Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 09:26
Static task
static1
Behavioral task
behavioral1
Sample
bb2be8231e4c4d6d97b845413ef535e1_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bb2be8231e4c4d6d97b845413ef535e1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bb2be8231e4c4d6d97b845413ef535e1_JaffaCakes118.html
-
Size
1KB
-
MD5
bb2be8231e4c4d6d97b845413ef535e1
-
SHA1
07de3f5b5b545ce21ab214a520be446b1f1db91a
-
SHA256
e584b19942829cd0614b5c454b7d1b8281bbf17b7318b0a070ea3e13d5088142
-
SHA512
7bab35b5c2bfecb463905152438f20808fcaa433ecd0a85aa0b8e14eae60e929bb7a89a05a148801c454751ef30a99fe9a7b7f1d680e37af219cf546dc254c70
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000005e7d5006b4ffdf60a68254d01c789ccabb7bbf554d95aec89600c08ab68c1ac3000000000e8000000002000020000000df51e984755be3f49c1ed723be894109ca64f7347eb1bf230f0caedc3e6e2bec200000004efc6ea62b69ef03d36be3952eac7ea4609450ec9052ddb3c0f6fa76d38af65b4000000085f7074823b05d5843f8be0650b6d5283b59526739a3e5f88a1c8d77d550513b3766377f90a27c0a1593cbb98d2275f665c5720a817f7de17b9bbfeeaff64593 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB2802A1-6131-11EF-9988-DE81EF03C4D2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06f54943ef5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430567037" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2548 iexplore.exe 2548 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2336 2548 iexplore.exe 30 PID 2548 wrote to memory of 2336 2548 iexplore.exe 30 PID 2548 wrote to memory of 2336 2548 iexplore.exe 30 PID 2548 wrote to memory of 2336 2548 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bb2be8231e4c4d6d97b845413ef535e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0508da93bb099694bfbfb003960cf69
SHA1012c19020e4f06380181832e9ad96ed7566820bd
SHA256e3d4c5ce97ca99de814fb70ba9c3a946a182683661dac77c39363b852fdb915f
SHA512f64f1aa55f4cc1cdf8a51b442925a445701d0ec8750aa950284bcc8faf88c66662ed7236786eb9f94c334c989353026d968028e2a23b05a18623c9af2c520845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3db91c8a2f76f6a20e6cc26fc120cfe
SHA17cb2ae31beff4e555eb75dd39050801ddd2a4526
SHA2561bee3c1f29b70ed41e83e18c526f514b3c4e06a9601d1b5a27fcfe41175951e8
SHA5121864f90a37af6ec6287be5089ee41382a44c7d5a6c9c6fe001ef5295121297333b7369c0743a760d87886cc0c72782d5fcd2150e8caee45572ce13c75eb3d83b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55680dad14769498469dd2f93fec4f37d
SHA198d0c0494d6ad4b197ec4eee91364c1f8fd93356
SHA25602bdff91e90e3bc24edde4a9bb6a7555b694762c166c943aa71a2be1f4ebd2fb
SHA512b09ee45c418e895f1a3e66a547b4b8cb6533a785d921f1529da20eae96c91deca159e8b8aab97ab5a19cfdfcfbf5cffb2db2cda9dae6a1381ffcb14b122bd7f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8a63997bc4ef07c38368b45aa7e3605
SHA101d303e1019dcfbedaa5d91baed23be647ab688c
SHA256a4d5696e8278949e1fe1a34598be05300de3258ef1719861a498eb4f0f2a5345
SHA512771f1f6761f50e85769492f53404b755f9c142e3e71a55bd1f0cea2462bfbee535ef83f6d7c51c257594903d4b75c81979e999c8cbfa76a9d95d336b2d974d52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b1e87117a8921ae194ccde22e490c24
SHA127baf2db8fa18ecf1445c168d363de158cc3c76a
SHA2564510a5b2c28b2911e54aca790a92e985b83850f0b36001af8f3ca40d2ad5e931
SHA512e846189c4a1c596a2bc9e32fcd30400e3aa9ac07db22810d7f91f995a28132cf0912264184622a2a2f9d32b9955b0dd1466de7039665b657f7317c07e27e6345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b3f60785fa307642f2f4af1263f14a4
SHA103db204a0cd325619609bfc17ae6fa97c819562f
SHA25609155b394871bff69604048fbd1fc37f27f8e27bc61c9287763f85106c0989ab
SHA5127db4721dc1f1aea64092a2a510349a86741eb81af255be6060bd98791188905c1514850ce0d7a1602451f057d3a4fcc38c187140ce5f7bad2aa3e19cbf46109f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8ca685757b58d8ed226425182f3753b
SHA1436e642b1d793962b8aba40976fa6440e4483f62
SHA256cdaef3d80f1f0160effa8a857b3fd5dc08817d3d34137612abf9da37284ff782
SHA51230f126046782cc0b1a3be43057b03ca48616c56884fa0c3cbb1e205b6aef316c0e68c0d9e31845a34b7c3ef0943a793b645721585aab19018d4c751ec2e66149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a83f60f6a353399e9110ef60a93de76
SHA1d2e11a87c246be06cdaf68525fa481757a713956
SHA25689ccd55459c09913a75aa7954ff3d06edaf3dc71e82039442996c04b403d3567
SHA5129799f265c4bd1056e0cdc2e5938bc2d1835031ad5ab39ea00f2216f6fd9686d494dcd5034a4f30a8634ea4f13aea83f1b728df572ab246ba71427be15f31acca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f93d88294403990e330e9102e411241e
SHA11c6359cfb42fa310024b68534ab361575a019601
SHA2564148f46968544c15fad8e9c6af9e52d5160b040ab04bb52c6a991ac598b9b896
SHA512e5c619247602d8c520ff28288be0d0637d93a324ffa116d8c485dcbf85ea22a22fa405880f682094252877c564ed0f08590ea022a2676dce0845de6e638461fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5086261be5b1670970169e939cb117e05
SHA10ba867edd4864e902bae8a32a7c1294c3eaedd55
SHA256ae4a5a2992480d6b20b8dfd1ffb22d65a3d2bcfa2e809e922bc5c93dc4093ecf
SHA512097a259d8ea8bbcff9a3de1a4557f73c2ffea404bdbab7390aed78fb985cc8d63486d74f09e0fdda14a16fc17dcf03586a2547cf48d392b58fde8429655c6b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dfe570d3cee145b0504d77a7d0e728f
SHA1713a929b964dc3984a7f57fbe3f3a3dc0afc4642
SHA256965b2cb4cc880c6bf79fe750092673ab06c488cb953083b7d05a749943e1ef47
SHA5127c585a863a4df9361c792321754f7fc74024b0f7d44895f62f90d790e259035c5cd8d6c7f03b86653c36d38711e1d7543ee81b69f88953ad2bd61c8d61c0020e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5988884c4b20a97c2e8c7581dc1f90749
SHA19041e0615c53e513a61c1e9778fbed89ea471cf2
SHA256d20783977ab805bbc0ce1acb337648503016b3bd1ab34163169ab0b5f8a24167
SHA51267e9919ea5cd517c644cbe356dbc7b00ee037367001bf3edfa9a5efc711673783ad85ca4c823662ff7a98c74d3b2c299c80199fa002039c1d4327ed486f18923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a46b137edd63b4bcc03965095d5a7f09
SHA175f282828be62b17840fde7e581fe588b11ee74c
SHA25620c620f39bde51188872b0c09e2f586d9862e70af97071be1df96eeb207a645d
SHA51268d7f9da9430f5e288e4f4178d4ad3a6f75b8b7849bb4b19023c4f2e93d5a0df6cce6c21cdb8698b1c2dbf42bd9696de0e51a4ea13ec26029d0b928b7f8da950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ccacf601a64f58421af96d03b5df65d
SHA1ae9f734df9b5da0e629ce5f333f42159e5fc6a55
SHA2568d93d8e90631b4fe256080f1c1769ca7c7e0a9b4e98d6b47063f4b9bc3da5a82
SHA5125df279337fb1fd77bd43a11ab99850f4403e00100564dff202773f700d84fb4a2bf62e7f1cbe5a0ae7d1ff3be350aff243d33c38e5cc8e7270e80176cf740dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585459ef3b79fcc07f0b92df9eaf28a73
SHA1acaa00c903b7f849de463d9de54f6cc20583f6ac
SHA2569f760e604f2ad67b50a2f261a226ba6dec09e2419cda609e6bb8ae6a5abc5d59
SHA512e13995fcede75e42d2b3859d70161730e0c1cdcb678b37dc0b3feb7401272bcd58e56440bfa904650b8f6b8ef100069d5609e1d4ba0d20978439ef613d93b2b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a9b76a0e2e8b1b8fda32d91ea1bfb34
SHA1947c7a8084a55281880c5005a1f5859e770ccc04
SHA2567a2ddaeeb6202746d65f42308183b6a69988b5c0ac396b8c94b9fe7d76da874d
SHA512f9040869750c8393a44774b11cafd5fb4887c81a818dd2a766f84f01d18e0e7069ec09b599857ff3da4d56343b8373ef38e339823078db689b5ce7f43c747431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507527c5d0a6dced2d54465e901fbe12b
SHA12ac50c18b04c50f19bbd929ea202f736eee5ec20
SHA256ffee0477de126b88ad55235b84bb7e3338c4167fe5748eff375730ceb34ed0ad
SHA512007e315b5e042ffa40cc1f95304acb7d14276ae7d3229a09ca10c5ab0d9b5c86769a990a273575a374926fa29541e5da0a81762472cf35e03843a190f55815de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1e22daeb80b0edd912409aa9476c656
SHA1d7a86c998fce88536340f10381caa266145ec101
SHA2560574706021eef291ba8bec3b211e93cd515daa6a244951debc33d4201b7c85ed
SHA512c9b6641ba89473bdfb03b3df37d81f0cb8ef1efbcc1686fea27e22eacdc63099fe17a1736fa5ebfbd772c4c57545d5e793c16b4d229ca5b3b445e1558d8eb202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ae608e210a244d1087438736df9b1d7
SHA196695b26779a61815cf4138edaa91c06976f2e03
SHA2565e0e869b68ed579d102befb837bfabacf76921ac593e919f0d281feaa0dc0d6c
SHA512cef083d763ce2c6c3cb4414c7ddda09e4fc1187a88e0bd06c6103bb1d22e667cb5a88f9f45a7a43a8b9e39acd5b86245c1323287271d111190d4deafe94fbf88
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b