Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
b95ab710e2233501037d9cac8c1a228a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b95ab710e2233501037d9cac8c1a228a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b95ab710e2233501037d9cac8c1a228a_JaffaCakes118.html
-
Size
37KB
-
MD5
b95ab710e2233501037d9cac8c1a228a
-
SHA1
e6763768c4055565967509fd077532c88347b99d
-
SHA256
5c058c310d084caf04d01dc515651c0ba6ce7e137ab641231fe951ea1d612e49
-
SHA512
6e8240895926b1dcd4c892fa5bc2449731a777805e6f3a6b59691c19aca595cd5a93115412fbe428c2964277d79b5326c7cb39c4e00298f3d055793a9453ce9e
-
SSDEEP
384:/ZIfpgQ9QFSJhf/vPkJnbq2BQ8WkYm4S8X6sVWvi0WMsjcQbEICW5BPxbmVkWE0K:/ZIEQ7bNCW5BPJmVkh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e1d487e3f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000ce857eb2b0ccf95f75909304ee0d8eaa0ab2a879c9af0269b2715e14907daf5e000000000e80000000020000200000000187e4b55e93a3362647105182706d9f22d96025c83d6a16cd1c1a9b1aeee87b900000009c5e30d6c563330da1164e93b54445eda8b851b8a54186f2ce48251e3a2903abbbb9e67c40089524b0f7fabd6ec6e5db5c0287a02438cadf4140e8d9e18c9e5bc71dd5c2269944ce5d43faab407d13d35231ce94887f887fc2b13e7427440a07d94c42b59b15787396f0415f4d4a5fbc1fb9232084453d6148e120661d0a7dc7ce6a23a660c020aebb0c57bed9cdd2d240000000f2cbacb3f49d9242da86cd47a351c2aa6d203a3e3bfbc1b258b761784cd407152b0f327ecf21028657a30c458f9ee78d40e23c117308b72808023a70e8dc9497 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{951CEF41-60D6-11EF-ABC7-72E825B5BD5B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000c61d1c045a3b3b8210adae75e661a60366bae8798c9a3e19ba4c014b7b5c9f7f000000000e8000000002000020000000f4a996f41cc7feba6c6d1ff41783b0452f735069c7ecf8c037fea4d73b03d75d200000009ec48a178cc99ad456e7c6deffc0057b43e10a38f4e10cac19cd7134f8112fee4000000005c0eab08d3aaaf1bdf00139a83b9e92774a43a11c929319d031f1191f3cdadc42a48489f1cf2d08204427e28b2f93510e137db78c7757dfaf79e890f51aa118 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430527889" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2396 1984 iexplore.exe 30 PID 1984 wrote to memory of 2396 1984 iexplore.exe 30 PID 1984 wrote to memory of 2396 1984 iexplore.exe 30 PID 1984 wrote to memory of 2396 1984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b95ab710e2233501037d9cac8c1a228a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee5e2b94efc65a70158edb42f2d66880
SHA184cb61224bc92b6c5dd3be28610ed00de83948f4
SHA256035be0902ed829db53b7eb0de752919f945484e29263e16d100f2dfc10c1e95e
SHA512c672a1adfe2164bb484c0b5f7ffcfaf196af0306c2c0763a6a34f833e013a149d051764db56f8e805b719aa131b1f58e8f34a4069e40ac7a81e05bf936ba9698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c1745c78d215428b8b6e06ac471e6b0
SHA1e94d857c2ee7bd6c2412ca1f276dbbd16ab9a039
SHA256bc34624015545f6c3ea6cd9e88766bac876240be1b720e198770923662fa3736
SHA5123dc05982297067389838afdee54329e8e149a5a70697dfca131e2d5bc16c6d6368ca0173e430720b0463dba0d17061c838cc7232c777162313c5e4b5aec5ec89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514dcd34ba8a3069fc9efe8ab42874112
SHA1e297d745e67adb628aab5378db9e59b1d2332803
SHA2563384aca771405668e01644bc0c013874deacdae1ed64450fa62d5c914cab6466
SHA51216f1957c7caabc0ce50b06177364604d515d2198a836766d2bab7ce875782e84fd6cb9fce806ecef23beadbeab72ab1024a099a586b761a0c4927a2132e09937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a95051e351fa35532c3d45666add08a
SHA197f7802b2831bd4d74a2b8eaf8e0ba88da963518
SHA2561c716f52a44176b3bb3494990e4c64719c051745b346fcab672f7b379fda3f4e
SHA512ccb354691cff1c886e15dfbeece61fe0cfdedaced8764fcf4930653c551b3fc02ddaa66a32c1487578c602fc24df24f9a74159814ace2ee11c2a193b5ee23123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fa20f04ba23dae21e471ddce19ad271
SHA1201d9a4f51330995f9ecf556458e90249da0efbb
SHA2566305790ceaae526c2efa3b55eda0730c40e4e50a00e1c1e846c8b2bebb3d11c0
SHA5120a730110b3bd104e85eb438b699d8835530304834b01ded047ae481d6c7c6fe24df2df63443ace67ec6505b2436a5c44d386fe750b1c6246312bc562bf459ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ed6699d41a84631d6647e1f3e32cb92
SHA133468ac869e89081e3af777e87759e9c9de2acfa
SHA2560794123de7485be29fe4b1a7ce6282038b124de3291f1e27a4887946af5c1fb6
SHA512a00b7b65468ad3683f9cee901532fe1fedf83d56f8c7a772d7527e1f613ff73ff935189935dbda1bb603763d606e89622ea4aeb7b8be95ef2a9e540bda83bc93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58114f33fe2f894c9db1ae5ae87b096d1
SHA1597ffbf4c981b7b2254ae9646eb3d431c1a25376
SHA256965c462e358fee13cf0877519a07a4b081f8c1d547e5848c2966b7a8f340d427
SHA512de491f0ec104aee64d70e982310e893f54b2ddb0c556c19270e7a3322b4ceb5236086535deae958f85f87aa2c6604244021ae85fa15a4dd3462a877f19466440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f1ba12313b6c1cca32c43c4ce4ed34
SHA1e9ab46c2bc9eb65566de6325a856bd8a0f4ba71d
SHA2561a59659a45696316d1ae5f2135c9b59c0cf2b5e42bdccff9768a971064a96048
SHA512005f9c02479db888fdd907264a4d18f47f4593853fbb6fef2d5808f51ac56db35572c9e1ec4d6c389a2f7dcf1ce6bfdb3eac15af74bd46fa731f8b8670b31ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba6dd291d7912443f9cef0a19ccf85b5
SHA18c2b583ebc4f02427233bae5798f1cd75ac593c0
SHA25697b0117e89d4ba7a8ca8423f9a97862c644a3d2b1ec4e8bf3c580dcc72213024
SHA5121b1153e6d03ea81e34c7e2cdfb89fef1451ab6a691c87db1b50e9638342ff4751bb5e4730172c88d3472d8487c5702ba229e1bba2ddc71b8e07c15c1627e8a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c5308e0bb99eb0b6568d84dd9d497f7
SHA1a763222cc9811b8e531dfc12c435af18e14c3402
SHA256de67b46404394d6887517f92f70cf48ffd9c2dd78f0c0204eee16ebcff1e19ad
SHA512137ca5161f8878223bb6cc2d3602a37b1ccd6d4866c20d081ebbc3b5053ac31639004f10c5e79fc2a4e4938f1dddc64b8c96fd8acaaef3d68b582eee2e2673ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d547c083044deed5150d531636de7eb2
SHA1807ace772b9c71b5d4abcac4aee221508853f566
SHA256532d5dddb1e9b4861f0282020692390c071f4333560b23f6d8e596e517be392c
SHA512950de81d54e9f77c57f9f94c4c56669b9d8bcb14100745d3056db20227effb1546193b5aa10bab32fd4c979d09477e46207bc518999330764350eb4023ed0d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5640b3ffe5ddb63bf46337bb286693ae8
SHA1ccc47de1ca012560115d72054c80df1e6bde977c
SHA2568c63dd06871a9610698f1a06943537390897f9f686c57edbd20fb692c6d8a99f
SHA5127cde927c19820d820fe1371291d7adcff347214774975172f9e17e7bd4f2d3c11669715db7a8133df31f9459fef73baa8fbf9d686772eb9a10f33bc80623e7dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5881e3a700d64ac6d4112ed5af9b40949
SHA1186ad2f66bf36293b4d87d265c6e1e233d4cb628
SHA2563b314809eb1a8777189c4a5aa9237362d4e67f431300d3aa87f23fffed9d73a9
SHA512e9300b4f291b096d04805512cbbea38d0c1771c4268a7800f1c0f0d0edad8f9946cf9097b7c5af3a9b9e561702ca414d54265fb742ef60345e84fee3d56be917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58966203e11823bd879b315beecfa9f9d
SHA163a7bb1b305892cf82e297f99805142b5ec66307
SHA2565ae7848cf7a8ad177251e816e39e20d976a9718bc60546d5669aaaf4cd9d0bb8
SHA51288aed3b4a8893a77669b6430f4870a8246ea56ecfcb9e175746feadac6fb4e1d00519a95d92687c47f4217774ee7cdac664c6768968be9627d9c73071e225edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5761869679b79345bd838caa4f066b38b
SHA13eda5934c45ba1437f6057faa0a625ab7f99f586
SHA25644649f51040150745abdef23cd4acdabf00b1352da46fc6b77cd1446760e13b4
SHA512ce9359d0f66da3ff536bff4286aaff49c910d31b25ecc4bc845e1ceda9ffa0510fb78520dbb341c0da3829306e653862adef7e9e965ec9fca03fb047f8909461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4d8c375a5be298d45774a1b4cf22101
SHA1d59524e294ae1dd554386a5eb416e99d72757e91
SHA2569c5e853e2a815270d4c6eef4ee446d0af8ad37cea8b6fd6488550f56ed538276
SHA512f960913bef49efde7e710fff2f83aad4891348629543bf3302b5da92abf84d4753dde02a12ee900d0049d331b65352a45e499139c7608d9c5b6554e3014e044a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e16613162ab6f31ea0318300f5a27ce
SHA17756c8c0acbf8159b4d728a496b3add0332615e9
SHA25695013d7a9c986e29a67c568bd3bf0c8ef93ae4dc2b4e832b3a0ee5393c569e07
SHA5126dd1a803279a13d40540841ae4ec6b467e51daaeb01522d92a7e3dfb1206c4fdca20da37646328a8676e241bb839b23f8475bae44e5e6c50ae620c0ffd1c9d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbc0cba8922525b08cbcf800b59f175e
SHA13d919c8ea06c50016d5ad295c27a878d9cd352b4
SHA256a2ce771b77bcb64a5fd4c5a9f21c90ad5b9d1a1b36e8b15be9cbb53259d1e376
SHA512044f44800a87fd48996eaab884dde1d7f852d5258a3b4630bd3fab95ffe69fe1a4aaf19d2281fd10babf272f28496a324188be411b67cdc34e82758f32e56ec5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b