Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
a0558047a17f76e7da59d109d705f409_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a0558047a17f76e7da59d109d705f409_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a0558047a17f76e7da59d109d705f409_JaffaCakes118.html
-
Size
2KB
-
MD5
a0558047a17f76e7da59d109d705f409
-
SHA1
b20b5efae46a4afaa4af793a5d4fd8f9df75e880
-
SHA256
6817752991248afe1f856d1e90304b457ee89961a970a287b4fa7151e66c8709
-
SHA512
eba0e75493adbe48fee72c98296c80596875a67315344e7de423750451be841e3fbd539dbb7851a9076a7455eb8fc81975f3924f06c8b4a698dfd8935dab5c63
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7078b98b32f0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430012147" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000be6bd9019ffcfebffb1493e53194d4935e80d12ef0d366058c5a84014f136f2f000000000e800000000200002000000045c3be66f0e1f9d5d9aad36ba343db2e69963e9895b05bb264a2cf9fc2f66d0720000000febdf8bf5a8e62ea5049af6959484afc3ae52a78e87fa3a728886f0dc7b9f78440000000febbf7763360f0c526001d33fa9999691ff809b404585cc28c496d51f8a9a85a6c0f28ec18e6ea55f39f0b0f1bf1bd8befbe87c709265987f15722c44ae5987d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C704DA01-5C25-11EF-9BD3-424588269AE0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 iexplore.exe 2328 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2552 2328 iexplore.exe 30 PID 2328 wrote to memory of 2552 2328 iexplore.exe 30 PID 2328 wrote to memory of 2552 2328 iexplore.exe 30 PID 2328 wrote to memory of 2552 2328 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a0558047a17f76e7da59d109d705f409_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543e31a9f876bdbeed9f7c3e09f1e0ed8
SHA13ea12392bdbd5f7ebe74400b75a6f9fd5d497c50
SHA256d60af5436af746459bd8c979839bd80fd1bea2a7f9f854166f981f4408de7e0d
SHA5124d2eb1f04d38d9ac49b097d2d14cf5d7ad43e0649cacf0ce21dd3e8abf00d69d130b1a4bcbdfec14e9e9880ee8e34d30cd56f36b2f2f52c445daaf74dd7760f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525b93ff9520c14ad840f63ad60d032f7
SHA1b862797f75c7218551598e0771492fd391e84ab3
SHA2564b24f091bd87a0cb66d5980075a1ff9e05a6a64412a926410562f02157319664
SHA5121908074b2d8a4ad49d6237655d58bcf1ffca16560ff1d5ddc6cea89b5a77f3316daf7c8b7a0106ee2f5ccdd7cce4c3a8e82563b06d7bc830aaebeb4d90b413a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fe0b497434da01c092958e850f396b2
SHA101061f52119945a7c14199b8dbf67aba8ccad2be
SHA25642b8604436ca7301ac86b898991a61d81c0f7843fe89fb993de6e59af9fe9d9e
SHA5122ffa63757e7be02abb24de8f07fde84b7d6bcfbf5acceda8260026405a5f8d91e5480987b7baecc5608c59af6862d409e8582a2eee8cb6909d3a792b3036cd4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d14019ed1079144c320749d4f0d6d57
SHA1a6c11874b5ecbb0728c0f82e9999a9b8b06128ee
SHA256065c8998bdca7681ef92263b6a8a2d82204195a46065f77080d812bb83c910e9
SHA5120c889b78fd43de811fe2eaca1739ed4173cae28129e3d13ad825150ad91d1a049e8ce9994fac27ab5586e681d788345272e665db5369760d0f53aef58ab97320
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce612f8ae2a6a6941a480ae76c400991
SHA159d3364af90f989efa32cb297e6fcae2926058c2
SHA256467cdd0af7d711c876dc2c9659ab21aa8981a7dc5303b80cb68b71a1219d1840
SHA5120034662dc85a2953c4361a2ff9c0816b42c1065b5b8f3edffab4934cc0679298bed132669bd21d195fa5a6581485c7213823edd19e3af64b9e9339bc4cf45361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e206cc246b38ef2c278ec3f0cfdabfe
SHA1196cc0cd3f0d9914a8ac87fb9c6548d697350747
SHA2562b44e5783bbe93da38e45172a59eb7fe5afa4662cf88ee8c5fa73b34acc1e4de
SHA512f4a0cf97d9964ab09e3fc683cf8df936dba735ae1e96b3c27a55d79c1a440e0e79647fafd511620cf9bac626f3a140e265f677d3f30cc99c582d723600a17557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579b89f7a0902cb9a4a6fb9d907f8d985
SHA1f5cd70267e24ead39166ac9b73f3710b8179cb11
SHA2565e04bbe78ce051d109b28a9cdff248aa31feff2400ad623c5fc2df6fefb85834
SHA51244059442e90c10aeb27e7c8dcadfc030eb7f3efe8802dbc4790e6f06c5f61306e4b852d5993ef3dd548fc85dd9bf27fb328688730f2de23c90bff31e7dc4c592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559a984949cd6de8f3ee67cbf63cf08f2
SHA1d1cceb6808599493b2893eaa128a70e4008430af
SHA25614dd40d486d1d9db75b5bb370e22e559ab4e71c0b543635e1d58f2b48c295371
SHA512bc50b82841e92461eaef3e4ce9edf40a334f3ec024cf7f70d6ed159e96f92673236836c789cc01af4f2e1266b341e23517513d5627a3b31e13aacfdd76ea99d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55723121ba268cb62149e4bbcb8d6a42c
SHA1083113c553c63af6c3944fe88a88c74eb67c04a3
SHA2562ad978b0e88293eeaf42e69002bbb22ec095a2db5939a3eb070561b2ebaec3da
SHA512e46da72e6f3761da138cc46388c92891aa0527de5a542fd70b8a4b27bb83a59f299c190b837e7671b604f6ca7d9a583d206ef20fff71c93f2e333d79d13260cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb60bbab260b676893f95808b940beb0
SHA1a3e9b7f84f013cf567dbafc765fb6e82238299f9
SHA25667730b1900b159e062100cc6d68d8a362e2d45c1a6f57ca961645a4d1dbca612
SHA512e01ff890bd821a79c3ecd5265a81c299306c3823e4a3e26237f6605263daf831663e889afebe72429c8719656824c157d6fbb99a0029d1f7c4c1ed27f75a3498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a59dbfe55273049f4bf857adef00a15a
SHA1a0119b1e2a62ab5a2510ae07a6a31b18d71d265d
SHA256f9da8d57cec80ad844949980fafc29b2b53c835c13149154798a4cedd0932cac
SHA512af3203ffc09dc36f10470dcde842421c9ae2c05b2fc8dd68e4c842794beb77a5be8cee8fff0da69fe2b0a38b66a00ced25106e26a0187b9c85eacc1a25d91b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb3c1dc1164be09c927b90ebe6f55c2b
SHA19828a938dc3687febf2b7f04ce4aed7bc35ae451
SHA256d902df9248f520a6291c54c9a9919960a4e48a81107004c9aa4ff6b28d828d31
SHA51231a72545aa88f3a665550c551f02be52d0166ec3d18cc3060ef21e004d5bcf9bfb3229b222fc5b92ba7f7d67a3efb3d63daa0302b9e437856c5d96ba8d7a1877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e3b4468008c5c3d2ad967c5896482fc
SHA15be4e81c6a8d249e4fc31a45a2ac4258dd90e960
SHA256d6c351fc413acf0c382e25ffd468dcc2b7b04ae2f163f249ae5fd8285bdc5fa3
SHA512d19b8779483245ef5fd4067a5dd70ac82f9b67187249184c9499d7db9fb6b62a9519d845f5d1788a9c29b151248f78e81ae36878c105bf07304054be29423d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59189548b78049b9d562df3e49c98bc42
SHA16014c266a5a04f8d798a7678ce2807b49c1d6865
SHA2568d48dd5f50ec76b19d812c2081f70c26e0a86839661748b60bd45eba96c068f9
SHA51231a30a532d05329945dd7bc29eaf92fac0b0e81e43c135943a713566876f3b10906bb086f47d357b8f0f7efb89c561f61eabb493fbde208a151f543713d8de34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fef719d5c3cf273d8960ed9a90738fc
SHA11a5169fb77a47dbc194e53f1e882643ec88f2d4f
SHA25678c6dc12814ba5952f0612aec58492ea407de2ee4098bd412085bd447a204094
SHA5121beaa46b816b72738d8059341ef8d63b65e8ac951b785ec92c37d1bdbc4040c94f3101387b5acc9dd8246848630d7bf9834e44183a9cc1867005414079aa874a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5398123ed3e19df37ff113010ce866140
SHA1272565c6b6a2b0a8db286d49ed51844517fd7f2d
SHA256ef8ed97fcbbb58751ff14961e7c67c8add5cd9dfb14219e5451a98e9ae98877d
SHA512d4d85942fb629461ea34ba0007883815fd17ad3db3d1423174d5b43c0c1efaccccf8867a9f6a9c228cdeb1164a7a9be1af08c1251eb154c524d308f98920ec2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccbc17e72ba63cbae2bab9b26e34de4f
SHA14b6060c051dd08defd558749e12a64b7f3fde262
SHA2567ae018bd6602aa0284c606945bf33ceb4d00e638cc52a6d6b507bf013028782e
SHA5129d7d499a012e17ae9078b30f6faf84b78a6c01443dca1ec6fe11a439137b794dd85d34d6c73133dfecf827424822ee9dfa385ff62ce2d5ff4175c75b5f66fed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5994b9f774d5bf3d74ff4532081a0236d
SHA17b0e006fe3dae6668bc07a1dac14311de85debfe
SHA256fd4644e1c17b0c864aa1b7b7b6d7a14ce9b3a899e2b47c217dc512a3c56a53d7
SHA51271cac7e66e17d0266dc6733e50c8b11d769dc7abc7efc9d8eb18f8389a586cc3ae81e7004899747b5e3872c26733623074c54109015c55d7ce560dc34ea80676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dfbc4c7ead470088fa0597c2ed52b5d
SHA137ae1e053f65555ce09588f42bcd9397a11eeaea
SHA25624e290c538ad89051e80115e135db9fc630889acca1cfc5084d876140d11e76d
SHA512b2e86087c6cd7fb18a518fd56954239993c164eea4bdab2abb20454d2573d4ce100c2a134c91fb9439f7489d3997737116439ad885f27fbd24bcf0fc9778d489
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b