Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 17:17
Static task
static1
Behavioral task
behavioral1
Sample
b874f9cd2847912731d6e139312221de_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b874f9cd2847912731d6e139312221de_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b874f9cd2847912731d6e139312221de_JaffaCakes118.html
-
Size
5KB
-
MD5
b874f9cd2847912731d6e139312221de
-
SHA1
7bd99b3a2df147c81a359515a42c03186211a3c5
-
SHA256
1a8190694eda3bcadd631ad5bea477c468bfcc2c158ecc247a68c24b855b2581
-
SHA512
9e3b0415b67f5069ea87082314e014bff2dcf2352c0d1a9127d5a5274faa4d3aaba3beec17a5bd4b08a398d0d7a2f4928138de265def85f04d2e3ffbb36d72c0
-
SSDEEP
96:uzVs+ux7Pi0LLY1k9o84d12ef7CSTUVzZ7ru7f:csz7Pi0AYS/k76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430508913" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000006a75288e204949938d7e9cd0e5b50446206cfc1f5dca89305de38af6e173a526000000000e8000000002000020000000b3939f935ff0a93129e17a093a8eacb52f8fc20330dfcb85791be98f694e08ce2000000039fbe0cfc0f46b23a2a7426a2257f7154e90eeff418d028ff9846dfe61fae64440000000cf6d214b560c9b1c883c1d20450b3e7b2512b73562f0c4e22e0db603b28cc04b907f1c4a0f3040407b398193117852fa82dbfa8eaf960367fdfbb09d5e540804 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{669CAF11-60AA-11EF-B65B-6A2ECC9B5790} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e053943bb7f4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2556 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2556 iexplore.exe 2556 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2812 2556 iexplore.exe 30 PID 2556 wrote to memory of 2812 2556 iexplore.exe 30 PID 2556 wrote to memory of 2812 2556 iexplore.exe 30 PID 2556 wrote to memory of 2812 2556 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b874f9cd2847912731d6e139312221de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2556 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4f7f98683a7018f05e83293f919fd5d
SHA1ed2158aad3443d54a3e86b75495695f773dcac60
SHA256380ab03f676607a80a87f8182437ab8feb5ced0885075994fa69b0e73d0d3039
SHA512f9081abffb83af79a69064c81e14cbbc57acc35a3efa1b942aeb4a1a8b89eb76dee6cef239e7784f2a79b203c8a2a0624926b7ce179d5af7ca44501df5bbf409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d4f22a952a2b24a7087d435a8dd57e8
SHA110d7e20bf30a81a6b691ada9cdd13d22132548f2
SHA256fe2f3b31eabe8102fa6b96d5da0fd6b1a65a70600019917ca03e48307dda3d63
SHA512b9db4b6b4efe6456e962f7018d6a2e053834910b29f6a64dd9078eb94e1665579f0376955cbd96d1cf813e6d6aaa204ca17ceb2d7fcdaa8ad4bb0cb40c836549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f06ca0fa32b938552c44feaa86d9bd2
SHA1b0dbdcb08719635ac2126b2270a1367ca703fbdc
SHA2561f5306daed918f23dd8d4d72435cbf29bb85cd841ba0880f40a922b6ef0f5f42
SHA5122023cc02d552bf16b1cb40eb88d01c45c4640acc00c170594b18b2376ba735a5f1ace33155d2f010320a94baaf7a81ea9774d386dc3c332be5d68bfb16fbecec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9fe29bce9ea9d0475af0f9a6ce7a3f5
SHA15abdfff2d3febfc9d9ab5728ac3b5a959172277a
SHA256aac2c7c733bf5b1f3e17c9a5f2b83fc665f2ae0449ed68890e742ace0d8a9757
SHA512691a561a3be166c7544f8fec1d4f3d54c2f93cd7a86403579a148e80bf4db95e9c5845478f4b11ea1a43d7952c62c9fcc13ca51a7b5654ed01a04972798b6934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542ce0c51a212bcb9a3f99a0a9f480716
SHA11b4848173185b5bf180c0bea852a0666aaafc5ae
SHA2561e5942053da875da5bf10b4976053a1e59156209bd887f46d6e260eabf0c7373
SHA5126c0e79593a0d0340383bf4688b4265bcd2004bc9e925e7b3921bcc065fa7be5eb40d682d8549600a61463d01d1363687334bae090997de315b813da04bf4db9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5536ab4cf9f0c919d7e35fd82cbd758aa
SHA1e7e386dd975b9371915807173f2af8b737dff513
SHA256b45d617cb0b0b6385b3b5d88a3edd1d53b6ab961aee58ab297cf648569b66c62
SHA512d4761919f99499f144de56c690bfc028e9bdbbad32fa00b3afe52ba668f668ccf8e6743640c07acf8e0e2aca97af10d9e50d9a1efc6be04ceca970b3613d984b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5377c07cb3992fce17d7b08951dc21252
SHA1ad11c63739408537ce2227a32716fe0f311029ad
SHA256f8b67fdf85dd8c9bf8bbc457336430eec8175465df3cf1e4dcd55d0683bb1718
SHA5121da3eda3b153bbbfb839ff5ab6ddc0378ab92344efb2243b1eef9330e24139b2c9310bf527db693ec301717b1bd5314c3ca8bdaec99394e37ea6d216071c29d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c88e57fc45f402620ce3df9ecede89c
SHA1ef75180cbade6bd124a4291ca406a139da1acd97
SHA256d593d9f9d4c6860b8060bc7c7de4887c9bb55332eeb41b0c6468f3baa513a3cd
SHA5128ff94f55ce39ae89d66ad7dc8603c2445749e503f74d83aba9647609ac6fc3b1e8dea0214e6d1f87c9ba561a232baaef5bb67acbec9e43ba3437b7a9ff259e7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576c9759b04c969da6398e7b4369ffc92
SHA1875ccc998f3e9afca31226da72299cf2f9a2687c
SHA256f931b9d635941c3e2f4be5f096998821035d1027bfe1e73130528d572e7bc617
SHA512888cfa2a41cae284801afbebe4b8b6db98f3330abbbc6722eed8416ae44d3b93fab59fa442eb780902a1d9766602ffc22e0020e35b68246b7c74c048551fda7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aba4394c989e949b303d8e58f057e9f6
SHA1782843ada62b39d06821b384a0eb96f3caccbb08
SHA256ba21efc9be84b9730ac55e558d17a9f0a2fac18ba2c1cdf047e20173b4c5d445
SHA51256ed921197ecf0e9bef3cff76f6c89d3bc9435581dea0d25ca11ea7d6a7829ec94c64798b87ad0e4892eea46f70ade209de2bc759cbc4f87d8292b6798b83ca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaddc87811dc86e6f5c09165154deb55
SHA1e3a87fb01b6528e7f0b66469d3bf1b05d1cedfe7
SHA25602593d7a52c8b70752d5b36303b83ca20ff976c52fa1cdae09a01bca35bded93
SHA512c968abbe1a588da6bbefa020d351e1976563c4dffc6f230729f0c95b286367c1eea7c7b047b12de74dba6d1817e16ac1aa5b9f7491838ee8c1006fef902d7713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7d8635e4f8358a5e2d7e56948ba5e8c
SHA1b6d07d15f8e9d29460ffc5ba5d3f4a440af509bb
SHA2565257a790164c9d6f465789a7b09f5632a446887155e5505e8d2bd4992b9a1601
SHA51265224b2e40ed9b9f38e1921426200b7fe7ddabb4f939e8e4e7c7baefd75c808eed8a6c77e74d88f14bceb6c477b28abdc8233a002c1143d7b10ad3cd0ec6b878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f36ce685128a6dbb6a7cefd938d5d24c
SHA12cf4eb3eae390e9ab150b69fcd8a12f7c7f6ffe4
SHA2564627143f06cab5aea5295374ff208048d2ae3f64239b320dbf19f59e650de19c
SHA5120131b75940de8ebc8d4a1d959a9e3fa13b5f0d3f5170305fff3f55f2caebea413b7666f0da41a1a906f9b6846b4700f414f8ead17b40091ac5cf98fe5d0340f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dd670b3f97d036acd676c7e6457dc63
SHA18199e920c10284c9c0e9f3be4f833e0dc00951aa
SHA256da795985d3678cde070d427689ed29cde49396ea15b557745d8c683402aed21b
SHA5121b370779714eddb27d6d3a88dc5b479eb4426a975e4039427de2103f41a71b9412081e4b071c0547ebce26424af11415e3941367e1a3548169457f17fa3bdfb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbbc107656d907c0388196225d6c67af
SHA1a4344ce4f1316d416c441ec0275f009ae6428d6a
SHA256bb6dab23beeb94867f79286385929c6a4ff05430a7b5a34179058eafbc675a33
SHA512e39c0e3588f1a4485f84abba884f5e44e825923afdea9e37b1d80de2e1d045cd041b566c63c6df46e694c909ddfd7af4a520e2fa4ee0b8bbb7d65a1f76b91b0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0af6221116e87439c70ecd6422eb4b0
SHA13ca40a406d76eb65201c1b45904ec4702da2cbab
SHA25692c51afd817cb9d8a6a7dc704cfc86d9e4ba5ab386df960e345dc27f4368ca0a
SHA512a1a38eee62818a4a4d155d4ea12ded6ac290c71ce8eedaf56812c91da3aa3e9215d8c2b9776b0f5ff5dc5e0a7377f4de8a18ffc6c83dd7df0d58721c5dfbcd40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f141767d23a004f504ca6d23a9408318
SHA1880d615d9b45cfb2a16c3e3631ab5c18ff814806
SHA256a8fcf006f38c10d1fdd28d4f3690c8356b18cc57a87da340338a3ffe311dd5da
SHA512be81f5a90a49eacbf57d75387b5d5d3222b0e627c5b3966283907e4cb8b08335e27b51ad1449cd6ee8b309f1d4f342ba4113221c99f4c6e9d46377ce34813372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569bc8cc9e10282d60013525cf64a1161
SHA1d0f3d9c6976495e64918297f4954d1cc36320f29
SHA256bbf4c966b5a31ad4e06a06560a644d6ca516ff71a07c178caa9ea64eaec5d308
SHA512e5353b4ecf9a6f8f9629d6ea64ecf5aa15a6f7c36910ee5ba72689ce3d5732e811b302b4b1a68b20a88cc96fbbb48c7c496e55790dd315d168fe7db5b09206e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bce006bf649e5800cc47304eac4aa27a
SHA1486a4b513c08e55fcf3bcf997529ef643241924f
SHA2560b33f8c18366eeb253de79051245f04fa88e35f63574ad11b90ca19040642e11
SHA512079e8a3a43deb5c1de458c8e700a2d96164194df8d287ee1274f6bbb796e0c1fe378dc09924a49ccb93b82004e3cba166791d7f6e87cfc4f6ee594a40a221809
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b