3946173805339e88c0b0daf8dd40c44a784a69ff9bfd17426e50e66ac2b6e66b8447461a54cc34a5f
-
SSDEEP
192:SIGEyNRa+tR3iXz5Wmofz6nyePw3yMFKIFaEl5+FVIFpN2yhBAsaShN9GzC4DrOu:SIGxYyiXz5Wm5HD+rh3G24Yi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c920000000002000000000010660000000100002000000018ca36818077b787534a5275377013547f3a9a8a20cf4e9e3b64c09b7ae17138000000000e8000000002000020000000d54bd3ec0663bf2e60e2d25f935a1d0d0f481c0c54eb6e8cfbdd242375b48d292000000011efca676badacd2d7a28b68c6dcb99811d15bce358557fcb0eaa11b083756d3400000003306119cdecc0687cb9c40c2541f33a62434051e76eee61986216684ced57fe5cf773c86c21dfbb34c550b4592d3eda83a017cdc471158397b664f71beea753c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428736650" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{081368E1-508C-11EF-A17A-428A07572FD0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c99bdc98e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2672 2000 iexplore.exe 30 PID 2000 wrote to memory of 2672 2000 iexplore.exe 30 PID 2000 wrote to memory of 2672 2000 iexplore.exe 30 PID 2000 wrote to memory of 2672 2000 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\831fe6087d943cee81762532bd37b46c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2ccc5d329df66b199fc4c805ab9110d
SHA11591e9f0532ba01689d98c24667c7dd98ef25b1e
SHA256e995c8289c27e3501279295754cbd7f59a6452f0ac79cb9c512f5bfac8d0d312
SHA5126e358ddf6102e2250b049f259bf48f62325f43d5dfbc6d3bec7d59f50a24f2c0e1801704344cb7ccd4395f31f5ec645aeeb821df3a63f12cd94b902db20fa839
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575fbbd227bde37d3e8bcadcf8e3c777f
SHA16e4b211b89b9821cc7908f44dd1cb92e1e26d717
SHA2560c8c11938a94710da8ac19370f176694b7a216c06be909f2b6da3c1325ccd559
SHA51203a6c42da961fff7efa8ee3f9b0cef157bd3dd3028da37a960bbd73ea4dde1ce0d02eda6a3bd965e3be17de7b1c4a0c85380a3482349de314957690a55c6adcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505fa0209aa097853e4555904a1b0c602
SHA172b156292766bf5036beb06a4f6cb325aeab0c4f
SHA25617052b39f3f203125348e2b230257a3d74b803bdfef472d8d7d08d3715391925
SHA5127d999ff3ad9a75acd0ea2aa3c6ebc1140fed08709e57fcd239dc805527bdd9b95b06c9d5eeaa6624acede8cb1d13dea0684b61760d7dc6722f943d1756e108c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4017f39174555fdde3d289535f8136a
SHA16412a8f75842a584f36c090da817b1f50509c52e
SHA2568a00eeb1400e6c6c6a615df9c3287e566c1f56339ba1837b13825fb5d7ad6b31
SHA512f205a314e75db66766a91a8badf5b7d5313e502c10b6a7ddce448e3e7cc8acf8120c04f853cb5742c46c9d412534a3bc005830e3c5b8d4feb9739e58fec11bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc7731f37b636b5c2efcb8b759a74e6e
SHA1d35c5f1ec2874d36dfa3d96bd201c28db34d330e
SHA2567f2a493f70d4dac54d1573475f14e139bf1685d84602e47c38e82c29a2b8cc10
SHA51283bd7799935c8140c264a78f589eabc66974aeebb579876b485a4ca326ebde60c52667f7fef354f7fe25229cce0162bc346467f6d24f526740909adfa4eca69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b015cceee8efd815e09ce6f472afe9af
SHA18164dfd5397f4ba2c9b014fd90d75aa510d52ac4
SHA2562c542f79ba736f080c22a7f64f4153e6d720aed53c4893687635f48b5a2247d7
SHA512fe43899e5ba234d04005d4c8791f359c0543e563e85f035e7182a022ac22679a201682331036f4c7fd4e1508b4cf1982bea2e8dbcb40817a55379e13c32d81d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea5a74adce69a64e348270b4817ba56
SHA19d7c8a1e0c7f5d7dc7ce6bb623e3bff200309346
SHA256d81bfa3b7f093b13eeaf4dd4c35ab1dce882044da9dd2abf7762c73c96ed916e
SHA512ccd5a64e69d96b5f0d4e0b9ccbd829058f6845134bf13725e682dfa25dd00f2c11a6a1c6bb88829fbb5674a54196315d3ccd389da074dbaa95fa38f42fa579bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57598227427f68ed3cadd9ce5e690114e
SHA19adc37534522b88bbde37c4dbf6c53ae48801097
SHA256e3cdf376dcb6d6c0fc94c2648551e0669670dfd99edc82c0df7fc3dd090b270d
SHA512a6e01fe0523abe66be3f5876956a9b28b48d9e53055d24feb3241440992a24261233082fc2f79f09735cf8a358db3f3c2400f8143c83e49a21be81903335d72f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e06a0581aa57d22e9e8b674f3908c28
SHA138bca9a000170b4f6462a89b53ea430b98cbde70
SHA256a8f6f142e2f791962682173fd29c7af9f93894f32bde14ef8b67b26e1e866d01
SHA51262d7c3ebd8ebd35aee414f4edf4f17ef88d224b9cd68abc0ec4570b39475aeb166eff94a86ed024f11957776f1300d02a3423a093867ac56f27b46705dbe26b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df8bf27d7c3618977c70260593eae333
SHA1f68e710706ec0a22302ceacb0e88c0b457ec2562
SHA25653878ff619fa3f077feeaa2657c27f8460129cbe8b61259391b91de7876e5e72
SHA512a3ca56b227619c8917bdd996c8906ee3e04069fa0f5506fa54ca93ee694aebad7327520dde4adf3529fa0c87f46dc7cc22d23d21214f28f8ff2b8b37529e9d66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b12f67b57ee100d942bba7821c91007
SHA16245a094bdf9e5752a7d8755ebfa915d34017a93
SHA256a3a9346f852c632d612a2f8535372dc82a658096cdafde7bb98fc4a64812a57b
SHA512b6fdca137f24d263210d854120f48e9a34f74debe319d2955ebbe0dfa301cc5174df4db11704bc7d3fc2b9adfe3767031d712fb8100ccda71ba23b8faebd7f54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb2a8bbad858cfe864a13dfc44cdc6be
SHA17fe5e07ebcb20bf0a92a0fe7266178d39ed1830f
SHA256ff0524acc04f60db58cf945f23c20cd5ab153ab4acae14bb5353fe6f9661452a
SHA512b5bd19876749087260ac38996eb8c08452a0b9b1fdab4d2010e69ffefdc2e8049d373bd3f46bf83ad8bf819a5ddba476e23e060be2a431e7e2a4d5c51af7096d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572c728661288476319d00a8cb56094be
SHA17b20509f7dd0a72066e04a8bff280e475fec2d4b
SHA25654ab6e76d1fbaf89703e1db46161d664cae4be145784176a6bfbe432708c466e
SHA512ff0fb69777a7e575d3bd2fda09d80fd4c6536ca13055cfcfe4836f306736c4073c3485ada68b4e634cbc53c1ce8e62d15e851bea269d7ea1ed7a967f336a4870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a118ad86cd5ed71206496460bfb649d
SHA1dbe6b56e8d3b549fba67f4109acfd6cec02e7419
SHA256c13f8a45899a277109e62743da8046be85ac00d88b234cb753158d0626a5a721
SHA512b564c06776f024fa7d84731aeddcd59eef2664d798958a43ce7edef51df9a687a3633ee8b652087bf4f9db8e1fceb53986a427aaac3b96aec4e57ce824db2893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5babe99d5da0e96301026b8ae1f76f5f7
SHA138917e5e07e61bef73625d0584e3b6c1d305a47a
SHA25623014a4f52c6901b93b43b203c71e44c6e7c7644a8c5c8e05888701975c3ae51
SHA512b34c573ffc623a510b7b7baccda44a08ce937a782c66808724a7ab29b5e2205b0b50058ff5f7a89f1896aa897b6ba98f6e074769b26f7215aafd74528c253c0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af0de6cb52d9dcbc9bf93da512d28821
SHA17e340cf7a96e03893369b1330e0a766470217e22
SHA25639d666e534645d3bf6d4074aa52e1ef9fef3e2536924df7bcaf65b6ea02d514b
SHA5127e61aa83621546a7fe1cbe24cfddce7058bb629bffc8f3a04fa50992f1dd730409a144df99fed8d1e5d8f347b06b9110d73cb35c6c8cda592452a6daa2cc1c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bce517d47ba352c76e6daa593f8f821
SHA11cac2be127101d42cce7e72100bc73355a4cc45d
SHA256e8a5c15e2ac83eaeb002c72f56024f33ccdbaca5bcab8bb769407d829b2e2cb9
SHA512dc28b196e93dd401b9665d3acb33a2c68314121efdc8fec8a8e333f7635018ca92add31f1c0d6a3f730a44d9fc6d9480ccda9ac13e4aa07f724d5e1518a324c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e863dfa28fa5a9455af82773422d114
SHA117ecda9e7114a1d879f469ed38b47da9233a2df4
SHA256d7752c5c5a009407384317eb90a3bce352c3c80448ba423b9461c686dca54e10
SHA512f2bee27d8249cdb3db45e800d13ffbe438cc18ae09f2631ca223dc30ae4db6416fd98aad2619af28ff7ad93fd21a1bf34dd16d54f9196566b7bfa3c88d3b37ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524d95777f82cda5184376e5d2576a1d2
SHA18493af6ced9c20dc5bdaf0649cd974f5aaf8f6e5
SHA2566fc056c7d43a256c49997e02337c776bb4ab82af6fafbe652270115650c42fa9
SHA512b151960758c62f65af013284bbecad967d0fd0230f9b4df46f10549ef13c522a98e824668571bd2a01b5b2238b1fc695d6245165af976ce5902dd13b9983e450
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b