Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
bbbb573516c492daef076133f2d509c6_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bbbb573516c492daef076133f2d509c6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bbbb573516c492daef076133f2d509c6_JaffaCakes118.html
-
Size
16KB
-
MD5
bbbb573516c492daef076133f2d509c6
-
SHA1
07d15b3127e89bae8d12dfbd84092c65748ee20c
-
SHA256
25b6a149104782e8700c9fc46827fcba131504b3a56c173740d45d6d138d1f63
-
SHA512
7d857b3475e79261f1bbcd3a58f01aad46fa67316cd996ea57c376d88979b1482c588276a2be62666a10e99674bdfe3fd8a34ad7ae08159870104912fd13f8ec
-
SSDEEP
384:1R4VkE/UNlTxuKyBj072jQsMJim8uiow3PfXK6oDC/A0UY:1RdaBje2jLMJi/pfvKFDC/A0UY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E76B8F1-614B-11EF-8650-76B5B9884319} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000061fc3140f4d17c534533616e49be331e0d73ffcd8c0755be8d47ba8d5fa1c4ea000000000e80000000020000200000003e16530c64103b015e885d9d1e666c56be57c97e5cc414beccd454c3c920987220000000a01439356adaff2e6ebb72cdd71b1721c3703a3305cecb26409ab018368fcd074000000091a1e65bb5fbe24c685b7a1a58aaaf966de47412381f31033ed8195776e1b9140cfd3ccbf13adddc2bb5afc79cc4b4c62f38e5e2241e21d5a9c7a4ac21ca780b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430578112" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30849e5558f5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1344 iexplore.exe 1344 iexplore.exe 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1720 1344 iexplore.exe 30 PID 1344 wrote to memory of 1720 1344 iexplore.exe 30 PID 1344 wrote to memory of 1720 1344 iexplore.exe 30 PID 1344 wrote to memory of 1720 1344 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bbbb573516c492daef076133f2d509c6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1344 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD58126e193de718dc748c9b4bf1964bafe
SHA1e9c2e9560d1d9f5b14df25479fe56c9d5975e8e9
SHA25680d5f8d79d3df81c4a92bdc2f040d3273102d8baa435773773c66c8d3ce396cf
SHA5127efd336df75bfc601666b92072e61163cca600955570a306798aebacd24e40acdd13353fd02efbe18de119285e4e06e241bc7a58944b7a8c575eeafe4bb87643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549deebdcd0653bc6d475ea82b22483ce
SHA117ec5874d7b9ec2742034ff4285b53d324a58b47
SHA256ff9066d01ecd972e2878e1c6d47fb968c5f48bdf2a494d8272e3e294b0b97642
SHA5123aabf6d74592290ef9e6c165b1a9414d0b10cc61a19d65fa0295ebf9c2a68f8a136f8a190ead3e83d5e3fcf294868408ef79e961f746960651b72bf87c61ecf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0cc79657d08b0620b9de5ed2ac4e547
SHA1d18319572c149070f23f70fd7bf18e155c7abec1
SHA25674afcbd9c2275e0857103ac086c7eeb23491dc9bad8be501e2044bede4c6d344
SHA512570052c4ab3d7b272da5919ee339219f84334436b0eeb0f0ce1dc26c32117c1b221f322bb2b11a9efedc502e5d358f258f1f86c131194773d68dd5fe5d937abd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4634775f87098d0076c33402442d5c7
SHA117896226d9d72278cc23b9c4f5953cc131eb0790
SHA256e783032ae06f36c615ec011c71c8cb6519be41e1c2ba4207bee7884598ee6df6
SHA512323cc75e7712f1b415b4cdda8c5cc21814b5bc9e180e662bfcc9b1f1829a2659b099af94b010a8685052719b7235558f634e3566ccc4758a2399ef87fd9c8b17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b57fc26de1d4ef185d3002fa25ec5f5a
SHA1cd36f8a7c0aa8d8318f4e8359fb4dc4e06f9c204
SHA25654568c501f7e4a167ed1fb0ee0f9e95320e5bb541f0dcefb38131f63a6de3356
SHA512a3cd628628766b6085f70bfdd116435c1c76b3954eafc5131ab0024acb82249b09d5f3b0ce41d82de523ef450f1e9acc362216aad73153cd74375790e60f2b4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599dc61977c7c506e257929b674d4cddc
SHA13741a969289c7422bc8a74361f56e29802746f6b
SHA2563f2a26af7c371230c5af5204a803c2abecfd16da0c4c5a0c614700e22e29a370
SHA512f909dbc665edb5f631c91cb8d94f86cb2c4d872938bac26627d0b9f996572c6731b8491d83969376a30b5c913869cce02ca05d817c25e131dc8425d5ea76cd60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514e369d4bb34dd36e4f0f84f913a93d7
SHA1e588edd437ee2db0c54e65fa51db177d4a6cc1e2
SHA25675328f46c55a3e52cf2bfded4ae026fb19bca81c49678979df46777d2bce5b3c
SHA51297a6abda8342ba23cfa8785179ce3ad88c394f54fa694db7d82157abc1eab7c71eb1c309f396a6e332cc355c8fe781f3b6b3a9649a42b4dd3fae845cfaaf7d3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e69666ef04bd4d75c9678721ffe262d
SHA15b70d432ecde76636101f6f2694b827e8c21c707
SHA256ae239b67cf506b14f552d9fee5241db1707728dbf09ab9343f16a40b9414bf21
SHA5126be7ed2dd7f575da420dce0847e7a4610da4a2a5ad425201da831e0c970f369025f05a7984da53c58416b894cb5946cdd64c4e5b7866a469e4e70548d4876708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c76e085b062992511614d5b21fdb6a2
SHA18b94449e8674f26674b08d5f74c500013a9bc760
SHA256c6f5a01e5dad7f1262bd71a4e04dfeedb89da6bab9fcb7aa1d300aa5d7e88857
SHA5124ecea2600fb84e3c98dcb0565e61b392528132c0dfd6cb5bb4561b61475afdff8ee276259304326f8c3c40a81e45a3dfa8fdb95e3f8fbbf4fd19c5d9821d27b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cc008b3e77392d9a524b660bd868efb
SHA1dfcb4a179e8c8d6aa6924aee3801a981fe2e4e2a
SHA256b7882f4305f3d3fd1d4d3c94bc9246b0bce1fee15b85f006c1429f1cf190b54c
SHA512775f0f745d8bbe4f7313d3ec7259f53313fabe0a01485894d6696f275c0645182c8bea241bacfa6f8107139720850993479a9f88520bcbef514577f5e755f523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bea4499e563f24c0c5b68258bb261d5
SHA1f8765fa59ae3971fc85de493c25c4af13dc46624
SHA256baa4d455f1e996177340a37ce86125ee83857670e8362a136c8b69accfb30ef1
SHA51299a010d9253924de871b2069bdec6316ba454fcf6a4a76571adb3846cb71ddf269348b35a0242354c4ba6cdd05ba6c395ff51638ba5d214edeb739219aec343a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfcae3f8cbf93c98fdae6ca9ab074484
SHA1deb71a3997bda1f69bb79216ede726c34181818d
SHA256d5379e6f356b2f393b6e64535084aebf05e981718c6213d9f8fc6787662f8457
SHA512d7f159ec0cc039a6d43c66521fb8958be40837d7f354cdc05989eb918a1c476846ab487c1c851c052cd63fd0e21e8c6b0b9ba693c12af1b566635cb0212b3888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55d7a0a62b017a902a6ec6fa4d4b80983
SHA1d4dfb59a9c10fcfa4228d200101fcd3f0f8d23e1
SHA2567d805ad7c9b3a906a3e9eef8e136bf350e0bb61cb80addd534e70c66e65e3602
SHA512423546a6f2562bf24d42218dba37d421c37670e1dc80adb0ffdcb38c0ec13512eda9cc5d760326129ab7e9f4d302ec88bf0c308e9b86220795083233338c44d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ca9be6204f98b7c991d81823e6490e9a
SHA1c0c5286c26c5ea4e3fa664e6d19d7ba0141716d8
SHA25624733607e3a21a0c6293d5274f12d78097a22ccc77b27242143ee87589f24bd0
SHA5125473786d0ee1a25d08c4bc432afa10f1852e6872d277b7c529ffa9c9d1bcc90e7102d6223c3aedfb8a6f70f86805742a49cb91831f93b25eef30debf7f190fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD5fb6813af4d803361f47c1cb42b9356de
SHA108e080a5bf9cec44044ac4c649814da6ab91511a
SHA256ca9660f192428465614ed89a6b646f93276d7e03eb469d2434a00d8b4ff38d56
SHA512a3587051e0439ebe549b353b11123d52ce35dd1e31e52e5cb8e39671e55445a396cdcd3fdada90a0e6b040f2b26491f15d0595f322e160e3a5713c523ab32f7a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b