Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 01:01
Static task
static1
Behavioral task
behavioral1
Sample
843bda184c7a5905203e483762a12e37_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
843bda184c7a5905203e483762a12e37_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
843bda184c7a5905203e483762a12e37_JaffaCakes118.html
-
Size
53KB
-
MD5
843bda184c7a5905203e483762a12e37
-
SHA1
20ff3a7d4f5b9d2e21fcb5b1dd2d66d77f8f7fd1
-
SHA256
904698788691d6a7aed677ccac36f65106e57d28ba681cf67cb8d25bc4518d61
-
SHA512
5ef2f9d4083a77dc12eb713a90ff6ba981f93d5bf0a77f573fa5c2eff8aea1d1b26e8dee468b747d3f944f36a40335e9f5d4f93ee3ed130bcc94e4d16bbc8851
-
SSDEEP
1536:CkgUiIakTqGivi+PyUhrunlYz63Nj+q5VyvR0w2AzTICbbloA/t9M/dNwIUEDmDQ:CkgUiIakTqGivi+PyUhrunlYz63Nj+q5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0A04A001-56B4-11EF-A3CD-E6140BA5C80C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000003785628efa144ff5e84bf3c413629610a906dccdaac926ea201801baac7190cf000000000e8000000002000020000000f32615821808894fdd7b5bb0e713cefa68bff5be9626ff2c8bae734bdb528bfa20000000d23edc30dda7751c386975dac42321846942f5ac5f108b93b8e48ac32c8ae9ab400000004e054060568e96d8c6a32f1ad56d0adbac06d02d837f8a5220a58a5d190b64f050358e03a9d86c896a15f20efbf99c1e3417ef8cd33c01d323ee0c6368ef2e89 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 907107e2c0eada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429413543" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2720 iexplore.exe 2720 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2740 2720 iexplore.exe 30 PID 2720 wrote to memory of 2740 2720 iexplore.exe 30 PID 2720 wrote to memory of 2740 2720 iexplore.exe 30 PID 2720 wrote to memory of 2740 2720 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\843bda184c7a5905203e483762a12e37_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5135d959e55aba90365a048817669202a
SHA18c8fbd07758bcfd74d4fa894e3d28ccf91d64106
SHA2566ee29bb6b808be3bcc781a039a63268b3bca89f1c10f0f967d060d8e5bf8669d
SHA512694832986a0e7e9e9bcbdbcaa5204739d10d3c7439d4b37e7ceeef44738ab89bcfd4b798098310d7517f56f1886344a85b8780afb7f284eb1c51a268e0e0c1fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c32e40696235e3d087a0b91da12001e
SHA135f70cf0e9445db593eadbec1c0a5b853234c1ea
SHA256a413ae969dca46af7b2ccb8f20eb7c8a0476f75bf5298eaf124e3557dd917e39
SHA5121ed05392755f734db201f0d0ef1268b170bfe0a32ad5079767579d8efe6a8e5623594880b3e7afc4917e95e87d8efa85c7f8b952e03b538f14f16fb724a9fed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba5984af52102789b65c1ae9a0bb0da3
SHA1eec3c0381fdeb76d08e5bda1c0227994a0346073
SHA2567415a3cf6e13097ec2bb028e5933b4dbf95cf9306899cf0d081bb39b3888d764
SHA5123a34104349d612032b3e3487ad434af911f92a95114214ca01ffe86a340bef3a7d9dbe2661a58e9dd4e7061b9c42b5c181f6721e2b22413934af815f977fb1cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b66ded52370dd2b5f87b1eec9db7f05b
SHA1954cbdd0f94e93beaf517360eb6de639e5a7a29c
SHA256f3f95ac9e69bce35cc8b7b544b2a4ad04092e4dbabe1460cf6fa38fdd014eb34
SHA51248ad578d2f19179068cb8e23ae858cf37da2342cda173e6806aaa8eb85c92f4cd70b6540c4d8c7bd5c387cdeeeae8e6e58129260310d9ed88b08a39da73a310b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599e1ccd6a0592adf6fb1c072c2f749fb
SHA13a63bffeb65f906614e918893e9fe10fa59b1ced
SHA256d5dd4d5bf2b80af7276b11fac900816f5154fc5d129342b3b0f22e4c4204a5ed
SHA51217e5afcec3eb0d2f0bd7c2957f708d015bdae018db0c6b7aa708d7a4cac0f490d7907bc698189d7e5a09c8491ab99d32283573db53a5eb493e839f351cee0a36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58232bd16fe27385793b0e19047bc695d
SHA1b69c262daed4957d55e30ea1e25bdf564a150608
SHA2563fc4539025abe60825219caa677ee1c5b00ca786c5ccb64f710b1c004ced8803
SHA5120e597408939e8cbe428d0ccbd7633718f9e8535274f1f7ce8c08ad1d8ba3ce16caf474cd0a4df0fb4cd65b553da6d9180c29643dfb3a05513f67e226792e5202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a156432a032c2f133708aff2c182d6c1
SHA14bec3106e34039bed446bf29b2eb8063df98087b
SHA256f9262992d6c978ae1afd869915b7f8002d7e5c22a4f7881b1ef84222479d2af1
SHA512cddcd28355d87c254e5c1a8698d9304b265bd13de4d7435aa2a7d02edb96ba7b90d7b91c67f8b2335690bb3a397b196025fc0e1c5168c0ef40c6deca6db07479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d664dd3705c9590f2dd6d1bf693ec17e
SHA151f857b08974ee54a0bbe224faf797f98b24f3af
SHA256224f73a84d0d63aec54ed27ca3ccf7a5c9bc54dc99b2bdf5bfc4571be531de94
SHA5125e7afbb76436b7b7d3f372cacfa25abebe118622e72c0fce4ef9f596a0af5444f7cfdc5de48b2015094e8a05b4bcff74d27e6fbf556346c08d14b48a2e4c43c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aee6418a069f77ff6417af6b1c073777
SHA1f46c2433a739748589ea9f362093090df5c8d073
SHA2569b5de67a30c12fcf9123acbd3fd86d1825ebe027ac209d78b6b89278175cc57f
SHA512241536cebf7cae6cff6786918e127f074ea9926375fce78d13dd6a2fe70daa102da7d9de8926b1ba39f31bbb337fe11ad197e51b72031717942d15354a6508b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5436dc3438ac1a567c812ccdb365060a5
SHA16a171d933345fee17fa382f23029c0235a26780e
SHA25600ec37811e71de58cba1ec0ba4ad3100c3a6b318bde03339a620787ccd718c53
SHA51232f76da7d9978f0fadffb7b7c70bf043a3bcef55cbab865c05c4a311d98bff7bd33c13ead0a6f84b4955e28f21465c340cae57fc4bd70aa1214c57af5a36dd21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562091e0f01e09856001d9f94ee366074
SHA176ae79fe6afa34f0e25336f9953ccd07afbf319b
SHA256ea417f6d9f8ff61533268b258430654e67636f6821faf23f8d9cbf60f811c873
SHA512f49a9a92fd42d49e6cfd18a42c502e212fbe0ee75c6bb4d506a6e820289986af35805885595d1d15e20c83b1629fff09635d4e5b53da3ae77128d7faa34d92b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5422d903402549af14f3850d84208ecd0
SHA199347da6f0574d8c0effcfefd06cdbb264f0fdd1
SHA256a80d9447f102850b62c38bce5f1ba19c6e0f3400985b01c74f45c8cacc4e7eee
SHA5129daf81acb90fd71d7f0118aa3edda84dd332913a82a39070fc4272345cd05f5a558fb6ad953668b9a077e5a9e1dde084019e85c72ed204050e1813cf7dc80e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59203522aae6ee90abdfd27e056ec4fe4
SHA1a1504c2a1c451e7738084e8670749fb3ece262ac
SHA2568f08396a65458a8fc96792dfe3308bf0a33fdcf5ff300ab95dfa86926da70cf0
SHA512f17c014002cdfca5686f66972c42084c276c10d2902eecefdc962284f506c294f2be938d4462ea941daeaa23d66d69246e3fbd45e34fbc8bc74cb4dfd905801e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ff3573b5bb9e4720136f980a5661bc9
SHA1adbcb21a4a8e27f05c93fe18382cdae6f8a3eb41
SHA25642156b275e1bbb5b98133d8ff3fbf9f38ec9c8f2a7974c535671ee3a65b5823e
SHA5124863813af74b1d12793e01c8bfe18006559c3e8ff115bb8445508f76b8529df3fa3b0d2f3bd7acef06b4df4a969ba7bcffe6dc607b59c9e6a5d6394db1f7d3c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de707d3acbee4e487b18b218307fcbae
SHA12d8edb3ec32b592446eac5b51a435c9acce25063
SHA2560dc22f6e288d17e3dadb323a9960850ae20c7de20bdb5d7d80916a00d32c97a4
SHA512e9313859563a20a3d8dfcabf6ec97e0cb6b0a983457a708bc75f3bc750b6a71a7b233f11fd60f4d4dcaa84e42e680b0d0d26154cee9186417a62616b146d571e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4cba0d7da252ce8e297fda8ac8561a5
SHA1698739eb7a274141f2061e59398d22b171f0e443
SHA2564196d3f304016685913e4fd041bb5ab86327e725e87aca4b4f30c17ef7629c9c
SHA51218f3ae35514f44a096fdcc0798c8e75070a75847178646aca7ab2208995ca5a784daf88a6a2be33d47a4ec930d049da3cc8bf4c6760e17932386821de4eff751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517cde4c95e5b5d4adfa2941834f3031a
SHA1a6efcafbf6da29fbaeea0f76594af9f16f6bee74
SHA256fc0fd8cf00c36d8c4aa01b6cd6e2b7fb35ccd05094f227a1602862bf38e5635c
SHA512fadc7d9d462664b9fe25f8c8435abbff77b26f4bfa3a5d1b5d7d8fdde448467dcea136f360c1aa8b8f095f85976b60fa947e556c996b8d824fad6b1bebc00a80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582ba099ac5fbcd6a11dfcead10448e32
SHA151a2b04d2a909d37d1d81cceac473e7d2ab3b88a
SHA25688083e1200dc851b3ff55398966d80bf7837bc58191f4acf791378620e64ead6
SHA512f5183e5ad420469fe57453cc1a5f9e0b132bef68fa8ad4617ccebe891ed7056fe96f470465f8d20eb5cc8db29424deccac1f6415516ecb1785257324fef2eadc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b