Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 05:15
Static task
static1
Behavioral task
behavioral1
Sample
bdf4bcf03573b73e0a04fcc9ddaacd31_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bdf4bcf03573b73e0a04fcc9ddaacd31_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bdf4bcf03573b73e0a04fcc9ddaacd31_JaffaCakes118.html
-
Size
10KB
-
MD5
bdf4bcf03573b73e0a04fcc9ddaacd31
-
SHA1
546353161d535f41b95ae972c6e46f0aa1238ad4
-
SHA256
668d40a762fe8c53f4745a606b91b95f9956a4784abf132f24e1cfb3d0eefb4a
-
SHA512
31e68e438f837d853323025a9c66c2d1fb2d80076de2c9203b254fe8aa4e7672d904912c7093bca8e2257fc80c6de226a13be8d37bee169c6fbf6165bc8c0e05
-
SSDEEP
192:5G0SZY/JE6H6MJ6kK1jP2KDBu2DaW6k1QsnqagWCpCqagWCpCqagWCp/:yY/JEg6MJAnWrapCpbapCpbapCp/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430638380" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D5891341-61D7-11EF-A533-F296DB73ED53} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 308362c4e4f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000094b143ed04e57d4a3eac8032aac544bfe7bfa875cb14939a8b878da025cc1a73000000000e800000000200002000000069ce4b846353921fda48905c75f00d7064e78947add5cfeea50b79d3fb2ec60a200000009857892144790137dee20cd489ea557ceeefe776c6ea37ff8b79099a5e171fbc4000000097bd533bbd7c98138d05dfcce422401e5ad49f7a44f882c54c57810d1ef33cbc74f4cdedbae750e35de6b7e4d74e6ae16578dd909c47c81168640518dbe55951 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1980 iexplore.exe 1980 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1980 wrote to memory of 2920 1980 iexplore.exe 30 PID 1980 wrote to memory of 2920 1980 iexplore.exe 30 PID 1980 wrote to memory of 2920 1980 iexplore.exe 30 PID 1980 wrote to memory of 2920 1980 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bdf4bcf03573b73e0a04fcc9ddaacd31_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4dd1a70123c198760038cdeab99a1c9
SHA11d87c5a81326fb11dd8249348405161975923681
SHA25625842be61ff989f90208876c75f3fd2acc775d8859ad6f878db98585473ca8d7
SHA51229132e37d0f1fee2e50e8782c1aad301cc96dbea995867d5fa61b6a0a1e33d63e988ebc78c54fc286899a9d6304da5230145182af96682e5c452397b522e39a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5278d41699525084f83cd1b45425644bb
SHA16fcd3e8b17524bfa85052c172ac0e1a6e9d5ca34
SHA2560ed9678d807665f766f872877cca4c1257b56c2e52d3d207d2c10fc82ae38115
SHA51274c63cbb369a05f3a68fa43217317fd3aadc842fb8732451450fcb22ef6ec1cb1fe6dd5a8bf0b3ddc196d572c8e409330152d22c7cfd78f2302e42fc770476f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4f7cb64e9a1630a5e5d3c6d47749db3
SHA1866c02a05a77d139c2820d5f23577f61ffe0648c
SHA256dc53272077c2e5db98ae02132bd3ab5e48a63d4aa201090878bfa88ffeb84bd6
SHA51251df5ee6c06469a052f6ac13faddfb0d05b924b0bbd601208b350f6c087e908fb5a226b9827b5d38887f4f50ce987053edbfcd0e19b9ca8b42423ca4abf24753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b233bc289f7086a7b9420c261ffa0dae
SHA18b0acc11110203d1e10ae9e2152ac6182cb38ee1
SHA25655ff51636673d433b7a14a76fde0ec8d16fc828af58ca245f487551fa7697fd4
SHA5126b8c9aeee4b8dd965169f29beab97d1e0f5498e8a932377a7eec88f7fa4d6d4ee8bf5e99ba8db6a12964c85a77b20b89b4d4082ecafc2c7e48fd2b116613100b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cb4e09bed5f02b2f6ab3156e9636572
SHA11eff593c1b52a253367100acc7b45d1c71240537
SHA256246747b1a1de17d233854c0deea3b35af2150bf082f351b5661275c2e0176f92
SHA512c746b75cd4ec309b3fee50b09b55a02ecb2a2470aaa5be6e68bcd327332fbe2134537d346f0b357b150113d2ec204226e9402503b0cf0275d0131016ebc8ee21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c289c0cbc6073de968db4e53eaafb697
SHA18553cfb1590e0fea5cff5dc74fd17a799c6cf3a9
SHA2569bfa0d05a6420547829d4c89f996846e3c6fd284b094ad7439e0bed1a5961a50
SHA5128857525f63abd696ba49cbd3a05a1f64631aec39c0cd75011aa24b96bb675f3b631b5b2707b1803b31a17addcbc0325fac8f98f86167839908f162d2d2e18cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5454a6bfbb0df6929a7d840f83cbf2fb8
SHA146298eed5520ac042064a4ef21784b855a9e6772
SHA256a7fe734f2e0d8bf7e191bb39bcf175452e2dc7c06a06602fcdb439da52ec9f0e
SHA512471b294a36854d4f1b3404045b1d047e220221c98d5e6744cb26b40adc43be461cb4e81ae5fe3fec16b2dedcc9986464fd624ca343400315a24e353e6777442b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502a9dade8c4efe11b6faeb40acdb20f4
SHA19fafc3398d5ec0b5c0e715ebb2eb2ace53c6e63a
SHA256f5c2473af36d853bc50377c6b85e43a117e313f6830cbd90ed5f6aaad5043398
SHA5123850029a35923f70f4ac3a0b93a4a67c600505949c578c163444c5f6aef862dfac097343bf46ff4663d88bf19b6afeb3fa45df63ca9af3e8e9041fcd71c585f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52459b16cfa01f1eca31e0febc6de9512
SHA19312326382bd09c9af0cbb6ab83774593c8a9a92
SHA256f3239cd97d5d817e06386c5909b53f765c0a8992f11967a0177883e950c07c7a
SHA51227f4a17a7d953aa1090e77e6c5853793c39c434e3a2e893fba8084fdeb72ebf9b1e132d0e9dec5963514eff0b3943f0a44fbde6fe284424f6d95fb1f971402ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519fde030eeea1b125319df49502e934b
SHA159e640687c2f22935fc956da29df54d9f1895d8e
SHA256d20b01ccdb8f1b94f01a840f4422b563b917cdbd893b031e85c87e738654981f
SHA512f996d0ca55976d9b285bbb3dc53cab1fc234851b113181af6e0e8c6959a23d3fbc37eee70f0131d6f4bf48ecc386d2480c0dc397113e38931bdaa54fe5620d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526d521b65b0194518c352c396d4eba10
SHA155f80ac3715cc5b18fd350d65436987887d6773a
SHA256bab9e67948d7f99d83259886f77a2f14e67cbb25f584748c80c52795ac390a62
SHA512a64888e48ea5d975dc9ad4207afcd6807fd0dd7ba52b51048408ce5136d0c08f1e79eef545faba7ad822c9455b84a218e77bfdc4065d688c81894a727ae8f5d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3bf76c6b8bd0a2ba54c0a01a68890c9
SHA1e64fa695a724fc271007a7b64b380269029c7749
SHA25612c122f0ade3abefb0dc6ea6f2a5778a0d2dbcd29c203ec2cdb0acc44feb9c5a
SHA5126c4445a1d1bde29176f9760f4f835e39ed14b956b0292fe2ebcf39909a066799e3d5356f8153bf4bd76a6b1123da3d805c07afc4056df7da5c1dc023b72d9fcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2222a05faddffa0b81488683d3051cd
SHA1110f69e9d84c8769353420fa67f3f1dd58cec5fe
SHA25653b4d41873e1f98ca4b81615cebdb8fc149ed2ea6e8f51b2a982410142ed4e4f
SHA512a1a2c04a2853d6825c4ca09f24247426cc8b3fd3e6a67259c8773665250c477f9a461658be5327639406ca540c678005f76f67a474168f644c20e55ba2b9a1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da40abecb247dd520e9fa6e6e3234176
SHA12e6226f95560607e115a858d71adae74a7fa3cb9
SHA25655b93721bfe0f3f3fb29d667d79a3743994e10bb104f13f434fef6a190bc957f
SHA512e0bd8f45e52e51013852044ec0f91cb2340450c6351fa99389231b158da3b36e371b64736b73eddd4e75fb24df665bb1bd21626fb1562c9ba7f9cf47b1e9439b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da03ba15995e573dc1151d5b0141ccdb
SHA1853f052c5fd0ee15012f197463248e3f4dc3507b
SHA256692a63a656e74d58ab63f7f333b849d22160ac7b9e1fa75e7dddafb5c216718f
SHA5129410599fa2cd49b1be83eef04763a927f21d3dff4448f825a5d7415eb175bfe46a0bfaa78fc13edcb893876d865cfa9393f4f01500e4c6aa1fadb8c1fa67d237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d50019bf88568dc79db5ec38d3bae99c
SHA14b7880a6369559cc10a53c05b4c72dbb136da1e6
SHA256f39971ff44b84fa3184bf0f5fd02e6abcb860cc7f0dbef6a8fb258180a937281
SHA512194cfecf764ea9456a5fc9d30534e8160f6c1c262f333e25a0259f7660d57e86446c9a12b4b6390b2f3d8f494105cd8bd384f959de1888095d0ee537bc3838a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59308e10ec99a01a4f37288466d84e7ee
SHA1f09e7856ab8d2e7265adebddd6edf1f38dd79181
SHA25673777a4406ab24d62e07bfc4ffdde511f698258c8b5258d93a8f0ea283acc541
SHA5129da2c949d622d7c4587cebc473c449249bab237791e2421d0f5b875f89bc07ca1015e036b51c5bcbc9f608de8c08cb688bdf30e31ef28a117333fa1fd687fa87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59265fae23855a250cde6e83d590032de
SHA118c64d3cf4d506815981c8a9e79136e579fdbacc
SHA256bc875ba264b897394ec4d68675af752b1934c12b059e65cdc91618474a75ea0f
SHA5120576a714080ea019779fc03bec07938deefeca2b2491112a295758aacfaf82fe2d7a0e7499e7b8d880dabffc2bc98d5d125924a818f6f9cfa857b887bbc24981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50772cad0d8f24f4e23739be6ea4abcef
SHA140234aa39bbb7b41cd4f94efc15871421cefdd55
SHA256c967a949365d0c2b4d44a762f5397e39f1aec97535efa617c2603979455fee71
SHA5120a239c0e7b46e617d429029fb1dc121c4ae0c79c5cb4b13a37e9726fdd8af5ab0f58374003bde8ec2c6189dcff840fd566a4fb1224175077311155709762a1cd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b