Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
b0ce15c03a472539037d5b6877af7c35_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b0ce15c03a472539037d5b6877af7c35_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b0ce15c03a472539037d5b6877af7c35_JaffaCakes118.html
-
Size
53KB
-
MD5
b0ce15c03a472539037d5b6877af7c35
-
SHA1
82ab9b8af7ce6d2c3e856e9dbd7a5ee099350656
-
SHA256
177de073057201b4b35ce97ed2f4d5a5a9ffa9b24e63c2898ca2291bfe658f93
-
SHA512
741ba63882c34949023712bdb739e12d133f68072113b395c668eaa58f2577273962558a5fcd7e4689472d0ecfb373e9b73e5cc3ef403e780d3875321c387327
-
SSDEEP
1536:CkgUiIakTqGivi+PyUsrunlY063Nj+q5Vy0R0w2AzTICbbLoV/t9M/dNwIUTDmDZ:CkgUiIakTqGivi+PyUsrunlY063Nj+qN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{801938C1-5F36-11EF-A669-4E18907FF899} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430349183" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80107f5543f3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000ae6fd1748e7089245163b9aa9fa3ca822852a19218c0c521e6e13bacadc1d509000000000e80000000020000200000000618aba55939af63d269503e68c0aafd6241d1f1db0a0e76eff0ca338467dcd020000000f93f7822f9f7d94bdc1f9e522c2571dd8c1b581ce5938c7482e4f9ddfe37ed34400000009b5f455424f8126dfa1d57c6f6a161fb1abebd76b2723f03df6cda5f7ab1cda40c1e7ae4968600de3a22638ad2aa3c7fba5b533c66bc75d5801009005d7b8c82 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2808 iexplore.exe 2808 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2600 2808 iexplore.exe 30 PID 2808 wrote to memory of 2600 2808 iexplore.exe 30 PID 2808 wrote to memory of 2600 2808 iexplore.exe 30 PID 2808 wrote to memory of 2600 2808 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b0ce15c03a472539037d5b6877af7c35_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2808 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d24f18de359b76a038d9b63674598b73
SHA1ea3df62224d4bd70697adc42e7cb257846a1fcc0
SHA256dabe3dc343815db55d3bdf3a3ff03af91ab31037ada1e0af545fcc052c60534c
SHA51239a65870b4284f5212baeece5027b904cc0b65178eed1424d7816ddfb9b1c2d17242739d839b7df84845bd227eb1172c7aea50da648d53f185c705b329a7e688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577abe6c02cd072c6409fa9637a7d5324
SHA149bc10236aed81415774096b494c1f86cad6d68b
SHA2566ab358a4d23ca8f726fea4174864ff3dc430c07fea02213299cb1446813096f8
SHA51261c79725b77a165780dddcbe2a6352dbcaa5a0cc731db0c95094b13b0e863b244b1aa0596528bf33067d0dfad79f63507852b5a4cfeaf8a3d2d516a12a348f21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d91ccc0d9034c92b593a87f7c2f26b6
SHA16a4d35dfb79b4aceac66179137e9ef39b01ba357
SHA2567d38cc0d8c4ab77dfcf9d91c2aa7c346e53b7c0dd9f1ba651de2c2437d0559ee
SHA512365d89faa64997db4c597e59cd1d817b6d93d57d53e9774d6e5c5ea7be2c93e0b375bfa290f2f82688e3982e1f3903036c3b93d59b1ecde4c2c5aac6de28cfb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ea741d5f1d9c24fa65755795b54e37a
SHA17a44d2bc52198fda590f0fd59584c7c427dc507e
SHA2565d77d3aadd6bca8fedb3a76fc6a944a37fb124dafb58c15241055eba84baaa45
SHA512ce7359be67a5c693205c583cd274ebc23193ecc0c40d2f11a31c3a465504eb13b6dbccfef36c69b2adfb8dddadd25ee8bb55b1f4daaef3a36bfc6b0854d73d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cf371cdb9f1fe325ef40479bc491c6c
SHA1696855520eed0f72ff14b378113a01718437776d
SHA2562d2533abbdc78f937de8f2ec652edd160aed8b19cd2d568cffa912f890ab68c3
SHA5125f159961e727aac6c44ea70668999938e7b8ac72746c5e233939ef8be00cc55335e8a822dfa8877066ce1a3b35b9c622f59d15967484f7499581b1ffa815f086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f3bdc4561fc2bc2e0f58ac7aa9adc0e
SHA1ddde6bacf9ee166d0a6c56778144fedadb54a52f
SHA2566e29583d69ac1a0066b7616ef6ad316270ff888754ba0d31b43214d38424ba3c
SHA512028fe13a5f13217a5c2e38b53fdde28f5f4cdb628b5e7ef54528beb7a358d90f9fbbfd081353aea2a7af4d2f41b4d5097fe58c5077855f45c91bce38f9a5d694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3fba669bfc92af4424cf3d70c85fda9
SHA1c62ee8ee85db779cd6975126404078eb757913a6
SHA2567529ee35927eebf0ae8cfd1170ef02317393c45d2c6ce6767a9ea39028796b71
SHA5127872a31ef6a944f478fcd098101e9b66de0a7dfeb1784f33eae56e748e4878039475dde548e3f2f7ee9c8bb72017369cc53d3c698a0ced7821ef34de853d3762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521e6ef445063e91c2e6db8b3c0a2b55a
SHA12ede5c8a9f09eead62a432994593633c9bc6a584
SHA256d077e5cf6e0c87a0184760a840dd865e1c5173871e1a332466caf01a14d2b730
SHA512c3cfd3b74ccc069730d801e44c655726c617d6c4922b123cb768b823ab853215b6e5d03d3bbd0ec86a9935537e4966159ca8ef066a817537766ba4b1a74c419e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0d832322d6b24b53e7f2709b4dccf6a
SHA1fc2d452e058d7721b274429d1690fd1ee73fa5b6
SHA256eadd3f75e37fc2156a0110d541d143dafe93074730393c959c19124844b4cadf
SHA512b3d757af8726c9335d84d097e1fbe2d9855f7eb28a2642f8bfa0456ae452c02f3e21227379a9d7def71f96bb940de7506efa332055316b31f0fe750e23ed27e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530dcb33c75f64a575e98ed2e306f31b0
SHA12ef90d7dd4b29cb0d769af38ea1d51bb049df6f3
SHA2568d00656fef2048df23fda1ef9559be6ad13a048db5d828f166b03871091280b4
SHA512be9263a8db3014171dd5003cbe61ad2fb0ffda88814fbb7e988031f6c3b74aa2cb10d5d008b9012784649e39063ed43e69fdadc2396c3393b88d26812458d231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee58b62e3d38dcf33ed964ed02cb550b
SHA1befd96a0c111d99a78e50b4e5627335dca1879d8
SHA25625d018b2a067f2f7cd3f41d0d5090da5c6d938dd5d507861e7b20bf3f7a53730
SHA512ac2f72b77d04c9364f01c81f6e508a87dc0d3ca5c19f9f917ff8aa7f71e63a31ac48b8c67b73022ae1ab18d587f3a0e337d86a2ad322447348b27dea9a98b42c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d769a4e5d4fe6a8932400ca65fc0b22d
SHA15464794d355aefd21f7f8a2c568b0d1490226231
SHA25695a8ae9ceb7fa6690e6ead873efc54e79ada026c53d61cf2e923848c4bd755f2
SHA512f25f882afa0c1bb7c02bfa9a7a1909e5169e9baf4804d6860cc4c3401e64e04a27ef558338ee6b780380bc6fa40b75ef1044a105e21a209f4148e6ae966933f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56db30689f20f3fdf586ac9f983516091
SHA1af0589741056cc8cfd419157d5ec2d3578d749e2
SHA2568bc5469427a210df463766a6704a09ee0ce8d2cc66669936ea825b339df6ee81
SHA512b3a22703df0aadaa83ad93c3549927b98db03feab67df893b79c9f1cc332dddc1b7ff611014fbc0b0077f6e14e1d08420a50dd538bd49cc4afb8c60c2a64a14e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aac8bf1ca9f276badb3b03200d566db
SHA19d2a00f3264ba514afee8278dae7aa1d41fbdfe5
SHA2566b52e301b27e6d4ce04fe92104b1dff9f3f6c060de5b49f571847846844b0444
SHA5126a1786c350cbb7ead290ef8def990158f14d5fd1cd8b7e3b362bf60f2de90d7c01376592b3ba2ff29021af5ccb9a50acad2fff830767c4262c0c5839277762c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7cc80f51128aa825df24df1a99e76a5
SHA18c4b8e31f589ba4f7d04b4ef859e4382dfadb8ab
SHA256ae0b915553d1cde97df115f072b1c92b3b3e001b3cbb3e925fe56b914538b21f
SHA51264c5a91a3dfd05cbaf63d0d5b3c70fa1aec6278ce320d146025fa894380ff85793627792c496b7cc5ac6506a030707b484b9bf7237ece321045b5af8a689523e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b21a73a6666a14626bffd823a8ff3da5
SHA198c0064a1f8c7d56051d9e662505d39d7db44db9
SHA256497ba06de448f5672fd0c3ad24d208666a0df42e9f0dcf6e5cd71139cf00cea3
SHA512a164a7c2388acba8102b0aa3d59b971297c32e709e02d95280ce448f13bd6dfa114e432f6b9ef457bc35c2bf894d559cb83109a4b17dd70023ca97f63161f27f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe8618a544a21acf417d5f0dc38afd13
SHA1c685b51ffdcf2f818dd0efc4b91dc2cce7cb1962
SHA256132800af459a5414009d5e6f33cafe93e626f4642a97f32f260c8520d89ea9f2
SHA51220e46e3161ff3bdaff4ea701fd15ed7d2fc2493120941306ca0622fd2a89755a305930091f9f3c4412f3305c47e6b2e4ef8aae35d21556831ea36704ead7473b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GA43GQEJ\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b