Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
bbcd1eda4f461b317998679a300f41d8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bbcd1eda4f461b317998679a300f41d8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bbcd1eda4f461b317998679a300f41d8_JaffaCakes118.html
-
Size
6KB
-
MD5
bbcd1eda4f461b317998679a300f41d8
-
SHA1
8474474921e02d93b6089d3d6cfc5dc9c1593ac3
-
SHA256
4967d4b14b936f40f82ceebd6cc48b0aa5e9d16d41c1d1bf3a1967fd353911d7
-
SHA512
3cd7fc839e5d452b2f48a1036879037189e4260e1c8e537334acf368f8af0354778f6dc8f4cbe09f4c260749254cca3c3eafe974e1c506aed4cf1b8feff90834
-
SSDEEP
96:uzVs+ux7t0fLLY1k9o84d12ef7CSTUVZcEZ7ru7f:csz7t0fAYS/kb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430579313" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000d5b9d1b78521d3933770ebdbf52f7a78d0b300651b54df09f9a7571f9978ae95000000000e80000000020000200000003bede5a6a1fc06b9994c6f2b0a18cbdfaf0000393595a408a302633415b48320200000009c12a6fb22adcfef25af95777a5d047c12c9eb71d2f707b48b7d71b76d3d07b6400000008c81cfd5b9dc626a75605c91468f5e23c0c3a307b6464ee7bfa49f7e4d2d571abbc31c8905d9c584b955b3165968348e493f3dd3f93c26fa64e2c431b0583a0a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ef4f275bf5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{50C65FC1-614E-11EF-A24E-4E15D54E5731} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2404 1628 iexplore.exe 28 PID 1628 wrote to memory of 2404 1628 iexplore.exe 28 PID 1628 wrote to memory of 2404 1628 iexplore.exe 28 PID 1628 wrote to memory of 2404 1628 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bbcd1eda4f461b317998679a300f41d8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b5892d4b823ea659962d4b5b281efacd
SHA1891911795c38241af48499c58625ec3ab10d3f74
SHA256b47b517aa434033217fa52b603da6943ed1349edb7d5e473338d32179a3ad348
SHA5123e637bbc81ffd0e8d8bf4246128e21a856a56a632e828c28353699551db4e205727b2fab791fcb6208ce780962ec7f3c067ef82de0e91a95bbebf84bd911497e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56489b10c0493f56d0c33ef1d6320177a
SHA1491f1cc806abdefe704fce174f4c55ccb9ac26d3
SHA256e7035e78b33650953000e3ae7d117f09b3a14fda88c247323d779a67a47bde09
SHA5126d28ca2ef47dd92dee5e529f23d62d00096bb366c959c7d8eca8e57f9b5f3c5c4732b79fdcc059257ef329b64f8f67ddfbf0f80ed4849a2446a5fbeecc67daca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f9de9990f696621a74fa44472abb168d
SHA196a1b965b0d1b58cd65775ce33c12cbc0b08a198
SHA256994b75a27b36182da8dc40a7df1845099476071cced2ac001b3e866d532de9dc
SHA512d148ec88df2d68acb7f5a107fde0cd07d87956df224a17fa7292d8618ec8a6db913bade9dae0a9882932a39daa274e95becb85f5741e00408b2ebca5a9b964c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55379e609a2d53241930a882f7918d454
SHA116e21a69c58a29ca124a5f0bad9ae10742bac4d2
SHA256123e4fd53bfc7cd8c60e8f67fd734f2c8710f1e782c7b6f25e050331124402e5
SHA512de6ead430da8ec6756140404a8935e70e7287d8bbe1058a939461fd5b177b93f13b64d8b3b79d11f5e6e87fb3cd4ce3858f68a8980746e1dd61821ffe350469c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5213f7586439e91506a8165037dcf84db
SHA175b8bcd2f0065e07392895f789e6f759faca3e79
SHA256bb6e4155f8dd28966457824021999ae1e892ffc5fd3e710af2c4a60d246557f6
SHA512b48bbb93a9ea442eed1f0c65ec477be6722dedc769dd7ad02657843100430b3cedf31540b867e2133557d2dce457adcc432e8154c482ed31af4575ddc8c8182e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD520e267f980f3e08ed4b5bb6b56932c22
SHA17b3ea79d938c45059dcf685d7f6bb8650f6cded5
SHA256b744a8898241e0856b45127bab3dfb9acae6ed6a84657f9dd098ebd9a1f685fc
SHA5123e12f42561b273062fb8c0e717c7724cd1b5f1068d6faad75962f015b40ebec77fc31d25fbd76e0318feff82755294227b018530390481599e1215e0051e6048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5732adf869f4c2fb3028d04cb2e2bf7ee
SHA1420699aea89a1d38c6903ccdbc3fc81cba8b75f9
SHA2564e03a4bedacab6f2496e71dbc72d367feab448333c90a789c38f6e827767f301
SHA51208a2236c3d16dce65f66d491cef1007cb1c97f1da5c44285a551b141b32c009874e2b6fc9c70b9185de160fd25728b8f374ac441464f2b07ed9c6149f366b36e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59c794513583dddce0f71a3eb0b3bd630
SHA1fb31f40020f309cd2c8387e5c659a69679335136
SHA2566c83fe5bbc2fb65ca18dda34925dbd274056d0c8eb3fa9961151d4f324bb853c
SHA51294f55f31f65d85b136b6cb3095810e0427a3a25e2ff3501727b485711698750754ec30baa61a9400bbbcc6408e769882e58d54a73fea14170c2f41d32758fac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD554df465dd18e47fba149e0ddf4c0dbb8
SHA1f603aa4313266be3b3f73122cfaddd4e023933c1
SHA256e3755cf8fb9b20b46edd30ff2a32c72b690d0df6d3fd9fb69212e7466897a221
SHA512b34462d7b5695f80a9dfa2980b1335856c1866bf03e8adb0bfe47f89c7e1143fb8694bb9924cd939cbb9b4a693f9008bef291e77581ef24739de6c56f606e961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD576488a93cf385bd19153ad8a77d34757
SHA1f55d664ac7306073bd194d2932f26f085efa909e
SHA256b307c1e585879e1186cf8b110af442b3c450bc7f7ec32f18815a8a279ecc1556
SHA51257706c7f33e67110015626ab12aa390af03c96a1571eeed3e09b952daf82e5265ff1646f7901daeb6479c889842b0ab09574318424ea1b15cfd5f14b81cc7fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5277f438a5c8569b3b5d79f506dd1ea83
SHA1938bc62cc4ae19ec6444d29ce632c22516b70759
SHA256c836c33030cd454d9bc0d101216203d7a774d519029a029bc6d2ddce7de7ac01
SHA51295a4d384fc8f0fb4fb99690eca426b7bbbd33dc5329791488b00aadceb0736b93c48a8da64ac5b64c6a97cd5090de71f7872ace497261f8cf512ebb100d2e5f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54512e0aebddfbc90c6e8a39a144dd6e1
SHA11773f8df367e2a9346a929b3eaa9ddaca07b1871
SHA256c3b269d591fe6ac59fec4bd50c4258f350c955168bbfacdb9e65c3613306d9f6
SHA512ffc45dc98e04600cf7943692c98d15b108e87509b711443a1e98ce60946e72f2f5ca5df479c45ca1805cff21ead6ff7f0551e652399b08ff798e1e8eab7c3840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ae1b75b064060cc983590f63d565ccc2
SHA1d23fda99319b6e7682ddaf6353ed7fbd9e0c7087
SHA256f0a97cd52d793ae35710a725a998bdd594f1a40ec07159420372fcfd207a1f11
SHA5123efa080f3f4dc061edf43edab12694207a30bc6c07d536b698b37d6b867ab059800fac3457ddd4173e61469b7ec0d2b2df15c6531ecf4e3b997b5f5937ff14f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a74c2a303baae978199751b54ede855a
SHA1ac61757c550d358f0b4d89d1c45bfa2f49f18b6d
SHA2561ff1095d667dba10bb99f50494933a71cfdf4d79b81d0dbb6affa9803372295b
SHA5120f870d0f3cd5f1d7b49a04d24ced6889219d11322cc0a0c7c932a58fce249e9c572761d44d533e8b77e86c7b0a6d00c7568d1a40c9c5f5b33391876468c04ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55518c01578d20b9886a5c1e8b24c9e34
SHA1eb88002eb7ea17dfa466e8ea6f5beb1d78d5e01b
SHA256a76aee0a2b4ec7264c0ecf4dc7f3602575488959fe87622c836f2f323952dfb6
SHA5127c101b236fb07fbb8983661bbe0c48cf0fa0abc97e11968ff15e0b70dbc21015fe423b803e5d93e061e2cf08302d9feaea2943f2a806fc64ce7f17415aa0dfcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD540933cd29c4c5f7ce9db33dad3c1152e
SHA14d38293e8ed205d00df48c9337286a30befe8785
SHA2564d4217ce02b62be7d54652f2ac8523b7c045dbcb82e4dad97b0c8f14a9d05904
SHA512cdd41a195d9f0d3bc057ce6fe330b899ff856f498af19c6af4c967f8c977bc5b5025d15e28e792e597c15a0bb2ba5f2ed2bff2482aaf98f20a9a738af6a48419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52681e0bc5d1236181410b38adff522a8
SHA196aa4c8c1e38076a2601f4de82ebb6313b5415bd
SHA256a48a5544fb9f7c6b5eefff6d35bef50c0b1662f61429b2b5ea7d31c510f2773b
SHA512b4a6f9e2711fabe3fcc55044614f814a4ec4cdf9f3d6bb10d19b6cead1a97602be26193eb82e409f5180efad53a3ffe11ef4f885b36fa244e7fff1551d98af64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD565c35b5c8e7defbb901c3a99c9359f3d
SHA11cefb9842fd87b193dce8f76742ebef6f161291b
SHA256baa48943618f881181e25006ba9847de3d38b054949d526922f2fff6bc96b1fd
SHA512f2e50e78c17f44e0efbfd6c64d7a4e09c9c202b2ca9bff4a02ade5d1a36fedc062f92fc27e300770ebe0c053fbd09bc9892ea7d82a6dd9947e818f6f6dfb5af6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a47fce5685458d0d90dc7beba9cc4ca7
SHA1d1f2394bf1cb8ac7596bfa75b8ab4b34b13b6b48
SHA2565b301a9df739b278f5858146237119c93742315e6ee27813bd90325408c2ff7d
SHA51223c36bcc2fde8e49750798cfe3fa4f37b45c3a4b866a1f1e13d5b90eaab979f1f0bdd542468171eff8ba285df6266618fde2dd056b4aa216c68694f4d9d635cf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b