Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 22:50
Static task
static1
Behavioral task
behavioral1
Sample
bd7a29d64e25ef71f5764f7b48afad49_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bd7a29d64e25ef71f5764f7b48afad49_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bd7a29d64e25ef71f5764f7b48afad49_JaffaCakes118.html
-
Size
8KB
-
MD5
bd7a29d64e25ef71f5764f7b48afad49
-
SHA1
06a260c5083af10d4ca16d588f3222a5b633818e
-
SHA256
d0ac743641fdfcb2eea39052d831f89b8aca52e04b89baca31fe5666725db70b
-
SHA512
a808f26c1cb77141bd5f7092cec4bad2c941be73c8a289906e701041c2ff26a17e1b22d5ac0c9427477729e4157a30c9f46d01ea83873332b60c43a20005efb9
-
SSDEEP
96:uzVs+ux79KLLY1k9o84d12ef7CSTUnzfcsvtF7R569Ehy2Uk0GnUclhADcEZ7rur:csz79KAYS/t9Qcb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1869F481-61A2-11EF-9232-D6CBE06212A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430615296" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1073eeeeaef5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000d0872bd1177b0f8f114aab635c3f6f7426b18143c1ccd419924b8aa32074bba0000000000e80000000020000200000000d00953a19cc236e445de800f6b28bd1a4b4af2bf31545d5fa67984ab2706c1c200000001dc78bbe32028b3e0dc8dcc7799faa44f0f6c32ca538f26ced43f1df4ecd20bc400000009ac2cdda469fd1d3c09cc207f8f02a61a5c87cb286a431f2805ae8aa5c5216719ec19df54fbf72fe5df16dcf47899badb0040d5818846e3fff74b16d994ebe17 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1764 2416 iexplore.exe 30 PID 2416 wrote to memory of 1764 2416 iexplore.exe 30 PID 2416 wrote to memory of 1764 2416 iexplore.exe 30 PID 2416 wrote to memory of 1764 2416 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bd7a29d64e25ef71f5764f7b48afad49_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec31473a549f49dbdfaf4d6e927b8131
SHA1e589cd0d65200225b9ad72453e4dc910fb241b06
SHA2565571cb15f267c617c8abf832a8890eb8a9029e7e61c97b8b956d68e7f680b2ea
SHA512265e6a7483f26ce1dce6c86f1b1324eea811e8563c175a167d1c73ded66f64dc27a947f2a02ddb2f4cc20235ec01578ba8d9d99b6648e85c8d2080ddc2e25924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2500dd5d9f22021856235cbc89ca8d6
SHA1f451c414a99b13a492f617879f6e2af13ba6b90b
SHA25670b1753e7ad8c4db78ba592c82bb88648fc83bceaf2af7e76c9e02f769823f77
SHA512b7c5966cf14870122bda84656a195fb1d01d8001c3be066ac6338e94284ad4737b7e219ff3a076fad6cded03fffbf7cbeed82ad35dbcead0137a8e693dd760a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bbb1a3305e62f0d965b9c7173b56fc5
SHA1e516f8721e3a07d1879148a693b00af253067471
SHA256239c18f338b5d44c13699215d11f573a8df8dd605148b1a8cb151cf7316a4c72
SHA512281a5e6cc29c5d350bd04c92829083c26bf245f7fddfe28db16458406ef1cb34d9c2d88005107425f595a305bb986da98e6c88cfa3261dfda92e96ff7dceb356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd3849408f2b73016aaf5ab7cf3d0f93
SHA1b397948a93bde04c19008e09fd14b6ff7751d582
SHA2562aab13f7e69234089719166926b15ddca8f95defcb20cf1957faf3839a7ab86f
SHA512c623bea0b4c82fe28459d14bfefa893c2a13ff549c8a4b35d6501c4bbb59c2e7222024318b25b80b8c6bf743a31f6efc944fa428b048b7661958660557df2246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c02558325f384daa0672496e9e2e494a
SHA1f66a24145de77bc9297da339d9783bac6ad0c0aa
SHA25695687a5ec28aea52d36d4e45e6255ed4adaee52ff4e5d029e062785e2864149c
SHA5120ac1136529bb0f57454433abc4ecf5ce7afcf09e6bfe2b65bef6df8e33da30e9c38afa9a559afbaa91e27bff10be5b8e7c4d819d6e197f66f4f5dd2b0325a9ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530444ce86006f920bf15d8d5c65ca142
SHA195a07d29fd2202121a1a397b1769154adacaf01d
SHA2563ba7c74ce764974957727bfacc14e542fbdc19000da4b85fa066327493339228
SHA512d23ffbc7578f71481e2db1dd5c79cbc9ad7ad82a104ce195b90ca24747e7cdfff36673e28e0e22a4145666e7882d4df42cbb9d909a5124867f242e777d99ba2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545821ef59ef0ceedcfd598eb4c4b4eef
SHA18fbf0c4a35835c5d8024eba555d944645d58e1c3
SHA256618fc019b2f27ece73b243147701a8c084105d1c47cdca6cd37afdeed0e6002e
SHA5122bb1ba496e55baa41f2e8b6384d394f716337d81df77034b5d85ed986292846db8a986bf402c0a8ce14c28628b1d151a24c97f26a401a0abb5f677929d10682e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f6ef5379214b09b2639b9192939d4ce
SHA13f48efc5555945bfa64bcd2d73449ab3aad28349
SHA2561a10b3f9f8d189df62bf985fe6ce1a8ea9db2f6770c07fe2c3d347c73b01b2d3
SHA512ebcc4a8740d80759f4bed3846f0f9f65afcea7190fcd3a17a6cf9a5706265cd77a385716cc4e8e2e7f5d23d6c979a55866d1c094dca4e2df3dfa2cb97093128f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edffeec83f0645661ead2fb427727a63
SHA1f62247de439013dfb12d445407964337c8f5c776
SHA2562ad76d1c7fb19679f746a9710655178372ee49e424c7c0fc76376f3590b1acc5
SHA512d85dd10187a54a4fea1569db66b0116322e5d2adc22cda7c0182fd34a39a58355b360d5b9b7b883b7da6c264814a30071d7945f1c692f366e0666ac810875cd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5750707a47f7a0142702ed8fafb367552
SHA139ff3b120cc6e84162c8fc8b0cdd81a9825b2e40
SHA256abe348fb6e30cbbd374815618ef00abf1b85ff22db8ec198eac47f6fe306cd72
SHA51292124ce727458a36458dfe79637514938e4d07e917110a6ff1e53d0f388828e8c3384e89abb67719b2098e6375c5b000a35ac6352f63e7eb1a9bf39e4a8248ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7bd5f248bb8d8f442ba703cf1cfc705
SHA18770375bd60ca7682932f1a1ce1dd79b032de438
SHA2568e2e6043ad54212225aba610d73d0b0406949e327f7b853f2109624df0e896ae
SHA512a19f563f6fd8e03f6a95b4b0a518ff5fb0f28514834ab2fbe38fa44390533a2808a88be170c179d7653e01b8770bd69fe7772db103987bc6c8890ec854908f68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0377af0aa3d49b7cad71d3bd21eb028
SHA1e3e1048ef75979943c666745c80cf905886c0a0f
SHA2562311d65ec0e3de49fd2fb3c29c0df68c34c0cefa8b63576ff6c28cab29c53a9f
SHA512f43f89e30d92db1f6efdb02595813ae12d02437292016efa1f03316fc802fd02fe51f6f447492ec16129108254bd461d42ae8b4030593fdce004bc53f7c1a805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514e1ce191a586e678720bd0eefaa702d
SHA1b67d1257df03d25fe212675ad3b1a0b6a1328c06
SHA2561e0d4f27ba8605bd644d407aab36580e3ed7e8faf5f47dbe72263c75287f0e21
SHA512f57a1744e968b465b00bbdbdf452fe18d848cc05e594e367ad4cb6e97039532391ac404981402555c4169615b380f22220202ee976bacbea8f48b56bd09a9328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e52a23980baeec1f64076498b11516a
SHA160fc06ec845eca7c93cc2fed621dc19574b7f99d
SHA25615c48be2dac839b005556b5c862ff164585ba3905a7704d72bae434a530032c3
SHA5123aa4fd0604a158a5f36214c9b25ccbc92c250d0cd2df56f3f2406ec0a5450ae2edd6da2806e303136590130ec6f89e81e9a57bf16b42ac40e239563d1af22b78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e93e2850dc376062c3c37d43f7918a51
SHA1eece51a3fdc43fd149568e5748dca8347263803e
SHA256340020a23ba6c16943e2d5523c6753269ea517a795bbfa957824df5520b99e60
SHA512cf8b9a145442be31834c9f45456459525291133fc458e6d75d9b1419d39a80c906f2a765bceca78bb5dc1fa8a5006693128457104866a667e493dc71756fc63a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc09b568b315a7c3682da736e04fe621
SHA16c88ec06f6c8b15f4a1fdd860f5700a6f114221d
SHA2561dd3f7a6e2d81fb0ca3241847dad3bf9ea842639bf4ad6882aebba00c3300a21
SHA512780b4066224637a3b21d879c2badb03222b8a5ad908ce6524df8969a2e99e406dcdd715fd291235a210588c15f522e5979f34ec7601aed1d29b3fcdfad56487d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59840754d78f5bb8d28c04714f4953c11
SHA1e083497ec2307caab348b3cf4aef6f97d775a8f6
SHA2567fb9fcdbe4f8d8a82a0fba04dfa2371b23b2b5df50130aec2ab9bd8e0ea400f4
SHA5120639daff72256fcaeeb41468ef3f9c5f25aa4f92a827107c9585021f06a7aa09120960cb05269993aa7e0199efb3cd0bdc9dc929f7c6f9cdcc836dd06e17cb0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568f4a3eb1dfd4ae7cbc3dde90be3d0f9
SHA11feedd5662184addf79a8353021afffd7a86534b
SHA256fed3e2385a08990dbb4fc987fc373c67be18f0f11055f126bcec8b205ba93c18
SHA512abcfc9efae3cedcf351515cf67a16392d15fc1ca788035b862e89ccd79bd55bfa0fe5aa686d4f8b6b4c30492023c7f0ec3b834e49ca8b28ccb2a0f8fbd6ef60e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1930eb4ea69ae0b239f19ee3ec501c0
SHA13bd01bad8bfa8b39cebd332aa654360c9fd99097
SHA256d18d12444628091760b8e678acb8718b9bb9c514aee79eecdca687832c051c45
SHA512598424211aa859252b8a257fefd9e7441441e46672a8bc5f8936cd2bd3a6c4ffa99c5398efbac68ba8e471ca03f7290d4c1d4d6102ddaee537c8493bc2250bb4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b