Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
72s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
a1bc0bcd6d3344268ff9cf9c3a299363_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a1bc0bcd6d3344268ff9cf9c3a299363_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a1bc0bcd6d3344268ff9cf9c3a299363_JaffaCakes118.html
-
Size
44KB
-
MD5
a1bc0bcd6d3344268ff9cf9c3a299363
-
SHA1
b2a5c6cdc24e14000598d71b49cfa3cb13d7aff2
-
SHA256
883c2b7739ec6533a31b7f4f612473f1265053c1d6c665f1afccdf0c05371037
-
SHA512
ca10133336a00ffefc72918e1621c52c0f459a86d1c9043e70352ee87c56ae48c9e5b43724124bf77bfd2f47d182d9fe946f23140f3059b520a21b99e9a55823
-
SSDEEP
768:GECN2jOjpuW1fzxDcrkRj4CO8AL74zl81em7Pft0PD4O3WfKQ0lYAd7pC+JVF3V7:oBNwMj4CO8AQ6cmPf8D4OmfKBuAd7pCM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430042972" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8989B9F1-5C6D-11EF-A76F-5AE8573B0ABD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c010f9617af0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000007cd6f8c23b13bccf7a7e505466ccd608b15da355ab4d93e61b084eed42cb3c8a000000000e8000000002000020000000054acccc04770e357726b0ff9b2add566d30b3f633b353a60db1e0e02646f77820000000450e9de0405553574db53083dbd52807182f31e2d8e187b26916cc38dd6faf6240000000eddb9c965951734db5dc78dcc9a0db4bc67f1ef3b57fffaa214097cd7a4d68ffcca7d4d0cf16f80b2a0db2412a80b401377a110768eeeeda926db7c5f1884505 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2264 iexplore.exe 2264 iexplore.exe 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 1528 2264 iexplore.exe 29 PID 2264 wrote to memory of 1528 2264 iexplore.exe 29 PID 2264 wrote to memory of 1528 2264 iexplore.exe 29 PID 2264 wrote to memory of 1528 2264 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a1bc0bcd6d3344268ff9cf9c3a299363_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544ebfcf1a078856a6dd4e973cfc3283f
SHA11c54bfb02dcc6f637e0e2e852677ca6261c3eacd
SHA2569dffe2df559fc029421e0697b3a5b88856fbfb5ddda4e36f5e19f40c87c8c4e4
SHA512365360de9c9717bbf42c1132e94c6d34c9fe13e75e98e85220b1b8b07406917141cf9233d49b7cd8d65f1543d4f3e7b482768bb38bc1fe0291e9bf8670430e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f6a711bed218784b980e7c02ecad474
SHA1c27cb3d7472cac0390281c0fee79bc5d44f8d346
SHA25669e9d7bcf2c7698fee6af230b8d2e1a52218046be1e2df1c177ba020e32312c8
SHA512f41bd6a9a5cc0331827f15492b397d127fd77c210f0336e9368cd4cc9ffdc79d78fd5bb655b8643e3ebe6871b5edf020b48a5e5b9280f0122168a896af135605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d03ce4f54fcc8d579ce06ec98fd754be
SHA1742947b87b1f7ffb58afd53e9c60b5851d144f5b
SHA256e48c5d24e3a43c9ea89dcee7d403096415cfae8609832024dd6cc6ac5d1616a3
SHA512e588accecbc6d417ac96ddc0f1747323da615d35e5d6ffcd1fb5b97c9892bc0b38bae82330cc104c47bc88a556aadd654016e3e9b73b09a328f9a2dac6c7699f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e43de57112e1a3da1173ab211aee458e
SHA15f91cb35cd9caf438dfb0b1a82582b9b4e425a76
SHA25626a445bf649d7021fe21629011ecb78315debea4bfc65a179e5fa8ccb32a9774
SHA512d06340b17192ae61fe6d5045f501eecc95b0b9ffe274b51fd9c7616757b619556f10313771678ff87b62ede13b4e6c4acf0ec6bd0c851461622b3c305fc77da2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543f9e5314803ea6054f061c121982139
SHA1d81d6447aaa804c0f238c42fba2b915f38a3df58
SHA256ef67f64b5302b886d00ff60d585271acfbbeec08f28b51e024ba616a3f88c648
SHA51285ea87272c3091fb516100858f095a073fa4df62b3a504a9fb644a2ad504c470900db2ef6a92781ff59b41ada2d7c1c7fd4aaaaadde19e207361a7a62e51d83f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572401481950a2907f12fe4dede8d964c
SHA1f6ffbbab202bdc978826c79b2306b2c77d2d9498
SHA256121c0bcb2f69e24ccb2ddca1bb3a25f0ded4bdf57531a7a388758f9e34e039a8
SHA512fcf6b5b32ef773880a94660607a30279602456c844daf70bb0a074f335344f42cd2ad9ef30928b605629f26707a4635141b330c1ff1f607183474537aa20700f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599b07a10f9cf9ef60f71a03e2ff16779
SHA100f63d646090f7a780aa64a70ae4be5682c738a5
SHA2561dd2021a4b6b7a1475c1178b1a2a31c0511219ec0a652c1b8eb33731541662ff
SHA512bf5ff973b342e1f58684fed04d3e395700745be134ac11c8c4c1f9baeffb411e4aa1a0a6d579d9d12f96eb6ef0ed13aad216ab50f6c98e32c556c5a1577fd39e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a37e780f953ff9fe530d3a7e053a6b1
SHA108b9cdeb841998dbe8f52b1821b931e955053234
SHA25681179350ffff7576c743af89adaa4ceb45a152074449306eba960e0bb590ab75
SHA512005b96ab86c612ab746b8b43f9eca4c68775e456eaf5036dc756a81ebcf3b6354fb44f17247f37ab510cc9db75a08be79f231fcaabf63f60811e0b461a04685d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc23cc070c18cbcfd3d9580441421d8d
SHA18966473f36b21cd70e9c5ea300a1661d77944a9b
SHA256541a732468fad4f7b27c9db8822d9e5892e90a05cf2107e53c8f57e0ba618d97
SHA5126ab6174dcda815bcf89110e035de2ac4e9cfff0d3b0a8fc97063fff474e2d0b06d174ddf3f06d146aac80bae9390f82de8eb664e941a75c0c95fe776a278e4e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50786bdc3aaa1000c62dff34e7dae8093
SHA1142f96e57989bbc9ae06d168eb5f546e1ff1ffcb
SHA2567911c6a9910bdeca0ef61ce8356116d59c37457f00562e73e3e7d77a8443c23f
SHA512c7823139787fb9c88d1987e2f9b8e6892e33e99326dcdb1d2705b3a1458595026741ac3390d0cf84afe29ae02af6fad60b22495a821afd329410578a634d7a3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531c27abdb3b1271c4d27f595b029e575
SHA176e223c447cfefaad0a10c9764e63710f5811b89
SHA2563fec1243e15ffcd5de7273b10be4d1773c6ef07c1443d6176da7dd0d8d363925
SHA512166b9c3330ea058591b9a94df7fd25539749f14d7fedbc853c3899095e97e4e57d5524535863038176a4aff87242eed2fe4cab40714b20fe98279e11f50dff35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dad142851a29e6f7787fb21a59a0ac3
SHA1f38e65981f64446f8910f68a3a7241cf7bc8436a
SHA2560bc6efd94d166337c1e463b3c36ecb65d1a16fbaf1fe7970edcc9186a88ad8e9
SHA512359b07ce1add2e521aae92c9b906db4e2329e192c6c9f102388acdf5a451a0bc220d5f184898c4bb45fcd5f8c7bfe007c4e139462defb34b313b52b6e25b973e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5585835579cdf459e71e5a5cfe3819e1f
SHA175af7ff349418a664c8260235c0fe5deaaa2e320
SHA2568c65636ac449915a8de0db7979ced9bc9869fb6f24046dea33b9530abb869178
SHA512ab1c5027c8779331d4da6c3b00764b038a8ef6884919567b2522c3f61dce7500920f4ad40454dea218d75f1d14d20fc9dbe091bd873319783afa1fec3d360714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54acdfce93d566c15864273f4b9e28814
SHA162c34a55f8f2a8407890107b5a061f1f82159886
SHA256c80706607138080da2a42e90e7122ac6ca298f555d50e47cd19ef008f6b7b19b
SHA512196ebefd839194bc007db39b78b0b3d8eafca34ac5f794b03454e77854f37627c22349ed8ad70783fc97c4d7ccb67c506abc55dd73eb8870f2dc831702f337f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f32fa696c474d84dcb4e6a0c7f841c31
SHA1e2663c07c32fe027a938b8a5d1323bebd40fcb40
SHA256a55a638138f6f41e517907f69808d08c3ffa761230f733df84dae0660a1661ac
SHA512a3192968174d1a8a6d8f58cfb539f4ca743dc2f50e74cc144a4a17cc6c4640935c38b0a893b222b6cc017e7234f3ee37cf9f32ed47ab13482d303603021206b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548af0b55703f15868952439043ad283f
SHA1d2b90acc4ace01476ef62df7a9745f1adc40f29c
SHA256e8361422c38b1658d8fdc963ad2c07e22a87848cb8dedcb2bd71abc938dfbb6d
SHA51214f37d1e8c5d94720456e9a76992870b93af038efc37f9265273d080ebddf1cf17bc55869a699cc62a7c6afa783c7e37899d6e3911dd6f7e812b13903bf4b35d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d156c0f48069768568d171c2a4befe14
SHA1543ee59c587bf75a080b8603966ccfe574c283c1
SHA2563d9aaab1439775123876755cd5f511cb77a570f55bd7b954052b2a0099ac2c7c
SHA512b2b317f41bba9766ccef9cb5070f9e5d70e6aeba36aeab83b66c7d88504c67310c43b80dfae6e70837a7a03fcf7f2c8be7f7317ff58e69a51274697e5eed144b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b