Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
bca83a810f272b52d0c53f4010742e39_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bca83a810f272b52d0c53f4010742e39_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bca83a810f272b52d0c53f4010742e39_JaffaCakes118.html
-
Size
531KB
-
MD5
bca83a810f272b52d0c53f4010742e39
-
SHA1
5477368be6523ff3065373c01ac06b05f3486109
-
SHA256
61a1df93b3075d735e99477e6a11949ac2086b774b94679d7db71806bbb68891
-
SHA512
70417cc55fae1958139e47f5a4e3b00d801d794fd3bbdbfab01ebe0f714a6c15f2f671733bb2efefecd68e96d464bf0809c4283524073e6559a019f735e27cf6
-
SSDEEP
3072:S48yfkMY+BES09JXAnyrZalI+YAA4boQwlTDoJrvVZxyjoYyHotsNq8BCpkvTgaq:SKsMYod+X3oI+YYIlX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000008410624f63069a2af0af42dd75e9f0846b9428c671d9574fd064183239cd9cc4000000000e800000000200002000000088edcab6e38a11ccec8d622dc1be519e25d0c91c6eb9f5fd7ac66a0d88bfd26020000000c8230735b648fa9b75b7b117e1212448ddc7d1d76736fbee252f75deedc84efa40000000fd9fe39cbb4c0e1559565fb7f33e796b71bd8300b08ce9aafc4e4b2fbf8d1408ba028fd1f4af7b63f2a6fb5380b6d2e69e78f4bd7b8dd317e2fb47da602c03c2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F3F5C81-617B-11EF-ACB8-4605CC5911A3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10cc8d0488f5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430598585" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2828 2192 iexplore.exe 30 PID 2192 wrote to memory of 2828 2192 iexplore.exe 30 PID 2192 wrote to memory of 2828 2192 iexplore.exe 30 PID 2192 wrote to memory of 2828 2192 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bca83a810f272b52d0c53f4010742e39_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50623cc53019c3cb86c55726390580a0b
SHA1b2fdcbc5953f9843064a22a5c08139b4753ed282
SHA256ce759239c0d965b4ffe9ff1d6560cb2199c8ee1ee7a8a2e0f301ce0ada9ae742
SHA51212449bdf29f609d290c9892620fbc781fb62290a5594d77d08c2b1689e36b8a19a4e4035b0144848567b628da25f75c89257967a3da51d5d0c70c66129f86167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52518531cb142f812862fdb9006b9b420
SHA118d1640ab2042ee22277228e04c81731a6145fe7
SHA256622bf1143040c26adef2e89fae3d753233aa424270d0684fd482598944f040d5
SHA512ce18625895f8b6937f12b988cd3a84f371073081b2c88a6d533be4f3b501e08438ab6e3f163c389c56c1819b032fcebd8435f7d8c3542a01100e89113d6fbdd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5618daf643e815e905c0e2c7894def192
SHA14b5aa73bfaf547e5590ad972d88789380b16a19b
SHA256c21e5c2e87361c3fdb29e86103a9762525b8b6f8f8d9368cd8bf737d165b050d
SHA5125e6fece1b6015066a0cd0ac54587489c735fc44b293737b9f15d425c2fa03d4f736e5152a208e0c03f7854c3ce1fe1089a32d5dbef310d3cddd3e49d9618ebf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b1d09836feffa89c669d0304b6c59ee1
SHA1d488e9f53bf283fed1c4a455e7f06ff497a82e4b
SHA256b4f8002e44d056cc1af62204f005d356dee5edf36303e2a620541d4c39b63b13
SHA512665d57799a2e05e34de359dc62d56a6df7ea84bc8d4fc7b4c84fad854f154d9ed6e3b488b2f4acd2ca2bb34b938cd894bc72c370a0adfea390efb0189579bef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ed143909ef0bab3b159efcbb5c4541c4
SHA161f1be238b2a744fbc20700f22da9d6b02885a24
SHA256acb7d5401517167287400e05b4faf8c603a73b5023d83bbc0c52ec72bc24ac0d
SHA512721046a79a7995e952c9f6c819869402c069f77d1486390710878888939cca8e06c0377a2a2a7b65c6ca8fe96c0cde3b70d02b1c2959edc97d3b1ee3834e786c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5eb6f9aee759bd9e23a6cd9eb09e484f3
SHA1c4a6ba1feabc2a0b47d1a01106b7bae5666b8f48
SHA25687e85cdbb6c376c1951212aaf60f58f962a4fe7c9e3824ae59209c6b9f628021
SHA5120cfe4c56f02e767898dc78e7658c55a40027b3d6216b4ed5f5f4e9d2792af76ec9886c861843e59f25919a3c8bf042e0fb03b28e3b3dbc00e80548819f30bc65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ab82a887bf72a31f5325ae9477240ed6
SHA19e1fe89be4b94a2bc5e37fe03310004ec005f1ea
SHA256c3e06ccea3e231168a02ea1e8d479e1beeb00e4019b52ab550f2a713a6e56409
SHA5125aeb0036c5d7eb4107374a58e5d5bfaf12c0509124ab7a5efc7219f9791234f9590c0c98b65262c97843977f977b0f17d8f23ab756bf387f7f99d84c8da6ae89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a6deae1ccd6eb17159947ef3a54d2e97
SHA1e479a1184e181aa3414681cc9c74e049de3bac10
SHA25648f4823e9203422575e7ef303046e77ab131bcf68733483d4d9c22bec0a2f1f1
SHA512cf0450af98de936d61fabbcf52864a7dcfea7006ab2435562f38cae638eddec2f635d622d6dfe4b7799dca1a85a5a1e2058c78ca2219dadd74f35b2e22273d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59f4432161647b051b44153dac8a8c490
SHA19e58080d8e588e149749548fce0455e25a2edfd8
SHA256863061f55faafc240a6f8bc6d22fa41fa035f111398fc7546eb9839970210d20
SHA5124d69fc182479643c9b41b005f7a34900c641573900ef91d082985bdcbd5c31bf8c1cc701b586c5fc65aed06b8c170bc066b2650fa807d9a0bc37d6b0ddd9b0f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51a782dc6badcc3a03906a4045541194b
SHA1a1cc26ef70fcd2d472b9f5f97c553f975e2c9487
SHA25688f63dc87114bcb0b56a24abc0b16e7d5dc14d177f1a4c7ea0e650d26fe2c6e4
SHA5121e45a63dd415297f0da98df79d14fb717de6525b9cef6fb4086debc3a0c3d79dba61b20f3d19f534da47b2c0a42b815fa23a1aa1731b9b9f21cde299adb9a679
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50a5e56a466c315c5d45127eb8ec9e7b4
SHA1b2f289cbf1ebc02a34bfe51922a2d4cc6f7fb07d
SHA2569f148d8ab0d2880b4fc9be887533a972376241c6e509e1f391454132c45dfd3b
SHA512b6490ad8b20f9f7deb1b4182b5d5901338aeb18cc4e2f7239435637b1892d79173562bdc6ef0908278adb66925c5c5bfa3a6a8a325208262ac0d794e00393510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD550525c58eb3821e488dbb259c9fcee8a
SHA13faa78e0651e0d833806424d7a995ff663369695
SHA25613969bba97b158e47ed44bba80778d974cb65686c932ff55c7acea3851fcb99c
SHA512eb9427b5f58c205c9afb4fd4bc1d3e35979666bb9df520f1b4a9b3471347414493070716df2e3f4112667b396e48d1d82685f5ac32b2a50435c3881735c60818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ed097e1e27bfd7bfa0a70f21f783e682
SHA111076801b7415a7058bf9a340e2553cdf1db2cb7
SHA2564db2f010b7a0f18897eef2b23f6e24f353096e423af4b96f1a19e8d8fdf8a100
SHA512141dd584ca60ce2f0a74eb86af6834d431b47f0ea99142d03174c5d9d79dde241c1b0be027f51e978956639b0ef934e0bcd05abfabd96871478013a4535ce0b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD533bc7bc3f9557eae734cab43f34660cf
SHA1decfc0bd460ea86325d24d8c1f4e142c5908abf1
SHA25635599688038865c3c4e0d909438e81dad8fe615cc8ce971055224e3b8c0d0a73
SHA5120455951050ec1b7a868c8584215220d54e1debf6189641206ea1cfded35e389a1ec45737fa9e558754590248e05469e9c071da95f0f0b76f1f112a07d7f75d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD572ea7852b32432450701577f3915ae38
SHA185af327441269dd53437744a1caf43a6d7579925
SHA25637e01e7c8bd4d529c9f142b64dd1e2a01c55649c2a3e770e6edcfcc5b5481065
SHA5127b96cbd0683cfc1ced8a6f249cf84b21826b2001835a1d1b98cb0cc8c548864c79effb3f075c58d2acc180a1fa10b04d93e72283d8b7922236e494a506d22c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a4ecbe0dc5ccbd519ed5fa15698c720b
SHA193201b6e1f1425f270c1e18efcac160f65b83d0f
SHA2566a6d7e1ad8fbd957fe18c1e541127856dcb1f59d0a355cce63defd4aa55b2b68
SHA512706885a62caded055066b8871dabe7f55fe5f4868b1926d9e755e3203098e3716387da32d60275ed37cd9f81b427ef4da78a1862573797973b95e7f2fcc958db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD593bd2c2824e507f669e980ef7d389bc1
SHA190ea026d9b45d8c1c2c62132933f552caac56401
SHA25644edc3aede8d4001d62b8b8707ea988931f39ef0d04d92d2f67b96810488c7dc
SHA5129ac1c57f55cbf1ec174cc5028d3fc5aea09b299baf443d7ae9344086d9c18db92001244987da3e67c780e90516c2327708ac296bedee052fea7137222096273e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e7392dee911d32881e835370036f37cd
SHA10b14fdf42512737fcb62b1325d8e2e1d8effcd73
SHA256d4c4cdf0a3426f73512b3d48b6abba549ecb1ca0e43116b93551ba157f4a69e9
SHA5127b5b78900cca6cc7afad40780e0f8f7446bd161dbda621816d09aeba02d2eabeea753cc99353f8729512337c8b6fb16000135543ab57e1e827c8b7d371c76985
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b