Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
70s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 08:38
Static task
static1
Behavioral task
behavioral1
Sample
b2cb75d708a2c4acdc208c57947ef130_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b2cb75d708a2c4acdc208c57947ef130_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b2cb75d708a2c4acdc208c57947ef130_JaffaCakes118.html
-
Size
905KB
-
MD5
b2cb75d708a2c4acdc208c57947ef130
-
SHA1
d56673620afffe6445e5f84705ad64ba1de2341f
-
SHA256
3e2145a0ffed40ba72ff166dfaf13f2362bd9e121b3cf6dd3a3f898e7ef7c7ec
-
SHA512
a19aa2cba69a37897d24390d35f9e0d55fa02a614dbafac481128025b4bac36153984559adead457d562516d0f51941469319daffb7b36fabbbdae343c21c034
-
SSDEEP
3072:3pQS32szA0N/Gd7ZXtjgrJBdYPVeef0xOMQfw/A32szA0N/Gd7ZXtjgrJBdYPVem:IsM2BdYPYQMfsM2BdYPYQMpE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C5FF9D91-5F98-11EF-A1CF-525C7857EE89} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430391394" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20895d9ca5f3da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c920000000002000000000010660000000100002000000016ad02289799e607f98fc62a036e3860263fee463690eb6201a9e7b4bd5aa70a000000000e8000000002000020000000d3315316790181d2ffcacb3939db3f2f60bb1ddd319288fed608c34d261d290020000000ba22aaec9cb260143ba7781072b27df63d0ef620813ebc67c82b6aa0c7ee993940000000470332c0be5dd0ebef6eac800eebf77c9c1ddb46630cd236d573013ad23196040ddb4af7b9bf9cefcaa451af87a2f4cf36cd4710ac927c3ed932c02ece07c274 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3040 iexplore.exe 3040 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2916 3040 iexplore.exe 29 PID 3040 wrote to memory of 2916 3040 iexplore.exe 29 PID 3040 wrote to memory of 2916 3040 iexplore.exe 29 PID 3040 wrote to memory of 2916 3040 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b2cb75d708a2c4acdc208c57947ef130_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD585a58adcb3777fb2f388b61c4b887823
SHA1efcae958c6aec7b2858eca9108f402bc5d9a1db6
SHA256029d613040cfd1137052216d3b1bda823a57e1bea08d10f931aa57233d28b7ca
SHA5128a930e63007ab8f69be7c3dd12f84dd6fb0a9c213ef4246ee497f52100542a9c1d0d64b0168774ed651fd7d354de4a70048dc426ebbdd744e9d999ed739b8f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5655ca35774880adf341bd81dce1f7889
SHA1412b3d24fca3a2bab85a39d203ceaa629f8ee23e
SHA2569f737c575de27549065b60878db9f2074bfd6f7c82b494e28691a371c199f512
SHA512a235ab3f238b211249c7bffabd042cfe598dd21f64d5ccc7b65e18711ee91fa52bd7cea0e99846c3f3a3c85b0497fb4c7622c1aa67c245fb25599fbe4a48461a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4de4a418a52bc30447a073f06a4969e
SHA168edbc01823c2d15b63a8c92190db5290fd14830
SHA2564e2568ce79ac7e750f65aafbd88c5d9fe9300cff0bbe5495b13912db997f40ad
SHA5129786325fd9da378b30c03cab77b0efeb2a509cdd67145360edda1dd37974477d794631362ef773c3932bbcca3d4e21187d89df6bea4fa136df264d05db1adab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ce078e3660394295e258568eb66719a
SHA1942a09c8f2f06981444c0470e4fd62050972acf7
SHA25630754459a6497f5572a2c1d7f227c140a246a6c4aafcb86cc742cac258f38b7a
SHA512f9ee8c6ba2c1c2e0b8d44033d7100d0fd42447c16c3c4fac9d9a6bb8f7c2489a7eae08e1a885d5c2da7f0357499f2baba2fc72d46fee3e545ae5a0cde5ec2da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e0a09eef139a2dbdf6c5b1e3e113d82
SHA1c0f89321b6ee2925ab19417d49154a8da0437651
SHA256707354897998f6a2c4b68f708be692dc6404e59020bc0c413e5cc02388f45434
SHA512b503c1600ca95675791f1e3af13ce0edd602bdfc3789c02aa3cbdb9a059b38e762115a99d8b3dab2ccaaab76e44f68c8a789bc7c3af0ec2ed1e93e9bdddc3926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c96e438c5300a94e35060a5c85f580bc
SHA142211405406591ba255c082ff0ba25f3721ab8a4
SHA25626960cb7401870ef4866b499ca17d092f31f4fe17476b7b15c9cd0dda82ea0a2
SHA5125c925f5138cd3f3106269a9fecd78aca3fde78173b3ac945aa44eb9a313c8f1ebd40a87d60b8b38cd7832602a714b282a39d2409a5af8c1001ec25bd2c1f3766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5b9982cc5d9212ef62d54c1b4fbc4c1
SHA1c1557ff7c98d8974a91ddf805e29ab6434538a39
SHA256fbe9fd0fd7086ca9db7ad5e8f0ded20022d30c1fbd8b7c2de739e3c5d8bd0d1d
SHA512ee47493549a30a060775a763c4ffd53ec95e1a95b90ae221d7d00f124b02b61aad1bbc9e717e7d83ab3e37bcce119876c1bf98094d2c6573f47cf3909cca054e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9e3270cef89e995e17c357dc829a6d5
SHA18c00feed80df80c13e893abd8900731780334b98
SHA256b2687daf0d4936ae8addf84a4de15a14e3deba7c6a4cd3fec2dbae10317609cb
SHA5123612b8318ad422a77f8b250ed9bafda27e8ce938bcd212b2cd74501c3cc02bd020c9f218365f79ae21e07e491174a7328bdbb3a9afdbdd893f2e52b4ddb0f8b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54953fc16599c53b66900b24cd2765959
SHA1a6a1d53182def8d1551f613f80729ec7c367690c
SHA256dc409a8f99e28a9195d237d345df00a8f027a34ab22725c3a2536472bb0c556b
SHA512e34546e739d8c4f4cab458c2e28bbcc0725c7488edaed947e4da5ecd277efe18c3589db0ae6c33a450cd6fbc4f519c92aef0f36928a7049703773980533daa1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e08216312e71e1a01f403b8ac8a0e165
SHA11da3b2f3ed9d3c38c2a824be771810795ddf0e57
SHA25627a3a2665503b8d91019010e65d61d5a9a28ee285b7975d5ad196882c079605e
SHA512bd5cd6c3b3b2f043b894f6fce56282b98a14460d7215036099225946e1888dc9a22f1c8cc94a2986c4ca155ffdcc4db50d66b675f526a819b4936db7d31823ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3763a2d39856ca728653e058443c761
SHA1681123b34b43fe8f3e2780409dcbc83d3363d5f8
SHA256dcea5c20e18a9924b11271a25042cdf7d44b858d02297958dc0731530d85c59d
SHA512b7823f9d691881de292727acc4dbb946968d279d34fe49ef6976aeb93bba2e7ed3127e66ce80b0b1dc2e2877d4473f2f9b60cf188aaa2dcbd21026b17b3a7a75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58060905db59bb043283c667ae21a5f70
SHA15c1d4e28979a0129821b463980b665ce57765581
SHA256ecf0d499200316bf0515199a9555ffe42b13fd10a4d7165b35e84b8feb03e1ae
SHA512b59f66ed43564c5b1019b05421cd89592ba2da71034c0142ed2672bd8e0a5ddb12fd25f5a2f6708017fe0eed1d17f7cacc4961a9605dfac4f0dbe3b705c720b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57376f6a11466b92695350a6ed6f02b4f
SHA19de6a7cfbd0c334a0616d3d888e705bc99a6c7c0
SHA256f86b129589e4058d75bc03a098797851437583bf807dcb0a2fa3a01c4cb39f80
SHA5120e21affb9cf707332ab66ec066a4b962ff88c4ccae8d7d3336d6f17c9018fb3e27ea6a549da40a61ec43238649bc6eac2a82ae809c9a22280918a7f9c00964dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af965696a1da322293c2e880a48e946f
SHA156c4e5ad9e9ef3c262930c08767e71828871ffb0
SHA256b72d94f1eadd458baa44aca572ed85d0f39d72690371580ce3f40f1823e7e4dc
SHA5121f37361c961b72277c90ac69cd1ec9d5ca5d23ca2f69e7a71d068259b6121c12c9419e66690255529a429fa31fe0367a1e8f6e45afc2033f48969ebbbff84a77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dce02673efa1a18d0eb54943a516441f
SHA149a9a3865a150acc120d8d26d2ea527561e7c7bc
SHA256a8fa1eb7c9f283ae310a0c56770a7110a2b76aef7b639bf1762d32e3cbdcf6bc
SHA512b5f6ff8892b91136f7ee9236fa81fb9184e26b13eb129e016c016c97b33f03f1161bf3d0041956a11e64a3b06eb7a45f2119c67a078154bc76a12642e23b3d08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3f25e4c1fb7b6b137f260488d665226
SHA1591718accd730302da32369f14d8044237783ba6
SHA256dfc94a917ed12a85f0acb081513c5e4e8b140c45857f15f9dec769dbc1949ce5
SHA51286d330a08528d5507be112eebf749d95285d7836ee5a637013720cdf95c6764803fc6e3f2c4eec36db26c6db89835e4789e5edbf6f5da90a1e309951b61f5165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5253fbb141a4df0d193f5e5e3366712d6
SHA129788d37105f37ec78544a26a0bd83aa22a2a348
SHA2569ebf1e05afab558d325531f4480bc21cb0a9c93023d44d08c7f429b1094ab1e5
SHA51277fac77691bcfb8603db7c434c51f77c788e108911a4be3dbe169e82b3f178a0cd2c307e7f78ebc301bcc8707a0881e0baf3e2d203a9b12cdf98d6feb9224872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad20c8c94fd9a06d02a6805d5279aa3
SHA19f2be8a74ca0aafc7fa3bac3150943d173fd5153
SHA256404c3475f24ec0d1b756783ffbbc48d3fe45d10f73e84d59c29affcf2ac59a98
SHA512c54a7f5effc7f00e8a3e33d90a20ed2df908de10919d667a086f6b737018408d024f0cebcea55f90d23af3b85cc8a6b4a8f9877998d0f4294c7bc1b79692bd16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55964c8727b7b9f3dbfd11dbfe2388b6b
SHA1fe3e036ecb6c36e16c3d75973f87c8ebb7e7391d
SHA2568bd556ecdb2f3a8c7f5aef08da858181b1c3ddb46e99f85bd467b2a739dbe6f2
SHA5124aa9c4403c8db2921a1c4554424891a6865aa860462fb60076e0142b35cd5c0dd29e29ece123871b71f6d45ff0e5c4cc4d70d1d4a5956184344a3a41588bab59
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b