Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 08:50 UTC
Static task
static1
Behavioral task
behavioral1
Sample
bb0ff461cd363def3e3960f67fe10a07_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bb0ff461cd363def3e3960f67fe10a07_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bb0ff461cd363def3e3960f67fe10a07_JaffaCakes118.html
-
Size
286B
-
MD5
bb0ff461cd363def3e3960f67fe10a07
-
SHA1
c956db4b8a1d7a6acbdcdf8019670517360a364e
-
SHA256
d0e3d7f4579a55ca367a8fe837efc82b7db48c7521805547c01a435f0acae706
-
SHA512
9f5ca9b8b01877e330826fe9bcd719fa28797df990900b2286888dc699f0090ea1591fa4536ab9c621a72427ea1cbf33206e662e4f3686aefd3c478e568597f7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0efd09539f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000007fc4a199a89e428b8493e49499e7bdce75a6fe044fe978db30ceaf362d22e68e000000000e8000000002000020000000402f95ef74a059084f457e72409740395a1e82700578b93aa72b153f59dbafa62000000016f715cb692caf578d3f6f25d35206a8dad01225e088abd31a3de6b6ac1149b340000000c629869d9081393d8f47af4bfc558ef268d53035b42b5497bdb3edaf67402d49bdcd756bb4e18dfdba9029f0383a9489fdbe5de715b0d7b6e842568dad515d2a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430564896" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BFA23A31-612C-11EF-A0B9-DECC44E0FF92} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 3016 1724 iexplore.exe 30 PID 1724 wrote to memory of 3016 1724 iexplore.exe 30 PID 1724 wrote to memory of 3016 1724 iexplore.exe 30 PID 1724 wrote to memory of 3016 1724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bb0ff461cd363def3e3960f67fe10a07_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
-
Remote address:8.8.8.8:53Requestrxdrugstorechainstablets.netIN AResponse
-
747 B 7.7kB 9 12
-
747 B 7.7kB 9 12
-
779 B 7.7kB 9 12
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ba391ea429dce2be210986cc2a47210
SHA149e418bd0d99bee0bffb55c85643feb35d03a38d
SHA256ed701f145213abd3ca3dbeec173c908dd3e74b700407fa26bee40f2f86bce1d8
SHA5121fcbe0beb585e0604871a05c6613c1c38c9e8bde6653ab4f7632a851a7b5bee91bc578b4f708e9edac21bf172efb6578c379e52f5665a9f679d8cf3b4067d79a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51903453d93cc6e857e2bb7c4837fc1cc
SHA19b1db460e00bea76d43ed479a2a5cd2f212d6e61
SHA256bc76f807d84bd199b315c411e27277ec9b3b36f0eca1867ff1d364fb4c48876e
SHA5121b8f8f87663c810ee216f89247e523e07ab2286c91867f52fb7a8b1d3052cde818e8bbcf2ff6493c82947b22cda0cfaf57c9afe4789d01264b53a3f96fa8bffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522007799bc4cb057068049f3b3c04f00
SHA1b28bd2b6cb4de61fa74d7a09cefc9df77fb84c0e
SHA256349d7c2891dc85b080de62cd59abc3af1725647ed3a445f0a63e5a594916f502
SHA51258f42f1c2241c6b98c937d628e9ed9d8dc96ed6a9d1bb389e141cd5f125b8a838f1ba9c7f1f954d436cc7d7e944bd016c2c5761ac651e0d49772a00dc78f1581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd682272823d363e915707ec20f7a4bc
SHA1ecdfb35c18ddbb81bccd9c2dc47a7c22552d0517
SHA25648b0ff45b7c6ffa799df52deb126c13a5eab75e570d7d040d3d3c0ce58e67b96
SHA5120aa6f20d343db86422e5af0683bdc80d4869c12c6b6669aa5b83e579a8c4bc7d3ee261ceada2ca7c25d0f3edaf881e07365dec4f51c1b29fa20811c726e2979d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d50324d223dd72930b449edcfd1d45c0
SHA11fcbe2fc5c4bdc9b1d3a05398213acaf2929ac3d
SHA25676599b94c4ffb0e0b3cc830bcf746d0770601d25546a6e98c19858cb4bc965fd
SHA5129d5a7f1f1d5a7cdb9ae3acc3df94125307dedb5df9013028673a3fe8bf1dc2bdf41c5a45a91a0f6ec43356806ba62cbdd67923e73f1cf9c82da8c3c0910ecfd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56713ccde7012f419099d1bd2d78cc1b8
SHA16e5466a58a0d9567bc6d5cd6ec48827745c3adc3
SHA25665f71f8886e9b30e1dbae58be3854411580b58282d577a9659e59118d0b03e40
SHA512d90d6189bbb127042b12708d57f6f99b94f74d12154ed5d3848d28dddd91d320dd9ff518b778066a7bd30076f7357b7c7287ed3b7e25afe7100251925aa65dca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d2bfe90387f3af82234effa2f6bc8d9
SHA17e2372ddc6a42f90a606efcb9459401a592eea30
SHA25625211e4a76a75604cc241c165aca7e1b53f08d41fa7ebf09d68c1252b2ac8e7d
SHA51273fd3a190779448718d0af898071b3c27b86eb9f14626002bd5345424b326638bfd85def7e7103fd5caf6457aa101f170dbf71d5fac4cbd555ecc63cfdac4c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533f4907f9932e94a37242a4fbe31f895
SHA10b6e46dba999eab7ca06de131a6cba5adfa3acfc
SHA256aa2516ef96172e845595e3082e74f262eedb575e8dc0e6355d07f89d8c7cbeb0
SHA5124d1df6dd77114c91764a8ef230911dfc2b72da87918138ab76320783133bddb487fcda81525583f682bb079a269f09f1f90b5105c81f74c9d961c916c07da4d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afdd2980745d6f5a5896a2f927f6c83a
SHA15d576745deafc4feebc7058415085f6fdbd4e724
SHA256f0a011dd0ca89c0b311ed8706b502c6ad13a862e8ce34ee3672f84cf21423db8
SHA5129a1befa7726e3c4f58f998c2e492f30a85598d7fdd536b37cd9c80e14a75a5382a04995755c42fe1cc5977fb68d1fe8e6eb620a61f01a19c77d0855223508c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1764b98edc1e06db95b72c23712f65b
SHA1eb43cd7bcbfeb866cad82b9197396b2d7495c274
SHA25605d90a1a95d88cf7b829605f57b195699cecadf48e29381793c104e45625ab87
SHA51234efb603c235432c18a4737c2c2752e6d3944b514110823e3ca15397f455edce1285653bf13fe3d907d18df207fcf8b20f1a241d847c1640c3abfb32a88c239d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516d2e6d27639ab85798fa362a278b19d
SHA1c70a540666685ba09eed7b778bd6085849213037
SHA256249ba36b585d161acd4e1b2ab6a3459d4fe40fe04ccd3c9285484560e827b4aa
SHA51290ab98e44c0a70ec6664db553f9993fb3501004341e1bf7c5495ec0efdd30206add41795308fa44bd59deb08d1479c50f14154acf99f81fa71a6f05897a55d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549eb50b876a6956701187072b58f92d2
SHA1b74debff6fdfa8e4d1f3d4e96cb19b917fcbe48c
SHA25611f8715a7f2ee48571b5cc84b2f42219457f29eaee25d5ee0e5db29592fbae82
SHA512fbaacb6ef9675f1bf50a47b559c0cb727a14977cfe49016c5fb49b8f8860010561f6946c9e52dd2932171ab76df89c6e276768ca7729f890ef289ffecaff1777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56244b18a3a24e4463ca6e32a92fbd898
SHA101dd9c2f2a5710118893ec64a62c1468b508e3ff
SHA256d1d30b79822e8beadd3df176354dcb5ba4bb1c52f13a8923118f7c0aaf68fe61
SHA512afb805801d932d4661cae5ffc97102566d9d46703c600d77b961fddfe04b55af5be99cac4ee48fa205972cc9c6c49fb83352683c466b4977ac6c9388beb86464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e878b363c4d3730cbd66b673dffa1828
SHA12f997cb72706d0e11f430e5ea95b0926e8785ec4
SHA2563687d108f02b8561319e87c5858127d9f5795bd4c0c43e9dc5721112c48cd010
SHA5126ed80dabfefa6ab05248e6f17318fd277cf6c4561c9b7d758cd3c68c743b06d57a2294e449383d7b161162c5139fadefd63b727afa479760e8791275c0c1f169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9ecbb7c909d0c9efd0cf8cbe54de243
SHA1f24f14382c1b1534499748a633a678d89bce8047
SHA256fcbcddfc2fc8589234d6f6278b18b77fe5b33988d7dbb63bec457e29e4539f42
SHA5126b7646402cfcea1fd7b4c15d84aa7c8753402552c71c46fa77f86dae079419e368e33ab412dece1fc418c752e8d254faf49bfd9d740b68c28915d069d64e070c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e75892cb8499b812848b94ebe3fb9481
SHA1111606ce2879e9b0aeb57f18e06d4a712a2b2d7f
SHA256185ad791daf7561292f3479fda05ae0f4c39ad8f513678856a509f000c9a84fb
SHA512631fd848439c3113c86a419fce8e49899e648aaf78c3f6df7f22687d62ed13322623af9be6eae1487e26af4765de372da30fce3a601a697388c94eafc4f940f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520cc7016a0253154720820bf63647c4b
SHA13b9850aa2d5a333df1aba5092e4da408de9f0ad5
SHA256e48581b0b8963b148144bd29e34298d2948c95511fbf3cb25b11e11ada0f0895
SHA5125aaac5f96739ed5aa922e9870e966126caa62afacddc35bf1da0828bebc9abeef07048ea38f93a88a36e1bb83a44f5ae0858fdfb3ef63d7d151e206802e87d39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ac14a6dbed261293fac22ef215ce8c6
SHA1335a10d42c98ff9a8da156d638d4060b03541f4d
SHA256b97e9c459f11b5de4994873e3eec625761e7a20789c82b8edc0216fd0d06d8c0
SHA512f3b3436563e5f83fbb96925d1fdd0fda7c18d267b188400c7a27398a3f4d816b44a99243dc694ce437030e6be8b1ca7e189c48a00e6369369ee221e1bdfd917f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b