Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
b37f2f59cce658c587e6fe75ee1f0fad_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b37f2f59cce658c587e6fe75ee1f0fad_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b37f2f59cce658c587e6fe75ee1f0fad_JaffaCakes118.html
-
Size
7KB
-
MD5
b37f2f59cce658c587e6fe75ee1f0fad
-
SHA1
ed9f061f12db8729e762afdd7fe465c805e49078
-
SHA256
3694e159c20ff0292e0470c4b15bf3afb25558039d4221ee1ba27673d0a45614
-
SHA512
446137defccc773d3b44911030f93e99f398420fef19fa78f0ea9d03520908dc687682c4b369e69fd725782be729fb51ede2bccb90cf39696d6e97d9f2dbce9a
-
SSDEEP
96:BnhtP/YYeLf3ivPwB991Dezyt5Wz/liIREMEpTEGiPjqCeLBydPu2kFb7KRfFUH/:BnhB/LezqM91Demt4DMSEaiQ6b/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430406088" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0927011c8f3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE0D6061-5FBA-11EF-A2BE-5E235017FF15} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000088797ba1f5c6ee8311fb08ddc33fbfe95dcbb5432d2e858b94d44e09d6717184000000000e8000000002000020000000992b9fd3ee72cd6768d8b3149a8338a09c1bd4b9e414470be4b25be5f6ce7e3e20000000184fff0bfeaad374a74061dc1bee4d08d5e2511ee82609ab674172a873ac32d64000000097d8cfe38f3c03cbb952c0a1691890a48d64c819a72857ce37d41989050270bfa85d06130ed4778828e7c684f1aa7636e5a0ee9671a986442c2db6b60a8069ea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1328 iexplore.exe 1328 iexplore.exe 1772 IEXPLORE.EXE 1772 IEXPLORE.EXE 1772 IEXPLORE.EXE 1772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1328 wrote to memory of 1772 1328 iexplore.exe 30 PID 1328 wrote to memory of 1772 1328 iexplore.exe 30 PID 1328 wrote to memory of 1772 1328 iexplore.exe 30 PID 1328 wrote to memory of 1772 1328 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b37f2f59cce658c587e6fe75ee1f0fad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dbaf7ade02f049dd2dfbfc7de62ab82
SHA1f45a7f0471ea1c77dcef1a3a651a48df8e34d3b2
SHA25694225b8a129239481daf0ac01a0178b67e712888fdefbbe5eaef6ecb7686aee7
SHA512da490140d331dbd1d3815cf38dc9e20f33e07c4a79b23842c424a3d2dc15de4c6074d91bc2d28a3b822a57d5aad1edcda2c977b2ccfa90a802c59e93674c1306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5552a36f027c20c6112dd4dbb97b9b7f0
SHA14ec2d762129d9f124f2398f61d96ab09d40a9f9b
SHA2563b873e9f3744f52e6b15651ceeb4be79b097e9c19b416d5fba66f1e83078f775
SHA51253a69470c98d7d4daf7f8090832939ecb05b99ff386921a62af9cc94215098b66ac3e80dda18abc61c62a4ad36e2b08ad76cad8e40de4295aaad3a9afbd71367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d009c548c31e68b3a462849b5d7f6d10
SHA1fbcff4da2f3519c19030fa244547c862f7964d96
SHA256b31e8ef98d89a40ec9ad31bc36fe3bffe8d3273d9533db3cf557426747082ef6
SHA512e983f7c75bd8b9c1b807b06f7961abac89e6fe34ed8d4cb0f591d7512864a00f123dc7587e642d861d76472458bd763dbc0aea9aabb94798e07571518fde6308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c88f8efa9d42b99b0839c170d5909172
SHA1b6ca159b1b888a6e997fb79ea26d2195e0d9145f
SHA2560dddaa1b222d6e7eea3a7aa27aad73b83d9fa0ec305254c9bc09c8a032c3bb62
SHA512427fdcf582c3666059e08b042cc63cc8328878519d97e08ca22cdfb834a4406c709c42270145bdc07699f9d8d794e5c276078816af30c36ec2cc7a0deec73943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591aa75c134e9f21cd4ab0cbd8a33d904
SHA15d3fcb3f66f06c98214c3ddfb803bedd6b2e610c
SHA256a3b70aa92c42fabe540665f09d16533038d095b2172d0d6145a554e6b439f6e5
SHA51278f7f4a3c6cf8b42fd76368e434ebc261efa87b65581c643ff297f24db6f0e71d796b2d0e604f7a8e5a04c222525564dd1c10371b850e8d2a6dc718cc8db7221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f02fd0c82aa23aef2d17d1b1d9457ed6
SHA190b7215a6690ca57ea150aa047882c0db5e444d5
SHA256efd6bf087b1753aafa9b1ddcf36a62a77855274c451f949e8dd465f027491df4
SHA512a6b8e4e17a88f3ff0001ba1e57d3b578bd419d266d61eebd87591e7bbc84b77eecb30993f45a9e942eb300244c1ce77b0c10466c96a473df4f77b8b72d4434ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5972a032c8aeec84200713cc2bb7cfa60
SHA1193cf1f1c9139dd6136905e659a3724ef2d6af2c
SHA256f1cf88db52a792a911ebe3fdf61655dbc17a4654b44c3929fcc681d89373c688
SHA5128d96372e921defd226fa6d7a8aac1e86df26a02844a199a18b1cc38c7061a1bb3fa2e5497362289e958f9667344a9da33c5a2f3b880875dce257ec14bae99edf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518dc08145af32d403fd66c6f0f530035
SHA1524758c103f4c0ebcc2822835f905296f845e6fb
SHA256546cd6c932bc67d50adc2c40c0baf57012fe7ed86d9e1035fce9ed76ca8a3fa5
SHA512e539af11231d5a354d37e764025208b759b7eeb7a95082d8ccc592e57808cf2ce003d852c87670e7b0717ad9dd9babd151ed398af375740a2b1a97e26a4a8e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556e7514977108481f036d0be1887aec6
SHA188562fee3a55ada1e442fc256af0474f1e87b386
SHA2568d322999a6ce50db500444f1003e40afc058800b3bafbff7111f141ce9cc5a0d
SHA512914f8c619912eed8f6872904ffdd26a7b4a8748a7152823e5615d00b0369dbdd9e38d4e170824ade7ab84883bc4376faa85dbfc3f07655ba8e1ace7168b94112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5928f7eb81d082057635ae44065d3b5f8
SHA1763199e94197dec090759ef1ca9e0549b1058980
SHA256a798615335be137fde7570f1ce3993778ac440c40ea5e0eb450f82567156ee2e
SHA512d654f8ea6c0b4e32b8af2bd05bd93d542010ad7ff6fec4a19f56fb7749920dfafcaf80e0c1df8c9fc301a9f0e90ed6a0317661fc8bd2acbca211a24330255e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5432cc03cf8877783145dc1f5f35024d9
SHA1ac50035b1af3ae92c1aa7f4b9994ce2f08546cbc
SHA256ba39b1d046ec43e8b98145f58f2cb91d494e7d658ae87cf6b25cca541a0c6d27
SHA5127538f5cea051ebef61c8bb37370fff76d0da6aaa435446494690f7ee7856d6ec222b73806bd6bffa30fa71b2c3fbba36359db17296c92e397d722cee0e213c8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5510f8b8d880042c6f9f08a9f6b44c0e2
SHA11830a559cac0e4df73e63b5af3060c111bfab674
SHA256af04de2b6733a4805d990920a53315eccdb275e707d00d0ca2fd03c9dc381942
SHA512dcffc3cbee2c0980506ab6ace6112da890a629f6a98f8151bb18f07a72fa5063c1a0595b95bf2e645eba26a7e0c56d2eb32e594fbcd81d89a4fb70a18fffd58b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a434366d778b4840d290c0133807fe83
SHA16436fa785aa6b51505cfdd6640ee8a8648a3dd62
SHA2565930e23eba7731a7c0fc801c825b07103f3c76590dd771c37408cbc894840bfe
SHA5126640c7a1e43ee17001885b480a639b8501d5696488b2c5f7d488edcb753c168929a74cfce7a50c3370b788fe98193b6bbe4e998618e5d8564d9fd2786b576653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53373fe63ba5aded3b64e0b524ed32a21
SHA1b4f85b9104c8f06d05024f8449e3d4b492afbc23
SHA256f5bf931226c969e4f5e60fe34c41be59c834280ab62d6e49e47a14d06140593f
SHA512088fb1b82e6763de388e09e71ab4031cbb01825452cf0829add548ee02864764e690bb534bc34ceb134157348a1138f5c5f850e345e4f2c3c3ab833d7972124f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a159d9083bbf3da5e3aeb257fbc5efb9
SHA1cde333d5c0d1d8803ff3fd0ba55a233845fe4bea
SHA2566a395288c91540f18615deda1d09794276b2b611eda672959f39fc8b32a17fb8
SHA5126c776d85dd9ade62b72f8ca005414f5c1a8e38d4635a198528e99e8f236ec66e4d48cc316d3cd326f566d4d877d4e1775e95d890bcc57f81a889aad047028d8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59adb0835ebbb4fc29abf7c2ef8cd0b10
SHA141352bcb411ad82227a4ba437e278d4de551010b
SHA2569b8a5a10078c7a0cdba7fd4c38f62d9b8e591138a9b3a8225ef8cbe95e964318
SHA51228b0019c02179713a955d87058229304b6a840d4ce4160fb36d9f840f6bcb59924f98c484a0c0fc2e73d7d36215d7fa690adef28869a8fe0aa3af08c28de174c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b96de2929dd2bc4e44e3823fe4bb59d
SHA1ef2f2684d981185ecd2bb5a2f95406df0177828b
SHA2567a59de5c4629d30aedef6ad0bf2700bf26395ab967f4d321ddd3305745559889
SHA5125ae1595d757ab989e3a0b60970742d5199b3e161f4c58d841e7e60502de2bec0d1dd1a5e9c9578e87132085fb51a2dd6aa20a160701935d31163acea87f4b06d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9372ce6869b563c512288693a0da3be
SHA1b772304505eaa4be6075287605bdae36831e3acd
SHA256f27c14914d14c463e9d872ddb71a752ac5ad7480a796b74e97a0919073ded0b4
SHA51232a1626f64f98b6edf2859ea0753001b2da96ba6b5442b245b19b2f119d4682e84e2619097f90ed16177d866950fa7f5dcbf6d81e5eeb188f8f36eb0ff09dfa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f68f6dc60016a599133b39683fb311c
SHA1cc452d209aa85cee5843b2c44f5ae76f29fc25be
SHA2560100795ed9c2e89258b10fe7b1967fc6cea97ffa37bc78c1da4ef320ad67d8c2
SHA5129b4a4164d21c42355cf2bee2731a824b3e1f4357f1b6564f6a46f6516681a6f8540b071073d59c9a69862657932f492f639411b2d9783acfc2ca78d5afbb4995
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b