Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
bc7c1d933a70fa40549847c9339596fc_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bc7c1d933a70fa40549847c9339596fc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bc7c1d933a70fa40549847c9339596fc_JaffaCakes118.html
-
Size
90KB
-
MD5
bc7c1d933a70fa40549847c9339596fc
-
SHA1
9ba0812ae8d664c98c0717fb319c12d7b9c6245f
-
SHA256
07012e8ee05675be2e36346e999c0ee407a70e5aeea8d9a8237cda47fc2ef462
-
SHA512
c486f0cb80937160e0dcf07918d3e813cc2f2c435ece0990caab00aff83894649410c6c7d8e2533aa565cd405d626b3d2f705f2ede51d3872613e3603697f43c
-
SSDEEP
768:lv01KzxdY/YrMBHdziWq11KiHrZtFoHGYuyJcWcua5+FLTHfCZszVg6rzO7wF+wE:y0einRyBSHuxRGmXXpMd1Bf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1921CDB1-616D-11EF-85EE-5AE8573B0ABD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430592534" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000004bec0d48daae27b72a52f3a7a5e66e304f697fb7aa13fbe5cc9873b253b84d45000000000e8000000002000020000000f2d7ac7fdbe2818e260ebf41ff7fe64d916b61187c63b31baeef66d72c9247ef20000000fd8586ae0620162357a3efcdceb3fcd6a4b8c67214f49f7d52846fcd99589fcb400000006fa059cf5fef66a855904be594c7b4cbf3627a08a69cdc8eef49b5c923b7288a41c4369f47e6cccfb48718afa54bac1b78441b3726fdb0e21563bf1ece72cfea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7066d6ed79f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2820 2244 iexplore.exe 30 PID 2244 wrote to memory of 2820 2244 iexplore.exe 30 PID 2244 wrote to memory of 2820 2244 iexplore.exe 30 PID 2244 wrote to memory of 2820 2244 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bc7c1d933a70fa40549847c9339596fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b90fbacbc042640af30da6bb0beab5
SHA142f549f4356b8b668e77208d8fc2e3d7a77b0610
SHA2562a2950ced54c080ca3695bbd1c1a5ed09a928718619c8b3c2d720fd360d53a17
SHA5127d26e14bdd195781c2ad08c459035ca015e28604d25de8798374638edd84a51b2956fb6ea6f1e2675a2a29367a094b147e93b632ad2b42d0b620266aae554c43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a143e2718e862f2f8e0b42d2bc5fa1e
SHA12bd88f99cd2fb6667057c0f81633cb19ca872e89
SHA2562026fa98a57fe4b9f4921f84d4c22909c2528cd5f03392fc7d5f1fee067445b3
SHA5128ad61b533c8a5aa4cb1d8e3eebf75f4d4cf3923bcac55c2056a2f281b273edde1a3958a4f2b1e34a887103beea6f11ac9f64e62a354d4461788b32dc041720be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5529db7bc891d8505bbcc23d03e521b5e
SHA179a265177dc148d359b32fa6693381dbbbc06c18
SHA25614f8a44ee110be23b36cc77b3448c3754d9e21df66cc15263f3a02e8f4300556
SHA512afdb3242484e4c8608d51d7493394316be1761d5351694e1e18dc7e2deaccb37c2700f0a7c4be44503f747660137f23a0d65cc037059ab06871078f74599e625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d3ebea8009affd9a1f2d47f3b686cde
SHA1dc5e66f4e3ed1ff5429be6311a3aaa8d4a5907e9
SHA2569bd157696405851bf776788b307f4362721aa9f586b5ffeda874c29d23e71433
SHA5121a18a16d78324516adeb67e8f77f107a864d12d664823527880824fed732bcad8c1bc7d05f5a10c12b90002db28781bb71f795b5b4a8ea81756735cb507efb6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd63b5706d7cab8d3b9aa73bad50fec7
SHA13e8bf29c0071a04b705e07dadaa7bb924b712cc2
SHA2566341495e92d6b6421a6ff0f62e3b0fc8684bda0eeaa4aa683ae070e6f487e5cd
SHA512c9bf1d6bd2fcea31ccc33ea467ed0888bca3fdf5f3473a1f7b6801ea81da98824623abc93ca5c655379125078773eef60f9d6710a6ec5eb9ef00efc7d2247901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544a40bec2ba61174e60bebc79718e004
SHA1322110cd85b89096daccbf0664b0a80f9fc6bef6
SHA256fa091975b031746a02e9dfc44fcc05a5476377398100cf17857b10237df5ee6e
SHA512dda154cc3c4a6b8fd0ee04852964d186754405bc10fa6d127c478d5291ae351c2f67c60bb6fc50632024c45695f9701805781da3e249ad3f9a771471aa840af5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f53694a9d00d91fc8e831765d5aaff4b
SHA137753d8d441db73ce919b6a39b423e5fd2118d8c
SHA256aa11af0079b0b3e18cca5b04412cd43cae9c1f1db322477fd895a38862dc8a84
SHA51230ca18c4b458363c0573ac802984564e371c360c350209e979a70b24750e129a37f2fb1e1175b48bd423d9dad9bae27a0475f76af5a5e61b31386bbadb0f8404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b964cde43e5e38e1b7b67e3c5dc7a7d6
SHA19e4fdb38e3af0c44bca1d6cfa6102c9cf7f4446b
SHA256d635ff08da0173c9d090620219a129d238cefa3ab86d79f722d0e44e75bc2ec0
SHA5123c9f1edfe856df89c19c2e3f104c83bb687df58ab7c01516ab17f76381e2287ec5641d69bbdf9425a01b6e15218649c93a5cf6e89f2f4ffe8817d4fb077f58d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56881e75addec1b7af2864a83486a0891
SHA1a34cb3c178f838624c29575f3623a3f898379ee9
SHA25687e64f3b8de54c71bde0c8f259fdfa8addf539824b970c22e573f9f4b9433447
SHA512fcb22cbd94dc37410cd537250a1618dc895f0b64297f293db957e093a9cc0c1bc59f3a34551d3222ed408449ae63ca9d47a64a4ffe4efc65693b798e188dc645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8a049615e416bc848b967bacc5627d5
SHA1850542b90418dd42ea196d09d7ce3c65cbc083f7
SHA256b353d37caeed7abefc3dace25a4db43682ae70f9dede377dcf8f48d0f78b5c28
SHA5129d70b13c7c1d95df7546a18593abcb38d94bc4151b7c1fe9b12ae3b5e212b363147f8a5f8f80d2d752b5decd937b9e9af73d3b087c500b93e6f5c572ee574ad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a7067e24eda11521db8da7faad89fbd
SHA187c85446c255e6930d3b81e7c39acc9822e93be0
SHA256a2c594e107b75afbe2f924f80c20502cc007f9825aa04f64816b257699218110
SHA5120b515540d432d9cecdc60f5f4d5d252da072a0a38261f61fc55df4e209e97cb4b98f3e9b04f5e1b25ef2f0581fa5b87d080ce076b4e3956abc7529812cd104bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fab869f2a537e62fc34453b5b31c8a6
SHA1a01b7cb87bc872d596a77001f613a3d826597b15
SHA2569063ae7fd27dd9cbe5ced758c81ac4e83037f42a293bff335dfd69f7a2e0b05e
SHA512a4220ca022324050ee21f7f587de758f60b078b7440829489fa7ac66dad6a97dfceba63d8da60d3ad96fd475860ad2b7cbb0ea69a3b83cf917be93e48516e739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b6b5709ced33e2813b071043611ee26
SHA1983924ef5cfa66663ec0083e68a3005c6873db8b
SHA25674792743f35452d8f2edc020fdbec3d58a09cd04fb5c50634ec9e3b640c6df7a
SHA5125033d221699465dc9a296f38d72261e5388419a81db12912b2c0a9df60ba4656cc3ab1b622e5a0fd7de08d4cab4b444f0f7997688682d1c277689cf3ed142448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fac88af7f2c47e20a10c8db69dacfe9
SHA17e22ad998116c6f5bce04d11c9f36b86467e8943
SHA2566682fc7960fdf7f4769a10550824fe49be30f032584589fd1bbc229dc17a2565
SHA512d3ac22e5565dbee486c7755925e59eb5e8bb358efd837caf03b42105a0b4f2d4aec6e97763705a176cfb0f6ae0c86840892b75645d70a2d26f791dd18c7b5dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541422d6030a8c5f24479bcf355e4a081
SHA176e84843e8b682ab5c7e668d1365d925af322972
SHA2561552506921d357de5d8fbea471ab24ad2072dee16be0064223ecc9fc6d7a211a
SHA512fe667452150e6aa50fa6f3a438ba9d8b716a1f579ed6dd02172929449a1600c7d7a0347a901191e4ab379d42f83b5c73fd0f1d6abbcf1c9509da20cbd91ffb75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be335db4f6d26da0b45c0e21b3df14c3
SHA1c5b8bba4151f0ab404bcbaf8a710808e47ec02c1
SHA256dd2b39d48aa2faacd326c4c3ca76137a9bd496ed74b8139825fb5494ad2b70a2
SHA512896be6333e545a5b357995459a6839153f97142ac7513c4db1315111f23351d7d3f22b1f9313679e89cf4b106b0102eef11943724792d907e3665abe2139d3cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ef136ebe64133f5d524b4995875d368
SHA1a7690079d5cb75319dfcc05dfafd0a6ea0963f1b
SHA25602d09b65b7776852e5f139fcb2bfe0c7d352b4434070d4dcc2836fe077d92ceb
SHA51262de5e2277fcdf00a8b6bc843a02f7d26b4310833f7ae2100c319a508fce65f8d0944fbae0a5c5b74a0ae9a15b30e4207aeeee5f5c8e24669bdff23fe26ff64c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593a384e79bca1993c5e787286bcdbc18
SHA141a791fe437ff19a7801ad30f04f8e71003b9b30
SHA2569afd82344dc912fc3daa149cc0544f0490a25b2adf79666a6120937a7e511058
SHA5129aaed4686b9e2029adf4863918f5198ad529fff73bc15942a2062a249ae1fbd64504dacbc5a9d513b4da6372857cbc306cf8fe06ead49d4d805310460ac148ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51de635629e1ac1c86370f10f996e4528
SHA10ae12ca0467f37aa510d87c68e2e63a6e93ce1bd
SHA256bcb7de87f9cd4cdbbb87858cb9f119d83633c521e24064eb172b579b976994ce
SHA512349641ea30d82a5d8667915ad1d3d4cdf697b8d4981c99cf4ea66e09651a24c92408da703567ac81abe0b9df95e1485cb1c572d2a7549be17040f98850dada3b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b