Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 18:10
Static task
static1
Behavioral task
behavioral1
Sample
bca712675f8cdf98e81301701039edcc_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bca712675f8cdf98e81301701039edcc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bca712675f8cdf98e81301701039edcc_JaffaCakes118.html
-
Size
10KB
-
MD5
bca712675f8cdf98e81301701039edcc
-
SHA1
0c0251f59b94843fcdbdcc4d19290363ff0b18b9
-
SHA256
411dfca5c74a9e9dc24bdf2b9c1a7a443ad2fa87fa4d0292d4a74ad23fe3790d
-
SHA512
1dff8d568ee14b3cfa571c17c6462dd1465e6ab835cc54a321265dbc95c7a833e0ac2dbcf5c7babac2b99e578fe7c14e8006401926a088b2acb44b9782cd2eb0
-
SSDEEP
192:aAvZpihi94wmgrQvJqlBiEtXDpajZCPM/09koChX8bladXjmsS4tVmJtHzdUWZ:auihFwN4JqSENDpIZCUs9jC22jd9Vm7r
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000435119c391146653d799d65a927df5b0ca4d8c25d27563bcac9a392bc17ba9cc000000000e8000000002000020000000557fa8532385503904882960751b0140d4326f0dde1b4236a1fc8b9103c4772820000000fd8909bcac751a865a3ba7238d1a23fc2af912571c8c3a0d8c8283cbab9f70b140000000fe76c19d82532ffa9d2e5f4926d99608e9a6a6c424abf9c98221f69900dd20f30ae406d5da44fbd672a41cc3e61c8015a58ab288fb0bc8ac5e710855b935b0e9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F6026841-617A-11EF-BBDF-EA452A02DA21} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a789ca87f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430598489" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2992 2408 iexplore.exe 30 PID 2408 wrote to memory of 2992 2408 iexplore.exe 30 PID 2408 wrote to memory of 2992 2408 iexplore.exe 30 PID 2408 wrote to memory of 2992 2408 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bca712675f8cdf98e81301701039edcc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53171077cf4f1298a00ebc5b6f33f63e6
SHA14d66264572426294a37e39616cd01bc8c9d89921
SHA256153fe0bd237cbc246182dcddb4f5292c4d60ace9b40bf5239ad70a3fe92e663b
SHA5124e65e1eabadcd3b9c778043a661be5ec483fdd59d9105b39ae0702922610d83087b1550ff867b4047fa98c6db2b0348cec0754a94f67a9e550b06207b039baf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59636f5bba7484594f885640714497683
SHA125b89463cf505c9a6c6f83de19bd7e69ccf2167f
SHA25687009db2e4124cfa0476b82ec90f7b9810ea80933079707f99803e34fea67ade
SHA512a8cff80a759abc947378877be4ab3a2c6707f7f93a7b85cb01310b7049f5522ce2f9d1da4aea422b990740659b5c793ea95ecdc0795ecc38943ff4e3e37263cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2263cc9377f68f8cb73b068d8350f2c
SHA1b703c946632ec2133866bbcfeb25c9c598ac022f
SHA256521467dd2fff9b75afb22e7de991875b900f9bbdc125676daba32568917c845d
SHA51274d66bbac19b00bb6ce8c5fd2558ef1a3d3d935209dd5c665866eaf5b3c5a804e8e310d6c0fc924b7574a2606f254cbe1de19f0f7ccdd473ec2002dc924c4588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd7be4224ab190179b7d4c00fbe469c7
SHA17d3915db4c2eae24a086d684e0724869b643446b
SHA2562a79b4f1212f12a0dbe071f1c2bf5b8986022c41146dcb260e030a60317c4416
SHA512db81926d04ee95f9544f37128483b64a289a19b0b1549ccf3da48912b1d2ca1e7fa5e537db87f27f6a2e327d0d4cb31d11f93fe6c73c0191944d222c1b1d2932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b7b87fb810d6ded0b9acb82af4655b6
SHA1a2b4a317dbbbc380559b4dc6da68051c943a47d4
SHA25639e0dce804ee823fe1cd1989c975714a39da559cf2cbc06cf55537338ec759c4
SHA512ead42cbfa0349ec27f15a069c4e76774185991f7757b45d1a1cf6a9b6d66e3ec6c07fa0bf2caed93213445825f0095dbb5df8197d6a1834027c0afcbb264a7c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fcad65a8d62f07124c25763e21a5787
SHA1cba4ad4869c79da47530cfab72fe70f5f42f36be
SHA2566cc08c631d0436da72db99d0a9beb5e0b6d5717a7c80b66b120b257077411a04
SHA51256c17daf199c8f6903252d519e140ed354f844b59a8bd7009c522a322f640e82dd7a856810b08380fadb0a61252e50f4f0fd7e2b936670b3899888454f7cb293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56397ae6ed6b1cbba136c53be36190a87
SHA1d3b974c1455025a927ddb1e9b0a49d0525da3ee4
SHA2564409d82075863160af7380a7751b4007c8ddc219f6f64b6350be895cb3a0dcb8
SHA512aa1a28cda091417e863664595b7f20261c5cba5ba74b55be8abcb5a42dde0ee91431230c2c789045406d248f531587a79f9b50583eb6050aceda9b92c567a137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512f18bd2d5ffca333c03ce3f11b1593f
SHA14d86e9574e36ca6e882b7b2abcf6d90ae422b044
SHA2560f99cf7fc88fa6688060d75e04e78bb6040bf7126e9a5ed502d545805d9e4cad
SHA5120b8d9ed5ce0fff02948ee23880ad520f5865c2b4145e48ae872eb4a31c6c289ed7e3b8d6a5eada268ec6172467960d50c1401581f202668b3e96bff4efa17e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfdf35c1f4e88e756870b0bfaa38fd23
SHA10b3ee7ba4f9005d26b78211c4c22fe96a508bf25
SHA2564253dbd551d01446c3a3bcdf533dcb984d2de1ec07b35aa78e0e9d488ff5d57b
SHA512c913ec7cf63615557da98bfc1fe60d1ceaa70421e4aaedf945fba7948f17aa7e33b09e8b109e7821cdcd848466c1547f9a5387c87877906e15928d04337cd333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596d98e46ed2e597cccbd095d08e63668
SHA1c0c55a98c70d07325ba6aeb54379a58683768ea0
SHA2568012115e6deca1eaacd6c2b9bcf56ac924027bd290e10ff8880222e9120b5c3b
SHA5122cdb4cfc761af2cd6e9e3c58a7a86175e7541a45071065bb49713da99867b2b216c457fe0759947eb252e26470fac54e48ffd28c04e029b324a22b76bf7e6a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55634e2b84c299b2e882ae4be9a26c943
SHA1796d854b8854231e233d652c318045ae85eb5ee4
SHA2563d38e670b78f57583d7305ca4509dde1e7b17609a617a53e0c9ae594fddca4cc
SHA512b6b39d7eecd74ef13ec4f55f01bff25db0a8cd5f356cd2e41b52b60f4c002cf72d2d9ce8c32caed774bde30dd515dbdc2f572fce2a34749aab2275a460ea5494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d14c25a3c7fdcdf2db13e386a9adbc7
SHA1d4e2ee9e120b86d036332c26fd297840e7f75729
SHA256b5f75ac81f7c6ee666ed8cc5e54523310b8dc48d6402341f5fb0daaeaa0bee01
SHA512fe25c0a9be92c793a17704f9a5bad7b5bee2fde9828e52965990290a8853339a59f0180e0de033f04b846dbb4067eee72b62c92cfc8daa93ca34419c9f6e37d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ec18282ae95c5c9edf480575e673830
SHA1382f4ee06ff143467471832167c1783ebe7e0cb3
SHA256776c1ed54ceff6690f1a22682dade55a38daa3f52b3e7f00464aaba02b86a7c8
SHA5120cbcf3dff587f5282f6e2bda8a3354f095943e56f329fc0fbee3e3893dd71618e9c16679424fd35c2786a1a7ca3624fc281047f002152d1ddc8719a6304a3661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50322979b45b6ad454e4ff87f186dcb19
SHA128573eb65c5abbbc392dccfe4df38eb2306667d9
SHA25600177824a3204527ef7608c0605050f5a9cf2fb7df2098001e208824f84a5a00
SHA512a04cf655d274b2a00ad52fcbdc2df7d3a48a862010c5b88e4303dd8eecc8b529d1e463bbc4023c3607df947267253617a2be2c6cbd67bf55fc0d7f81ac51b9d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d466a23e30dd4638274fb46c39764f3e
SHA1b1721dae6235fd897f5793e77687c44ff5eebdf8
SHA256cc9878dda5dd1b29f19e5c8cf447d4fa5de079ddb56b28246c841a25c4d022d1
SHA51275d3cf455f55c108e8b2c3fd350ac102208998fb7efad1bea93cc2794ec3d0c8f28684c66acbd7d82a4724ee926071bc57b1606f3369cf5675401b7fba07d22a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcadd118a0d745d5697641f94e056b3b
SHA183e5fbcf5d6aa435fba768b3148af1379d822436
SHA256f098224ef5f04e9df56a98729b5a8ac1fee0d17efcc66527e1bf62b00ac7bfa0
SHA5124d79b52b384091af71411af77995ea90a0ed99320ecc91e85c6e4205452107c49628be6b8dfcf8a9cc7a511b44839a9bf4f83677506e73f797d8de59130c9bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0f7db0121da09bbab9f05289ea001ef
SHA15ccc39f3272d583e6012d96c361cf5a177e7a8bc
SHA256870445be0bd821464490eaf7e483c105d590657e77060f6c020d4c4b3000dd2c
SHA51296a778d07129c02374d4c0dc51126b1c5b404c62a2d5229c512b4c4a6874e3fc96a99274aefebf28d609a63a6342ab21e48344b1c9e8cb707d68d141752509b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518a19dcae13d834057068f101acf0a86
SHA1d5cb669e0645b65f7ab4e9f4d36d4fa5acda6e57
SHA2561a0e269b4987228999a6d951c308820d83236dcdf4e202ac0b5288c93344b464
SHA512aae40993b71b882b446e677be52dfdd9bf01d515086e7b96e2b2cc480fd39354fb9ed543af642eecd2eef8700d26c4d48a16e39b29a13ea45baf012e71d9b1f6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b