Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 18:00
Static task
static1
Behavioral task
behavioral1
Sample
b041fa5a1200046266c24a9dfa4d2911_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b041fa5a1200046266c24a9dfa4d2911_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b041fa5a1200046266c24a9dfa4d2911_JaffaCakes118.html
-
Size
178KB
-
MD5
b041fa5a1200046266c24a9dfa4d2911
-
SHA1
ffd1d561396700519085bed0370524577a395943
-
SHA256
bfbd787f6748fa20166353e476c5233bd2a6a15ab49d36c64e29cb98edc5804d
-
SHA512
8061a156c3ae85b05f645e3c4744071d368ac85c3806d5f318bb85fed85eeb3b615ace8f9df28da5ece1047d08698fb54003818ede5687a67e1243f80c408892
-
SSDEEP
3072:XbzKQG6eNQVYm7RLPI0X7fxYsm0NQcNot6BGNt3AFWxHEB1Ne7:XbzKQON6+0X7fxYsmSQcNoGSt3MWxHEM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000d0ebb9c027622c0d4d81302b360a4c46a7a9cc0b1e96f59061aa396044c4530a000000000e8000000002000020000000a2ac9f6361d5354f38ae2cd9ec4df1edbfedd437fe213d5eb98ec09551420eb220000000e2cab65d7a5d171c4fe5d1f20117dda5750eefaa16551c113ac7dcf22c676a4740000000d66adde0ed486dd91ad6604f631416b30f4f0d36e879bb0f2536c16c055c97fc65a19eb9cb259fc9385300c873c97ff43ce880307e921e5e9842c287ea93b694 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430338727" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90aaebfc2af3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2860C1B1-5F1E-11EF-8893-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2688 2692 iexplore.exe 30 PID 2692 wrote to memory of 2688 2692 iexplore.exe 30 PID 2692 wrote to memory of 2688 2692 iexplore.exe 30 PID 2692 wrote to memory of 2688 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b041fa5a1200046266c24a9dfa4d2911_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590fb7e595601d0ac943570fc2e98914c
SHA1a14804ebf491c3a8042ed83974843c60bf081a95
SHA256df85a2a02d4a447e391cb9cb91ece98b0c792ea5293163f53299c109ed9f754c
SHA512344b7265bfc2d84ebad551b93a3206456ca9554e5fcc1ed61a157904f055c619ca1908cb18bb174d5f5f32b5b36253820c44b5a5d4f4dfccd150fd45bae8f2a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f0b633564e71a4e7039c22cc7475af7
SHA18f0ae12985a422ed5084bdb0a689bfc366d88277
SHA256de9496564f7ec3d3aa2024dcc266c9fa71b5f215a99d91b4c08c48c318dbffba
SHA5120aae638e87bedcbfa25279780d0e432b8b04c07d56c0817af81916cc8a4df8c52f0ebcc28634b1172a1ca4c4f97f99e325dbab835e4c6c5646ab031cf2b49733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d1b5178fcc16fa0f3313d28585d6b2c
SHA1042829a91ecb3c90cfa4b5e86f0551ce60974d68
SHA25683dfaa8db1fbdd091d978ea389da1486b9f8f0e7e9d74a748c276d6e62ba6d8a
SHA512d4a8d3c19750ace86447059266fc46665a72bda0ce3c37fe7727dbead49c1d640f21928403691e173f19a45768b19f488d78c2804d772a6e9fab303d16403be8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5302a583c0d28ee1a7dbd2fbe342674f1
SHA18045c6b4496de180dfb3bb5da76d29ee4c7ad61f
SHA256e4be36b6a564b0e2e17d3d6f1236f87d26a80d3311191819387971e40e31c7c6
SHA512fdfbba432d969477428e3ac64e81bba16d5f804fbfb0b187f602f4453df7cdc0ea1f5356c185da06c00aa0a2cd86fb50c1a16c3e2b6fbb226edf1987fe23237a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592360fc3320d0563b764c948ab4f9dc2
SHA1a64ee867cec6f4967cb1455f1cb48e8852b3652e
SHA256f7b03fcdd256bc85df958f1d20516d359c94296149f5c4c8e88b5bb272eeccc2
SHA5129e29fbd7b162cfb6da48bbfdf7fc92c9d726d38ef322b0c1fe15d66948a7aa905426e5a1df3c669b3732f3f2711d2788ef424e0ee6ebae782f92442180a6659a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1dd7edf0ffee6431403b8696bc40628
SHA15a8467fbadef15aa5897553810f49bc282045375
SHA2565754a7f0da1fcfab5b05ef3e5f196075a81fef77a4c14f1b001cd45eca218b2e
SHA512d2f3157777e38b007ccf895fd9ebcd3522899942426eceaf1df1d02fe1d38261001be0dd0ec878c8805689f146705a402b3d73ea009eaba7faa39d2267e6ce74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516a98526e72a4a466ee3764d36c0635a
SHA15b29d262e382c007d36ee46c773a5acd578b746b
SHA2566e69728ae34b4ce21f1a91570e43108200ab364f46d7296e579df354ba23eb1d
SHA512e7535f40acc1ca547e31d0c2e60d529ef154e37999539d9a79f8e8cce9d9856c6e1e48da07c7ed814e77e2ff2668247afec5252fd8f251d986687e4173497eac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585b88dd4523fe2cca6f93216c025dd20
SHA10046b270ffc684e4874ad4c3dd7f389621287e02
SHA256ab403d31114239a94b671dd245c9c6c902818fb19706dbc290f74636cb04fc6f
SHA512dd73c279b7d5d6c0012a219d62d69945568a70035691ea9e2273f8f6202adf0d143c5c2040f3069b40cc015e248a44846820dea91a6691c81d3b2cc5770db5d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cca7f84a35306e5ec02560d518a5f90b
SHA1422a2e01d66fbe41624a0eebbd55d240de943e5f
SHA25685212f565ef285c72b2c22170ff8b5adf1b3ef5b662767497eb36fe08d4dfd69
SHA512085d3cc7b375fd6aea44a827e96740277a3da8a6bb820a99faa09f9ec753584e1c94ab1fa79de3acd4be163ad209b4a1da2ed2b56a808d896cb14da3870dcc41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5397eb2b62259f0854a1160dad3f618c6
SHA17e160ed632106ec9c2ce2ee1f3fc71f3d7e38c90
SHA256ce0b21bd409e7ed94d0a633bca7cefbfe0091d87d4433ce0d49b8ef44472e873
SHA512f35c7052897f54435ed878f168eb71d49ab7f9c6eaae8c08301852acf9529e98367abe63362b094bf7b45d1504e420b98206866b674b80bf75e88cb6ae42c723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ae55f271b705015499e3c08da5a63d9
SHA181861e2143e23cbf677f83969b290ce1bcc80441
SHA2563d13d7b74eef0ddd28151533f21c9469899d70b7efb34656546a8769c1a0d709
SHA5123e443aa1f35714b381e9fdb3411695a5c8639f9cc5bc8484cafa6dd45b28b302a3bf0eb9ad33a0281fa43e76f3d912ab5fcd34aefe066caddeafab539d84c81c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a219f13e81b3296e76e618f29c24fefb
SHA1b3112d55579c25340086c1425a3f761ae79f4271
SHA256b94bcb6404cd71dbd5df87c498fed5cd20d53ad26c3ce85e1aedfb239c05a563
SHA51247b502d2b8b3d4dd53c1a199cd4e62a0cd461d4c23405e4e1e8873a862e4c95c4e262e63906e3a2c4effbe03a25309bb7567339a4ea3e70d5f2cdfc1eb164d32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514a08ce2a237faa8cd150f5580aa88dd
SHA1c22956a9abf3b47aaf3f57f991308c2576a7b646
SHA256835cde01052d0976b03d13f4a1b3f9f49cffa725d73a422e207a44d8f12c35f1
SHA512de9f1c01ab9f28fcc0bcfef509e4b872c23d6de32bf9bdb98ef97018c3acf035a082c04176383837acd836de7fcca486b2f463fb2a424681cd421c8ff8739be3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e02b5e2919fb3ebac1749f2a1db2084
SHA1c51bf8f21515fcfce289877fd2ccf4a135b910d1
SHA2566e6bf7f67eb10ab4c20f7a63a6719463020cfbfcee2424b17f01d4db3de14aaa
SHA51210ff193671556f9a7275fd2aa69200d180ebc33b6329abb69c3d690bfcd9bd9977d92b9c0fc43a253488e758fc942cbfdf174794ca0806f460e49379ffce6f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e10965de820be76600afb59eab1e9f9
SHA1f136f78b852c61fc651282d53306ef3666defcae
SHA2565019788cda841522051518c1dff99a226127d596974012023737a9d096143a23
SHA5125d3b46ce2c095ebd265e156ce37c215ea79029bb83262054ac7b4a2dbfda34c2f0479054f7ce9e17361e63aa7347e6516d4b9a300d5e87d24488a7d26f6d3418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ebd9fe708f1c91e517afd3974bd4de6
SHA1718bc694d74533978b646f5cdb21b95b9f9ce466
SHA25660b7adaef5ed308e583518a9139f85262bcd537f1f241a8353d6f6fed929cfcb
SHA512b839c590c90b34c6f650ae302d83b6be13fefca981e502015e4fb5be084330429605c6ccc606e9b03f8d9e9474fec19ba1dad20ffcd3767c9ef6d8ac7f7e4379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c25938ce2ac781cbe5fe303ef66d58ff
SHA1f1171c68d0059de2321dc5d990eadf6b82216897
SHA2569b27372dd3faf21a0231b36b3640a854b06edd94d30f485251ab36fe6ef40b38
SHA512b982cce600a7b51ee62e946fe0e1b446a906fc70ec1b87895001e1b98593b4cf9847afb15d7f3f0255f9941fd7f516ecb222e3f5431ea5898ec8da4e5b82aea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff7688f694a52eef56c557cf00e53a6c
SHA13b614718a3fb3bb7e97d4d3aaa5e194d0d870aaa
SHA256be07683ddf3739d760177a4929994c7e34ce658f5192e0aac050cb74c0c84bd7
SHA51275ff7c0e2a3050f2df1133b7d8bc6c1b9e4fdbc3c57623e0c4d18ad03416abf31926f516959123cc7cce238129866436466efadb1ede20ff15c0ba185ed8639a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b