Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 06:24
Static task
static1
Behavioral task
behavioral1
Sample
bab1ce929009ad305abc2ed0fd02c846_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bab1ce929009ad305abc2ed0fd02c846_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bab1ce929009ad305abc2ed0fd02c846_JaffaCakes118.html
-
Size
90KB
-
MD5
bab1ce929009ad305abc2ed0fd02c846
-
SHA1
e7ba928b72a49c699f64d28f629b15c7c7333a1f
-
SHA256
6c25e14cd80f48381d8f1de804add8ca71f60d45ddfc26cb485c684e9ed30d1b
-
SHA512
6826038a89b78de4737e6de8d0005da138f7e0b19f3d5964fece87ec3c1c730795c2c30404a4cbac7e3a1225e8449726bfa7aa7947e9b1269398a167b40b800f
-
SSDEEP
768:p4JniSZtZLrTl3ke7evdY/YrMBHdziWq11KiHrZtFoHGYuyJcWcua5+FLTHfCZsq:sn9t9/p7ewinRyBSHuxRGmXXpMd1Bl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430556136" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05d632e25f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000001fb8b53545e74383aa092d4a801abf297b0813359adfc7182175b6d80b178d88000000000e80000000020000200000009f52c7ce81cbe0e9998b4d38622277b7433a9598c5027852f5ac57495a744bc62000000088d7b69b08cf932110b4b7aae71c486f72a0b56023822ec4eb4f8064aeedea3b4000000089b4522946a644855e92ad54ee396a3571ffb469021622e0c73d77ec58bff237209b8157174d29eac8343d0dd65a29a51a6e7e953198b52a7fa9719c03f26329 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000036ad8e351cf0a83f1babf9ca181dafc00bfd259d9a772bb4998562928b7b6f68000000000e800000000200002000000017226ac6f632e60e9b63b5500e1e7c5dc3f262a5fc7f306f7c9cf1a848381bc190000000a8e159c4bd06fc4ec373fa63c02a0c5dfae3bcd61a20ab6b3c525a08d21c568cba2b157dde8d00050ff64c4775bf1ffc4cb456307dc30c47c52b414b198c7c0dfdd358886f178c3d587715f9b0ce83eca2d4427fe79adbc681fec7aa774b005b00ddb2f71f97da7eacb361cee75396e75c72cb9edcd476097b98856114c17603d23f06b9f24ef956a8d55d0ba19f934340000000e6675a5eea889087d29745bedd9c8769589796638a2901e7869bc153e61c8e2ddc077560026649ca7ef5d613ed2941ef073616c286e26811df2f870badc716ae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{59A4A331-6118-11EF-8893-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2188 2692 iexplore.exe 30 PID 2692 wrote to memory of 2188 2692 iexplore.exe 30 PID 2692 wrote to memory of 2188 2692 iexplore.exe 30 PID 2692 wrote to memory of 2188 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bab1ce929009ad305abc2ed0fd02c846_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ea102c16089838eb41e82425a4f5f3c
SHA1536b6069658b96af42e547f513efa830311fdb6a
SHA25615e7ba0eda46f91508fbd352a341458fea9b4ec826fc46918de2b846fab80745
SHA51280b2feb323cac268ef39fd8d4531ed0d75b5b9652051a20b4202915c6a936e9e874e3fb070780ea6a6cd715104a7dfd4ea7dc5da8c36450959c80324f2a806ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc0e3c2f705b8b807ddebdcff7631b0b
SHA1108e3fef90038a61a8cddac9bec4693dcedfcdc5
SHA256e306ed0842a0576f2d017451ee3f3daf11fee149b665f874e0fbe4dd01c64561
SHA512e5e5ef2115d819ec99e0d7e06f209d6325471a7088d477ea0b8eeb97d7dc98d823519a5fb2e10b976b23943862581c421aed50003842bfdf1a7721eb36fe5325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54599029be9dd79108347a108cc2799c5
SHA1780632bd7d3025e5c60996975c8a8c4586cb6933
SHA256a376016ea8eb6278716fb13270012305206cc312106bb80c33cc455d340c01b7
SHA5122c1f84c1cc0d9a478d2a67ebda5e646e513d9001695c54da509629169df95e2bb498c7e95877cdcfc8dc4b6c963bb87fb8f91839e64bd0ef43a601f8a05fd1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517b878e85d756be6fc53a1f5098ac625
SHA183bcbc2f33b945d4113732d3d6e02e3e7010f6ab
SHA256144d83b8860815d53bbfb251c402735cc8f5d9b78eda3918a7f245154756dfb0
SHA51218ab94eb9e8b1e4df9cd95af5cb9b8b0f9b80b8a7a949e298907f6a24e916228615396a34f1c60a8b910f60603ed1b4582979fc3d3eaba2a828981a012b815ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd5ee121addb8447942d965d0fef5564
SHA153bdb71e13147db076330be465cdab4d67cb09f4
SHA256f9e8b2461f4b62b12e99bbff1db84d6728e6fd0cb28dbeb504c20a4baaeeeced
SHA51244f60d6ab62c6eb835e129b96cd8bbd424a6b7a6265acdfca4ad1a98030d7cb0ded9d70521572b2242a874d51ce4e9a0912c1841bbdff125a02e7636ca6d73df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bad13a96182e9cb49704ed919119cc8
SHA1c6f38d23a57c754f1915c3c7a614925d5a44512b
SHA2562242087d7ba618866126794a2f60badf4989e9de6925728d00e0077d3c0097d5
SHA512d6a099104ce59c6cd3839838742db168d4f718d40c71b41834344d07219fc2af6a930c289bbbca2040eed946fd7090b96685ba96d72ccef2bb6290601a359194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c33ad28064896e77676a638f8644b290
SHA18af13ae93f19dc93e92e0e19efe139689007a2ff
SHA2564db19affe7e6d9ab2c868fcd14e2fc02ff7e6fb45d6c688b4c42574e3c5088b2
SHA512fa593775a28c6823a25ef8b74c086212a776b522c48de880f0b854e2fa285d0d78628192a9e6c7d3e902079bb91955d0afcb61bc3d7f80f9ecf14bae9ff75061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53089a20167e3041f1c604c15d3d2665a
SHA1cd95bc8c407fcac56b9e61875e55137fdf7a62a8
SHA25658369620552b052d60801f9ad363e4cdf9f1b10c7b1a41717cd92ab413f38fb8
SHA512009681c4583d44e1cacd99455d19319dad8f9d79a9f00470120b2349947c8fec7edfedf2f212d34c5213adbf3cff88e09a68807864e63d981f319894e15a181a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506482b7b1f93629792ded68bbd2502b3
SHA1acab54c405d9225c0da509480e5d6b6b4266937d
SHA256f0a998a8baeb6b3586c9c7e01a5b3ebcde1f5c74cea05229c83f311aaebc9aa3
SHA512f799534c485d63df4b7f5b4769a93ae648fc341c5f7a46b8e115e6e04e1d9da011b1bd8d579ef26f985c66d296c93d4868d43b65c5b523395edd905402f1f00a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3c16786984cf119e8eb6267aa611947
SHA1a6baccc043b590a3298315e735f9e32f824c233f
SHA2561c63024c34eb8c1c5f0866e54630e406deb5a37731ae6716ede214e1c2450b6c
SHA512cf0d2ff81b77d9cc7bd3076b95a9afbbeff22801a99c1b7b4509a122aae3ee56b9aff91ba139cd5afeec61e500e123a6d9ac98a353da509b525f9c0c108ff4b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a52abc2f4cb70c42cca50802f033dff
SHA1f8c5865868748bb5ed4f8671e8a3f675474dba84
SHA25622556c1527266ce197dfb195a88038174155c68ca4a66ae1f624113befbbb1b6
SHA512010a1c6dbf4027348c98a2249d4e699b12a1275ee78b9ba13150d704da7f60e6479c4df279a65f743cf113a7fab8f14882b01a69325f03f283e27edb7084df1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558bbf092ec74cc05baa93a1a1879f734
SHA1d4e6bc019804665cc935a650674888d4932f9030
SHA256f8666a3910bc91b97181205483920c1ca7d76d8fc68170f60a57f6c12d5bbf9e
SHA51245a71e832a60af2d9cfa7fcfd4c098108eed233b31f1711b0f2cbddabea8e9a933f79f237b4e8b83bbf167ed91f887d1a349feaa6549634c967e76979e8931ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd1e542d3bfd13402bb38d2fb261dfc8
SHA16eab9c724777add85ef4f82625042c02b49c5c87
SHA2562f41d645e22fcf603ce0200dafadd3ba5ce36948a409736c732cb914b8888045
SHA512333c173666563d728b5d17cbfa83612d9c2cf23b31ca20ffe285686fc9a60da1893088b7b919436ce95b58f0666cab4bd8a82655efcd91713ea7b7e89cbf1caf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e12bda04290d5f40ce1fa9ecdc87b58
SHA1950525cbe3c791493a87cf9c3a10941cc6b74e30
SHA256d2edcf87941f7b3d4cba19a80d01984754e122c1ed02e97556eb4a65f71bf0b3
SHA51230d653e8bc5450a2dded89ab3f4d862bf2498b19476bd5df5b5a25b5f307cb3eecf20567b12dcd2152c50af3795534357410c2aef7fd299bfb2a040e0881dde8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecafa2cd74e1dc9775d1809a8e88bed6
SHA15228b7c592d0ebc0235960be91c04c7169e2eee2
SHA256bf96c19bb382f684f805ad3c5010d54019a9b7ba3383ec47e86e11fc513879b7
SHA51278adc64fdb8518a8095837705d4fc7a6dc8f02be0ccc02197c1839f43fc2d46d855ed4abb2e1dc251e1968aa9051f8c1875f633dc92d8539aea3a708373d13f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5062836f44ba2953545a285c0c71d652d
SHA111921f40b9a5dbd290a5482175e4775ae800b23b
SHA256cb1f18d7c3c0b2f1b0d5183276c5c81dc6c7fe08aca9ae854340089ab027b0eb
SHA512d5359205b9e357253982928a9c3c770ece5db43072dff0e187ca72ac7421fa7ae4806f7c1eafdd3cf43e47ade7e20b60798706defe9b87bf872bbb574cffd7f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ede5231afc0654ff84b14344382bf836
SHA1003adf614ca451230b86279fcac919f312053cc8
SHA256cd2f23b0befce08ea43d695c79e40294a206713bf6a6f5b1b16cb67a1a385d54
SHA512bf4e158eb78ae84007148d26f34db3a179b35c795310bf1c37dc4f2f9aac69dad6e23c9436ab72074b9216c503ffb95c4298ebf544545457d9dc36502bda3680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531d2cc84aaac2e2288a2742dc271d9a4
SHA168438a5d971a9cac4e6af629a3853e04c51f2a3b
SHA256679277429049cea6e8b61e4f38f910b780fba4cf4f22a78d65772b920dc630df
SHA5123aecb2f94528e358d8ec1670ec21f325aba67d2b5775198387d85de613533e6fc6ffc9464ae1f0fccf58d93dbc06ecbcc1dfc1d2e0b69769c0edaa74212eeafe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b