Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 11:29
Static task
static1
Behavioral task
behavioral1
Sample
be7ed2bc2c0591e7551f1efce135a9bd_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
be7ed2bc2c0591e7551f1efce135a9bd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be7ed2bc2c0591e7551f1efce135a9bd_JaffaCakes118.html
-
Size
19KB
-
MD5
be7ed2bc2c0591e7551f1efce135a9bd
-
SHA1
fb2cadb4ead8c2c17785f0d343f9d930e7972397
-
SHA256
ab4772da8765e99c48686324b604e0f621fa96dbada7055b6f66536329a85736
-
SHA512
53a96dbb3847323cd46a12e7cd8b3ae3cb11757d8313f686b0219faca6a25ea8f935f846069676e9ede30cedbb7dea924bbadeb06e908110b0b46643c2bf11e5
-
SSDEEP
384:KLKy62iz8L8h08jZxF95bsJoOGtXyQX7VrGnAJXp:RhzeyjZX/yylGnAJXp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0209df318f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F1C0BA1-620C-11EF-A61F-7A64CBF9805C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430660835" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000212651c4f328cc9cae25ec85f538893e797114b81c2a8e29a33955e6c32ce6e5000000000e8000000002000020000000c3bf25ae8b5cbfbb1c5d94fe281661527631d8e801e0737221270fd2d6a0045920000000120af53e092ecb4efed893d4c40b2265cad2058718cc008e0fd080715e3301194000000091f475f8964ea5cbbdf95d5ca4dac8a95b4d6efb6f1a80943b8bfebf046b9d03f5d3096b114a7e2bb5e94fbf3061a137938d0085285fbf7f03025569a3574427 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2076 2320 iexplore.exe 29 PID 2320 wrote to memory of 2076 2320 iexplore.exe 29 PID 2320 wrote to memory of 2076 2320 iexplore.exe 29 PID 2320 wrote to memory of 2076 2320 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be7ed2bc2c0591e7551f1efce135a9bd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d8e872ec46d233fc0c9afbc8bfb2b7a
SHA16eba48fbcaf34e2ae2a2794f2a61f4464062f200
SHA25677ccfb7705d76cb9538bf3a94367b9260b8c76569a130019d10567623fbb9ef8
SHA5120e736e13704ecc798cba586a590c06fbb46537598497c2859b4bc9325f20e3462ffc8d150837dd500794583c4978fb0eb0efae0a3573fcc9ff18221da9f99c71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8a665f84ef042915e117f0f96e88da7
SHA15317591efbd4090f0dde18816b6a3f56ac583e07
SHA2562a8b0e73196a399ecd08ae65d6928353ecf777d0c45ea6cdd9e8fcb7bd7d0935
SHA512510121a2ffc582cfb1d07bd0269e9e77a7eb571d9d6d97f2ee55fc6567104686f44327c7469e8c356e5d5dd4468957333683089cf91e6dd05104427212265c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eef3b8ab115d8302c12c7d460e29fb6
SHA18fd0019f5aac7f3de07bcba1c1bb9d3af3d1aeed
SHA25696af944504f701fe8f728a11de7c28751c29403e66e67c177c48e8714ed69854
SHA512b467c2e11ad216a0fc9bd6cb796eca2551730fb9b48b9866bd99b0dfcbba6db718984ee5c95de4e0d55af611ea53cab49557f33008679ead9fe0902ce392fbde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b96e675b0ea523069fd2d23469a19b1
SHA1076757cdf9dc7e5b486e717b2552b5171c8aad1d
SHA25622d0d38135c25c1f1e3cc5a6e8cd55ae4c8f9e66e0c85850b28ce8ffad2aa6c8
SHA512d59dbf54639e98b6ae40252f8bcd8eaaa06f1793d9dcdbd7625bc2bd8a26d71c554d0c4b6a1cac540b3c0b5ff5aba12582b41280cad18c6364bbde33d20015ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec37edf56ecccfbdb3c6b195713c5ed3
SHA1ed21780f57675c8f2441e133b2039ebbff62e534
SHA2566baff907739b5fc7af5e29ba846e27a85a0025412f8dd83739181e45dcd29e92
SHA512683f60b218b7e8bce902b86ca0b976fd01b951e041897a4fa8406d67de6084dca0ea247d544b7ea0b16dd4fc48c74921196e770c2dcde025291357667bd495e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53732283867debd0d40560f09d07d7d08
SHA17faa166b0b0ca0e33dd2adaa904e0731491cc93f
SHA256c1497a2e0f9dab791e2a4a82620ac781448f4c4d0112b667e8495f01b4e852cf
SHA5126e6c69acbab9ebef1941b2d3d7caa7c1bf82c13519668d8f2982a441c48a49b4cc680b7d29a3f0962c68164de20e6c939ae587a43c4f0646885ac29c9f6a5736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be1227e73206b808562099325464f36
SHA1f4581114727f4b6575bf5c0627114fef39dc2d17
SHA256e209f09b297ce099dc365661e3aa92e5fcf3ff4cb8bdd538683d3625b27bfeb4
SHA5127870798d062ba54dcbd45bb7150168011e53e06e018f9146393e2352380b56bd12b92c1d80eb560f797789dfd099636ce04a06c4689ff1fe9590ad4a0dfb6916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd06fe8e37bb080dcc41a5155e237776
SHA13a5784470cc7ed79a8f032dccb8ae0296e495eaa
SHA25688e3998b42c036a7dd40bd37cdd80e17ff764f3bb07cdd2168f272501f6f319a
SHA512b3101585ac44b459898bbf578b086a1be38560cabe1dc4e5c9b8d9b84a4e20af63634d8499b844e31b2f9b65e5be71b9ba3fbd5c7767e33f2c3ee8cf361bd92d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5473d5586fb4f369cd1a3d5d981b15eb8
SHA15e8cd10b560ee4c1ff7a7407518b67d5fd6e9a97
SHA2561267db2f0a6134fb4071c437b3ce2edd8835516471d56f2c2ea73d9f1159d675
SHA5126630a00b86a5c8c8d4a2fba31496c2b1cf0666b93e7cda4798abf4093ef6ee0c17b43b0a028c62a65246e06edf3c37c2fd8d97570b5aad7de9ce942fb812e447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a870b20fa1e44c16d4e8b8333417450d
SHA17718625e3277d5eafdf6adbbeb1ede89fa611c86
SHA256d4241caa3192219008e328a7eed3a55e44a1293b4eb5f2fcf17e5a4c42e4ac82
SHA5129bb8af0219b38fa1434a1a6c9d6b22b64d37e998d19eb2c0ce3fc5e04048dfcd207544be958b85318334c37f68f42dbe1c9bae0be374fe864d5d8c803cd354fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e82d8c0d90579ae8db18d2987b1d8254
SHA1e48829dfb84d245efe0774548ba3070cb807c9e9
SHA25660c4f15ac4d17a8f2951df361277959497e22dcab8514ebc84356c429162ef4a
SHA512e1bbe102b3932b8304edbbb6bb6124eb88c96585093cf5e364b517a3bcb6fcb4df0b70a7b0f69abecab66f738f6c59636f1793cc81d9f80f4c199e5865c0a82a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5732f868f8dd6376f5375baab32946b20
SHA1a2ce66c8fcca6b34ce84879cb763b2ce4391b593
SHA256c31fdc2f688f88a4e5bac18832ebdc3717f8eefbcf7b08bcd17a4731913fe678
SHA5121f8f2dc9b28e062f5f06e6b63599accde7b976b28c788955c5a1727f28d79cdcc1507cbf56920faf329488d05e20d52d9c1c6da13fcc95f984c44fb2d70f0741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59965fd41938343bc1c5c34f9ede9ce1c
SHA1b15acc79761585fc1ec1908911b95879ca68230c
SHA256f2666e99b78bebbfabb553e1db95077908b9c037031ba95ae6fd35f9f9f8c658
SHA512ecb6da920d79d5ba7c075f93d787219be993a2b9c7b041b3b5aeec27ac77fec5c2e436036cffcfa55f8ddaee69f108f50e79c3e69d6fae4b816017416a7bd05a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e46d6987ede006ccc26c9f871f90ef7
SHA1dd2d916a93fd799283319b5934d64ec01557942f
SHA25610363f19ad21ec9d084bb5ea079e424cac400b0da8aad85e1bcba09417ce8a61
SHA5124d3f8ff1a2e3b1f49a23eaac7919ba9ab2adc1c06adf8bc08cb9afe8fd01dd1b823cdbe8d7c3845f5ccfdc385101f02bbeaadfdbcd21221903cd2f350fa49f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543fdedc9bade304d71375f1027c460b1
SHA1f2635b29e13a24bb4b5065471e9924939738ff65
SHA2569a3952487f1bdce51a86b5c10ee66ca94c5d1ab5bb058ec61901a2ff0188f94c
SHA51250fa21fb5ecb1e1186377ad86207550ac250dfa2dab2c1a89f49d146384ffbb8e7c220d004121155dd913c2b6bf18047c206aac37abdaed5e3c46c47af411930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee49a7f35b751053b7c35688e957a34d
SHA1b9329742afe476a82358d9d8c153052349a32d8d
SHA256a0cf838706b08a174bbc83dc7cf6cc9d80d92bc5c86433a8caa67c960a346a62
SHA512d35912cd51c1c302a46e3421347dc38edf6a4c1993c76bb20397451032628c0af5f96bde3382bb6d609cb0ba3f45635852c78f9c2bd772944a44bc32eff6b71e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e86b93f48918571bae86edff87bbb384
SHA1dda177e51b3fb0f71c4f23f6f004f4bcc9a39cfd
SHA25606fb0a98f5a94ff414bbedbe2d42bb03486b5b93ac1eaee9c6c9025f17fd9055
SHA512f0c10740e3c2652f127beead5178257456dcc6ef4d22d268852f1138f61fc437c61fc28790c60be9043a695b9ba6dc4c24c485eab861c9834e347ea0ed1a31fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549861a460a1390660e03cb83292a43c7
SHA175d14c30cd085ebc816696a13f8c7d769962264f
SHA256756caf73c316c3d14ba4ddecd1b5f6f7b385077a59cecf262012cc1afe6c4179
SHA512b98ad2097e4799e868d4f06f9e1362aa0ef01d788fec0cbe48edfd22f8881c33fba7436b08c67a4b207648d097bf3a6d8c2c69a6d5d44165bdfa116236adf025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4faf24fc111fad3207aea33601b73f6
SHA1c5f81ba58a710d5a22b6e8ba25104c34157b22b7
SHA25629ffc647ae652f41e500fb41a593122a126ebddd5b38d36dc30ca9dd19630426
SHA512830de5f37a429414464ea62542eede253506d879895bd589c211b7f022929f4a9db780a6bd307cf014d40daa7af465889a8fd7d88c8a7b97820d7c8fef398ef5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b