Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
bec2b811f183965bb28b6a72e64463c6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bec2b811f183965bb28b6a72e64463c6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bec2b811f183965bb28b6a72e64463c6_JaffaCakes118.html
-
Size
461KB
-
MD5
bec2b811f183965bb28b6a72e64463c6
-
SHA1
295cccc66def443de57d15533b3f2b98edbf08c6
-
SHA256
ab03df3eec10235eac3ba480e0e77ba09dd7cec83f8f478e9a98739ffde63093
-
SHA512
fb0178593932dab455fc2300412abda28b868b929675af6d7b68a5df79934e23d2d87e28e7d39f221ae8a8b5c57c717ee1c74eada3cbb68ef2fd003055dd6f31
-
SSDEEP
6144:SvsMYod+X3oI+Y+sMYod+X3oI+YusMYod+X3oI+YLsMYod+X3oI+YQ:U5d+X3C5d+X3u5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f063efa02ff6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C867F141-6222-11EF-81FA-CA26F3F7E98A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430670568" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000948e25c99bc81295c3727f67b112b7f8f8016e1a34f525ab029837cd2a4c2d40000000000e800000000200002000000047d23b0936fce7ec4d8296791035ac68b5534f126a054661c08ec3bf8724df272000000064c7473a813ae1602a36a37bf4f16f30c0468e53d9bba4b74782e30819dc957040000000c7f0ebbcac2c5c2cd079f37b4c316b89fccd6aa3121d2c8670c72adeca33feaf4a6a99c7c19ca0e679dd8c43d8656d0581ea1307d060d8755b014b45e5ed543a iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1508 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1508 iexplore.exe 1508 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2824 1508 iexplore.exe 30 PID 1508 wrote to memory of 2824 1508 iexplore.exe 30 PID 1508 wrote to memory of 2824 1508 iexplore.exe 30 PID 1508 wrote to memory of 2824 1508 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bec2b811f183965bb28b6a72e64463c6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1508 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59335fedd0a821bf7c7a2b71498bb05ce
SHA11432fdf95232d544320b203949ec7d4f62cfa726
SHA2562c391a0546741af150f48e3672124f246af7ecf8ad8a27d65288d933b06f5c6f
SHA512a5b4d9386e54e7b63f31aa9033a836e99ef1e0a0320224fc6c7ce8339310c37bdc82a3c9e2f20fe06d2f95856fc27c48bb0e5d6a777f788780d6a5d368771e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532e0a91a4d8fd189b391fa706adfdefb
SHA19dd252923932d72e5fa51016c238110b784f8065
SHA25636914284c4426128b8464a0cb45c5cf587be0daf1dc0c9b48407c5cc5b4d1008
SHA5124980064b246fd458bdb55c70641637a7e204ea10c15c74dddbec17f79ffb88114f71e953fb302c32a0b8df0ff2c74befcfaa1ca196dfaa3c7368fd6d49548c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59512d5cbe94267cf54d31e2daf151ab9
SHA1c1e574799ef5c4ef335686edf8cfd95ade93646c
SHA256606cd0d0bffb79016a4b7a3126a0df078d96b046ed0eb7b7fd3f22d0f1fca0ff
SHA5124a20dde0e9040f19a4219b4f0edb5ec801046777f006dc15671e166027b7bf202723bdefed565f0cfda4ac44333f5a327d1096ef31e86b027268bba026178664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5086e0f882cf01a5806d8a8a97271110b
SHA198942e3f3dc1f4a92f37f3f25a1a61838d027e1f
SHA256cf2a8429aa7c157b8193bf64fc67ed551e00c297a336111092c8c02d7f9eb9b0
SHA5121395b523a2a98c10f94c1cdbcc756815673432fad60cabc48b5025337436b0f714072478e1473ba9aea958d75311f925348cbf8f47856aa4869406e761328175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e17ad3ce86e84ca818f8039a17b862f
SHA13b92fee7b419133a26993e6a523a6e67ac24f342
SHA2561aa732d3f254a005dde831c291d4a302fc3aa762ad03e1ab6d279be881eb1106
SHA512545a7f83857fda1c27361327b707a48b199a92647b90f6bf39b5590e87a41f77b03a7f4ab1b5891f3e5f381b32f1089dab0b8f3852006c7004da945ae5ee4618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fec5f33079d1a628d77c93739598d612
SHA1a49295a7dc5214136151457fb6094b7300be6d9d
SHA2565e93f8f59815e9ca22cd9786ca56b8f6d91971cf5680df3aba9df5b3beed54bb
SHA512195846174f66afffdc57262b4362f3328ba21449a4e97aa30fb7ae79799b11f86fd8a1874eb562ff0ea57cd591156af89bc5c4c20b99ffe90bb40f4464e13577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516ec59827c440dbfeadee966c9a82f96
SHA10776a1f89d744e9f90813a424e88987daf6942bb
SHA256eb48716499a56f102b1b128a37c3274dc0eee50471b50cf20083b4a51d9bce88
SHA5127e0b682157fc0ef224dbf6a6ea8c632ce81eb65ba0428de6356b224b3249856e198b69b04650dc929765df7309e7af2fcc0dff8746f4b2d17d6b434658e3ad24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9415f3cc131d4d661a0e6ea1b727406
SHA1ce1e261f334c19ead883914239873ae9f18a7238
SHA256f4cc6d695617ce0532d5f3f728db3f338e11e9a2fcc46ff50fd3a7d1bc9dbfd0
SHA512e9f1638419642ea4ff65c074960ddd138c7cf49df2bf3895f8ddf8b7835e509871eaa9e9ec6e859e9de42051465979ffbc8a708331434cdd38c2cc3d1dc66194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58292b44700e8c22206de6ebfe2e38be4
SHA1341f64a6639c20ff979ea37a5337ee3b376d818f
SHA256daea76b1fa012dadfb239fa693a043732dbc90891b0e7615108c758b26dac1f6
SHA51207ab924852cc70420170070ca1d950d6287bcb370fe66a0e6a97a0b5857b8a546c0e331621f4eec9701f6a13a52324f7e32bc6ab1e7a4c55e613d68af83be2e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56601f1c5af3e83fc02a120ebab39c0aa
SHA116cadc7c221bc065ccc94297d32b5310ff253f06
SHA25683defb563d5e444bd4ddaeb4ae5eb331d2ff8607e0965343355fce5e52566ef6
SHA512c0b0713624f64d7901249e4a605b7453c9aaba2d43d951c9b0a780601c858121d00e43b8bccf0a628c58a9e6597926211fad20892e60096e141be8bddda4ac07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1dbb4745167b04ce8c5671e210708b2
SHA1a63a9339db70cdeb5b8e8ba6006953ad667fbce0
SHA256b4130ee412b34d4f16565df651ef5ca94e552c20be0cffa021f483ea2aca0d6b
SHA51232afc11d209ef7613b01bc92e16c643f3182dee6667c4f145edcba7712416419036c2e1868af1397bf37e55ef5d5369ebed328c28e14bfb5ca6c1d542a26ae3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af5acdbaa00bce8922494874d87f598d
SHA1060d37575135b3153d7a821aebf0726a325868b8
SHA25612e2b722f04b90a327cb93a4aa64d76109b995f39907ecf0559dedc715f85f6c
SHA5129dc2823d8810a3f6a16b8dded82d5971a7d6c97f3271118176188d4054b54cd6637d4d9d2d8aa2f78279141d6c565296f057dd2eb2d27f4ef2d3c8cce7b00c99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a89c107e5939fa927fb1dedae84b9172
SHA133c1e11c3e7b0432b3e7c77f54aa8878d3df7f68
SHA256e83c6869a282360561dd320a8ec322ae6058b81297955e10044161039bf1dbb4
SHA51298e4dfe290bd31f20336afdccd8910f1c52846e966bff7f9b2067d9761fbe537f7f6fa84d426b4d9268be95f416f17dd82d32843ae5215eaf1c046b1d3bfefaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a81c350ada867172104b8e4ba14b6066
SHA1787b51500667d4d568f05cd7831ff7d4573ce042
SHA25642a9ef478796a51ee34c0df00fb0ad677ac3fb6cb1bbf53bb987fb71e0093ea0
SHA5122ab597ee5090b628e1f08727e1449c393d75a1290467bdb872286cfeb094408f6769e604f35913ece902385a2cad62935bc026e52ecf52d3e8ccab23d2d2b61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5547ba6dfcddef25841c4f070684fe818
SHA14239691fd29e760fe3051c1464075da618605f98
SHA256f76311dabd95c0714a8a3935b8d4aad3584b5c94f53f0ad4895753dd2380023a
SHA5129ec65d78b998e5d157414124199e1c26f84ffc64542708e1cddf46a4e1b7fb912dc14caac832a6b98a5999f54ee3f9d0cd9bf70c21909eaa4b606292936a503b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a84bb7c350f69b38520c85135c7f0f4a
SHA13cf8b408260a988f5ef258697bc9ea26f1e17eff
SHA2563cb7861ffc019aad2d0df207a619e3909e662a56e171eafe7135420e019501c5
SHA51225b01bec6c6bf7aa73ee406035112cdfa5d00985d449e0e035587cb751a46e7ede7723a72e096d63dad3f8a942ced3345ad58c5bceaf13312abd5846b130fc5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8cbdc39644da708b4f722ea62ddea8b
SHA1eaf50e319336677da475c2d2490bf88836de1bf4
SHA256a23e02591ab5a3c571b5fe13f981aa8f7be725c3719ce76555a7c2467b203587
SHA512423369f03ded34578bdf9c5c34e186226f0e9d3b4245763b8ac8bd97b24938ebd12d9b436d8a7fb4e53ceac879deeee2a17395fdb4768e61c628de824bd30a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a15d9584aa0e2ffa8f70e0a08f00c65e
SHA15fac110a7df295125fbe0befccf122d4b6d28ad7
SHA2561501ec57c1c082eeaa33b26e8fd89c6ece21f6dfe45a0bbeae53063879bfadef
SHA512d531f8a48c2bd83838d510be0e948c0f939650bd92c8e02f445ccd2d82cdf2c7f106ba2ed07ec44e57e6f1e99f8ae0297f713ee104dd6b1f0b245ce7e3bb0f93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57adadc9ec030279c19db45a347130d91
SHA1f3a806aa36ad1f6bc1615e1fbaead1ea0b393cb6
SHA25646a8fe5849fbb53cd23726beb7c43bc8c65bac2a5a2764bcf9505108a92e7689
SHA5120ebf58c99ed94b978d9d0c09ffce2ae6f9d827ebe548d2fdcd42bdac71dbdad0ee522c2bdab940b9cda0c4aa147487d7d651e3ed40849bde8840ea42ad889966
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b