Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 23:16
Static task
static1
Behavioral task
behavioral1
Sample
bd8aad63dc3a49537870d2965fa5b71a_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bd8aad63dc3a49537870d2965fa5b71a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bd8aad63dc3a49537870d2965fa5b71a_JaffaCakes118.html
-
Size
68KB
-
MD5
bd8aad63dc3a49537870d2965fa5b71a
-
SHA1
3f66f3bc17e6cc715a7ace8efd56f1175bb8ff01
-
SHA256
5f4dfa04a0855ffe08ab4b47fd10300bc9aa93b23be4f98e03c8c3c8c74aeec3
-
SHA512
dc433c571fbe65f2a3085c3c06d3673828b881cd00203c6fd538a0bbfa3f872837326851e7b4a9f15b607dfa6f42f879269fa0f27f90d054d91a07e624a04a23
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6d7u1xcNCcu/oTyv1wCZkofyMdtbBnfBgN8/lboi2hcpq:JJSIxXvgTcNeD0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000524de6f54dfe93a2924f4aa1a3460010cce263ffa29f17a6a3c4d75a2a9fa8cb000000000e8000000002000020000000bd0028c5519d3c2db0fc616800e91dee0e83ffb10af1d16418f8af6446c559a720000000fbed5e169d2e1e0575e348bbcfd4ec39f84c742b1267726e613aa7a4b343ac1640000000fdbcfcf0a3cf5aed2a93d69c8d8153c08fb3a275974c679cd92ee08bcc45d63af923c2f60825595894bfbc39486d0e8d17c62b35301e8b2e5f052f50e3754edf iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430616891" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0015d3a1b2f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CD469DB1-61A5-11EF-9628-7EC7239491A4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2764 3028 iexplore.exe 30 PID 3028 wrote to memory of 2764 3028 iexplore.exe 30 PID 3028 wrote to memory of 2764 3028 iexplore.exe 30 PID 3028 wrote to memory of 2764 3028 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bd8aad63dc3a49537870d2965fa5b71a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb493255237498433dbbecda75e56e2b
SHA1ac15de685a9dd1d0a1f581b86600adeacad51e63
SHA2565dc5f8a13337c56aa4234cebb369e86ceea7681dd2d2c2ff25d05d81b97489d6
SHA5120abf7d33d14143094f787f3c9c127ef765d86bd8b70ea288ee83206a7b387a20a6df242d5a769fa8fffc51f3c7032675f144f98e2b131c80b563d38a2fe7eaeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e46848c04ed68e2bf195bf3ef248317
SHA1c090d4dd8ab5676b6ce2275ddd8f44c838c9bef2
SHA2566d6e195bbe2771b9a2f7f2c4a6cc32d0819eb8d75d56f360c1c336b76d323418
SHA5128fa6f723cbca9dfb15f02c84822ef241ddc287660ffc8f6d5d6e3b8ceec49ab90870c25f82df46161c6f5e18f9949ddcc7c34bf5885e363cbe6bb0231ca9e111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b82e58fb8e4790de539c34c30dc8e1f
SHA18a7929b466b09e4fb46a3e307bae63cb3fb7b144
SHA25646642dcdc322ce4b47cf40eb9d7913b259fda5aec008aaa90fec373222a88b4a
SHA512f9179eb11506736d2aac84252f15dd21d2bcf9b3328ab21f5f8137c7377be15f0c2ad22a6d3b4f6817b9cff86a39f23595df2001a3b461cc87083fcdcda0f6d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567abe15e587dd7ac65c53035b2bce843
SHA1f1458515c3718bbd6035164efa2f1637f47572ef
SHA256c6d7de66ea2c197bddeea9514b19d3bde7a44c9f099abd10e2b02029261a52ee
SHA5123a9ebfe87def156173e77e302caf2403801ca1230388c46e0c22bd9ef9fb5ad3f184632a4c102f5b326aea7e2d22094c9c6cdd7fc6e0424324ba9ec73bc9f8a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b2405a673cf943283e6c0230e4e3c48
SHA1a8a0b587382b87e9ac0d73f656737f39d936228e
SHA2562bd8b9a921951eddc59941561cce82915e6f74f48ecdf762dd741ecfecc9b51d
SHA5127275cb87dcc3fc1e5e9329d945097d1498f8cbe5291f810e83cd29562cd6c1fd71e66bb9047b0b1656ac25ecd96b30c55adacb7bcfc973d55413aa5223c0d2ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d4b282189711d9617b9f5f1735a518d
SHA16baf048d7ca9c8a7eab69927ab54752bc41702f1
SHA256ed697d7cfbb3c21f5f37ed50f696ed0d22d12c6c7ddeb759d8d8935ab2ad2c56
SHA5122528c65ff3029518f0be0025c0e9bf02e9b66ccee93e8ba0eea5c70408a1835d9424007c3cd1808f09e25aa5386bb15c6631c2a7576300c92533fb307db3fe14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd7424f29d26e9b585ac7ce13084650
SHA197d3a7e613d921c30a87d8fba1403cc98fe113a6
SHA256d12893c59f72b7a2ca37601da5b12c5d18ea9d8b817f2927ac377c5ab3265b8b
SHA512838f6e8d518239820ed1f7524371bb33cb543db126e92f25a0e37b63913c26c85a16cc113940aa3bc32be10d0ed7be3241abb1b3c7d2d6c557396756d23a98ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dc503a8837bccb3e6c1c45f0e4aae68
SHA152faace4052b010e1072e0a40cc27c16baa3812d
SHA256cfdd15ee2bf000c81fa56a7f06fe5d23ba611744a2bedb3f0254b0b341b514a6
SHA512abcfda8bc902db217fb89cc1633b8a6dbb9bdad8feadb5fac7d59aeb7ae44e426b612b2989510bcabbe4279ac1117c2c385e2c5ff05da6a499296cfdcd6447d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5205d6280c3e1832d26f40f4ccc89a1b7
SHA16ca8e94d62332120fed7e690fba4e13ffe284c03
SHA256c242a80228f8f7a4550388a9587880980bf9af35cf277fd38eea102672a4c1bc
SHA51220d979fa12973b26f834ce7bc80f7078c0c3e3468e25ded9372ef0aa21e21a5a186cb927b4da3a7bd6657a3b9df82722a6684ee9800453ce94712cf3a8b6be93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f91bde8540eea14d6f1020ea02517271
SHA1bd6353a5ab66427b8cfcd97f3637407559e241fd
SHA2566da0a2c312473f037095318024a7e907722e82e10c3f4acc411ef04cad9c5651
SHA512a0c2955780d464839c1d20720d82e9e7ac0e5fc63e06292d4d10c4c48a2f9a1d21beb0fe2ad757d7b1179bf5d3f0604d09a0df97b3569bdaf63ef3631bb82f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efb5ead177365aae4a6c00ec67594bcc
SHA1949b5361bf8d1953be8a070f7ac02acbac962a3c
SHA25646269dfb1235eec9c80650cc53bc28a0d204226e5e3da96a1acd75f1ff5d28bb
SHA51201ee8b85c07ed84c97873901eeb88ecab7de24701fa19a4e7c01824570815e46ccab9432f3865214323170eb4736fb2fb3608b243fb4e5d51bddb16e1a3d1981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5012d0d6a3b166add517ec0182367b198
SHA1eb1fdb2143ec1df5cd20ec098e6a10cfba413639
SHA256948e80fb39e182fc0b0b3e4c7e50253f1888a3d9a0d3ce59a37863942532ecc1
SHA5121c2c1065b3462b4f66aa8e37ea70ead67710f72449233298383d24b7aa2b1d9c39ad6d0e19154ebf7e93252d9bd3eed5f037c73db3db9d8a8a3ba232357453fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d67870177699ba5bbae4824d7352d3d
SHA12bddf1aab4d656c793fc62acaa17cb0698cd9fc4
SHA2568ff8b16f4b9931183831ad0c7a3d43f3b3e8f2974991ec4dc78b9b1d9296cf8a
SHA5127f258d86b01a15d2e4ab93cfa697bc7fc0cd2e4c6f22ee8a310accc12d80aa779bb3e15a1c2a2a57b15179ab2e1e9ffdb5caa7b4f1a53cc3c6a8103639806ab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c23ab8e880845cb67b413e33d5aa8e12
SHA193ea6df25c064e7ba560fc5752c32214b97b2b22
SHA2567561dbc820b577d7e94cf5b04366b38a2233d9cf7dad81bd67357be67a6d49c2
SHA5126674cc1340ed2688032497adb4921fa704d6ca56739058524b0a9576133e4511397c86790e466c6eee0a7338baf26a1f3fcf68ac3e55007611a4c3fe0d3b51fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fa2997999f026d1a42e54a6ea5bb814
SHA1950d9de2ad95acf55933a3ed2c7b2d2edf2b998d
SHA256c40a3b9fb26944edf2df7e2a890fae57182f600d923aea1203b22f90318a742f
SHA5122f03823481c30e580b8e704fb3495f77434c20f54bc8d90d2a2394ceadec7c02711face213f74f11d1e3b48d9196de767c238cba131e5ebf6ab8fed1cec7bf2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e887624c0b2f8b1e918554954c8f2b1
SHA1eb68ba0a38ca5ca0b596b7166b006cf019bb79e9
SHA256a20d0fa935e09aca9935b026fe9f55bb435764d12386759b2279b30a5d875617
SHA5126b9154225cb4acc99cd878d5d6af6a9b6b1f30374732c272922c8aaf7945e6968711b6ee2b134fac91d3ee0e9458f78606f11c973d391f0cd6cce577d4c73a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53226fb431d057bfdcac233243fc58e12
SHA16ad8a74b4df435f3a2e8a3631e625b51469ebc63
SHA256c06dfb6ab6b9113b0af2c1c8f053d8a4d330f585d20f77105b19dfba8147dcff
SHA512a867b7832db2e29da333335f92da43697383058f3a28d9f0b6b02165f822c3782ab4288a1c1de7ee0c61f3dc5051ac4e6d42adc36788fc26d1870925516fefc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540fecd701bbc1537b870b3fab24717d2
SHA169421fca4f33ab1ebae9947ae8afb6da76909632
SHA256de2651b780aa509e27de022aa2c9ce7660638131336c6fc6ef4025fab5bd575c
SHA512bc9005a5f91e447aab1bb69c22375cd65e1f9d43a972870e687efa8e5bb188848b9c35e7cc5ffc7511e224795865d6e67042484c80a8e8171e674867258a1e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5136a05d2c0cff4090c4fbf1d7331a8c9
SHA17ac3a0e7b133ad343a60918441c6d88c6e809032
SHA25637e7bc91a5ac82bc684850d821d69685a8b39acf40cd357a2322509bdf8b75e1
SHA51250d1a612722741a03de1ead84aab10cee722fe454147747b4951f71141ef09d69c8eb47209632a1868e5c237cefe0cd26c2556553871a084c786a8bc95802a0d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b