Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 08:55
Static task
static1
Behavioral task
behavioral1
Sample
857e9c5334eb37743af86ab04a045ff8_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
857e9c5334eb37743af86ab04a045ff8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
857e9c5334eb37743af86ab04a045ff8_JaffaCakes118.html
-
Size
6KB
-
MD5
857e9c5334eb37743af86ab04a045ff8
-
SHA1
8d2bf19b148d4d14f1019b13c4d3c9590e41fe44
-
SHA256
908d7acbc2c9af85e9febbd92d7364aa489b0074cb411e5673954f37fa1d6444
-
SHA512
4c1a1c28ec251053a255b17d4d2697c6e904271a90719bd1398a46a92746a69e47d39fb2f2d88150e619c0c1b0dfdcafbdc347ad5353508f5ff85d1568364def
-
SSDEEP
96:uzVs+ux7cPLLY1k9o84d12ef7CSTUJoY/6/NcEZ7ru7f:csz7cPAYS/C4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429442011" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000004ea4a2be808c1144e9f60dc4efef4a33a8c2c0b0f74ca50197eb7c6da8a68a43000000000e8000000002000020000000e47a0695e68b3578788254938e6a6a45473e3609899ef5e93dbe975a53cdb3b420000000f54be365f09713a53ab364378c3b0931c4999326a892c7adbc41b68dcd6d824d40000000c503caa10ed3be9347823ad943baf237332bdb0cdc3e22b3529b0c85006961d8c83b0fbf632a0ba19740766bb69597b2c0ab848f58c8d757cbf076616179ee70 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00cc114303ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54001DA1-56F6-11EF-B6C3-72D3501DAA0F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2352 3048 iexplore.exe 31 PID 3048 wrote to memory of 2352 3048 iexplore.exe 31 PID 3048 wrote to memory of 2352 3048 iexplore.exe 31 PID 3048 wrote to memory of 2352 3048 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\857e9c5334eb37743af86ab04a045ff8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583c5c7d09a5fdc0fa1cdade9a85ce21c
SHA1b3e4227dfe07dda9ded1bf41854a9b950df129b7
SHA256a6d473b37dff1a784107879bec8aaf59683c568d59345f6b35c240b622847063
SHA5129dbfbf3941d16b81c062c9672cdf69bd4ba37ed70dc975cd19b0fba26414f9526f0409b156e24e5e408a510d512666cf56efb09568ffc32aeeaeddfc873be299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d533694a26b935f80da02b46b228560a
SHA1c1836931bc73b90f4fa291abc9c86fcc99880a02
SHA2567d0684fee6dfcf56da16d87700e29cb8fa03b08b702266a2ff623b0a9f6e1d56
SHA51223bf386b89bbcc31c72fb6697a685435f35930e9094068d52ca21382085b65c092ee13a84d131ba73e3c01f3ee6a9e57701a6ac097a6f4f07b2a435d680db749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a3a2d1373faac02cfa007a5895976ef
SHA1234d4ec2e98a5f8c8af31ac975a254400d4416af
SHA2563a3a2378ba0bf1582915595c5632fcf5ceca0e90725732dd0f427978a9968382
SHA51288022a0d95ea73036cf3e205b1067eec3d3d57803f867519fe967596769fa82bcdd5630d3767251e659df4a06f86273132b9b21eee12ee12661f2343c691b4ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58db0f08044b53d8e603de5965a8be9f2
SHA102e4b50abef2ad561c530a0484be85f6702f5b38
SHA256cca240e163c9db1d009d158b5c574df23e4d714f36606e1ae0b3b59f762434e6
SHA51277e0a556088c59d52c41455ab37f3c439d38b2fbc59371be9cdaaa294489d24add2c03e840be64c7344e7196c6b5e976a4ee200a51b9a9b76d577191be575aef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531fe1f76b2a573c3fad4833eddda24a1
SHA1b908e37f63eee3e3fce49f80fd61b8a79e1e2267
SHA256dbb20f9a520addc9a2c6f89be8b08889946d5f8b8593a6b31bea7f2d8df187ac
SHA512d7dc5a619eacee0eb36c2e2a4ef4d89347dc4088c69822abc3963c7f6e8b1768a67a7490dc401c9cf124ee2ec46cea491998a9075c055a7199fb01fc349e4e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533c10cdc9a54c0a79f535b6bb4dd0add
SHA1e342dcea767eec91e79ff0d9ed10c97339ce51cf
SHA256f2ddac2601fa0ef9f22a223724ecf618c87088861d189f1777e7991a31c874a9
SHA512f6d387a213b1ba91d016aa7e70edbd346876d158f3866c74bc34e378b7c5f2fd52eaccf0309800a23b1f933f7bb80318c2b7b793d4652a86257d317d0cc54fc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4c16055bf60aaf0e50a67b905431cb7
SHA1831c028a2adc619a680a392bb9f24829394cf0f4
SHA2560370f749e077e5f94fb2b37d03c375699ca0f66592424caca78b6c1b9cee61a9
SHA512fcf4acd61fae5193a11a0cecef835e991536b14662bba3e86f902f4980b8f491462ecbfef2f46e3c2adc47074dd871138df439ab92ca9311af0cd686426f1fae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9ae93d1f5802be97ce38bcef3d37d61
SHA133912f83e10d9af0e7642d983ce8e0ee2884109d
SHA256c4892d48133f604cb51e9e82d9ea219bed5dc5d385a2d40111747dae0f39baa7
SHA5128f2b9b7c56c4295912d23dbb0ebc91532b28de2c06e0059ceb992082de82e41020aae4d8250960d3a3323db1525ce93346902f8404cb64b8a2dc25baab4a9fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a5c5af44ebdd49148f19ebcea37af2e
SHA16464e2c87b19931fd34a5052ac899c1a857969d0
SHA256e0295090f61dd60cccea58f17462676792c8b8018e1d5525c2d0680a0a15cd6c
SHA512f7db53c2b0729638ab77993910959a86a99de5349f705e6815f9849a6026ad69cd613a16f1bbbac8916c9f0ad625e0581fffc436dd80abd04f2beb17986b2756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5574323ca842f4566d3d92703f22a56e0
SHA1a633f4a51fba4e6fec5862b43afe15bfe9000f26
SHA256c833175497940da81f597de71edf24d4ddc86475bab44338a63df7adf858f9e3
SHA512533560ec0c3c548511d6e56b3c6f14207b5146ecf0a94d9e7f67dbbdd7da76b20d62aa6d9d13ae7f0c51f7a3647d02a9a81aebeb0815e56cd8c7e78140e4d86e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5c37a024db8174f3bb95b2c4f409471
SHA1f8ed9c922e19b355a074a1d2f65c9000c59066ee
SHA2568eafe8fd90f2aadc320dde209602b4b6be6419d907ca89a2e936579c71204aff
SHA51268fdbd5d8e1fc75fcffa5cd8fa6d444212f1e09377d37842b4357c0f01c50eb433844abd1911c1af2656ef30007615f08dbad3ad2f869f69d302dc4cbd646f71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b01926000cddd30292b2f54367fd85c
SHA1f5fd63e1dbe3813f1de5fc4b496651e65347ee83
SHA2568f211b5340db0482daf6e09ec92a9cda4e4ba872348ca31e6c1ac7861117e06e
SHA5125ea08c8cee9667d02cc8a2e111bf8a2767b60d9446baed10a54fb16413c5a59600ebb7187a50f8469cb1b9dd3a1487f34c82c95c60ba575547a9a4b76019db75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd7f124935ab663043897e2ad1c0847f
SHA1a0d1cc2cf610a5bfa745ae9145f73ee6590c28ce
SHA2563e70cdf8b6d95296e647d35cb762e6b57fe926ead4cb09fd193f3c2aad2594b6
SHA51299f381b366d59503018512323f776be636797ac2cbe531162c7183336ae2cf7300ee36ccf697fbeb1fbf42e9389633097c6095941f154427e1ebca255ba1ba98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff6535a69873f577b274f68e5e39b2df
SHA1abee8a4be10930439396a650887f91deeb077419
SHA2564936372aba5afd554cac5477d7d6fbf1c0dfbb1911de44d4cd6105c51d543de1
SHA5121ab15bc4e41b925bb2b72822dbea9be21d1abead7b8da7cb0dffd68769051d4dc878be6fa94c1a0adf9f3e8c7c71811e3417a8a16a87ef15c95ff928c0a5af4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527c316d67c5644379435d022896e0025
SHA102708d7066e9097b82a96928ca74698916fffe50
SHA2567adafd1dbc814460f38890647e3022929a1f22a4debc781c704251366c63ffc0
SHA512bb7c483eb501202e59fb4a0d12bf6d3b5414f9b9daff38684c279dd5aff104238d635e694c5e9d7c395d9629c2d99fe6ad45bb1691710e847da82597036b402f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7fe6c21fae6b7e4a6e56e28cc6746ca
SHA107eecd3ee1b540a291531e3d62628f059953a98d
SHA2569002f99644b425f9bd9b4ccb6318a9c7be600ba45894e1f39bbdcf458a1ff289
SHA5126b01f5ffd53e638987f728f3c788b132ab0ad2036226f4e4691475bea0f74412cc7a6b279257a7f170ecce333e75ec61d0546aafc69af794622076f5d6fca0bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a4d2c8ea1368c2f56860a4afbcb8142
SHA116e3e762f9b2842114914b6ef6f9dcba2f048021
SHA256d4e8a3503a055693b0fce271aab7bb52342997090bf4cd6c336741225d482d1b
SHA512c1a1e287daafdec77568af7048258dcaf01b018877e2de9d73ec3edc67597e32bbb7d8c4588d51b67690cd3f961de5b36d4cf7c6826e8ea810b9d9180ba5f95e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b687356908c9b57793ddd095cc69ab83
SHA14880c1238595080841a05c8eba377f7e3ec9846c
SHA2564b3aa28f8c8ad15ad95ab82dd30147c8341071045115c52f39b4b0002731363b
SHA512f2ae48c1fffe9df094e803e860d6d6c595cb234a035964527d2075501caf36ac023145a1ff51152bc355a5a0c636fa360175131369081a8eb2e1f29e3c4a1746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5913131b0c0e76dd37583e1cdeb802119
SHA1fbc50aa10ead96ddc4118ba911be076b255bfe57
SHA2563d4331e1df842073a1c6d3d389e85fc495c767e33a0e8c8954038f3b1d127b01
SHA5124031336eec577a3dde28518bcfa78b070ad5a2e55cd3f00dadcc941a1af7f629df1827d8ef8e247595f672cf32aca4035596fa31998e7514ef95ed15267b1668
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b