Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 15:41
Static task
static1
Behavioral task
behavioral1
Sample
beea000035a9efa866f2434615e9e4d8_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
beea000035a9efa866f2434615e9e4d8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
beea000035a9efa866f2434615e9e4d8_JaffaCakes118.html
-
Size
294KB
-
MD5
beea000035a9efa866f2434615e9e4d8
-
SHA1
7eb7356de3c71c94424e2ce63b427ca5bc8a2179
-
SHA256
fee4d39f5266ca6c84980cec2fa157556d77743a2a0be89354f66dab14dae584
-
SHA512
0e9392dcd01afdd03a9d884e0dc537b8fd213bc42c9ab06e624eb8ec98c5fc3dbfa747350236c60315fd64f771328a604bc65dc201c5a31fc18ca12c720866d0
-
SSDEEP
3072:SWyfkMY+BES09JXAnyrZalI+YfhxcVhiCVcejF1Yusd2t8bHum:STsMYod+X3oI+YfrscehyusdHX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30302b333cf6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5EA58711-622F-11EF-B856-666B6675A85F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430675974" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000586e100c2ce66866014c03aebbb71562c45f42797b42028d5ca88a80d88d9322000000000e8000000002000020000000d5f52217cba6e788963bbac2e4ef129edf6cbc2b30ff74cb192db617d3533991200000005c601ecb25ceaea9c1c058e9ba122428c711c284eb99c012501812957078cc2f400000001516a323606fb19bec142a16e5a9651ed67fcfe17f2545ee362177fb7897f047b8c319590796f7f632498f8a62a1b98208fea37fc5ea4b6baf40524807cdc63a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1744 iexplore.exe 1744 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 3012 1744 iexplore.exe 29 PID 1744 wrote to memory of 3012 1744 iexplore.exe 29 PID 1744 wrote to memory of 3012 1744 iexplore.exe 29 PID 1744 wrote to memory of 3012 1744 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\beea000035a9efa866f2434615e9e4d8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587383d3b17fd0902a0c1b3a0bdff09f1
SHA1d141f45079b4d8eb41dc41acd73b746064fc4128
SHA256c54fd01da944880b0d1f24e1d954bec8949a1e65741fc08b8e15f04bbb02d98a
SHA5120a8b0ef7cd6eb6100c2580f83082a92a0c2898dc271b0cb863a83c67565d4207488b4dfbe951dec52e6d9053032faf01504e041685654c52af2d492e59209f71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56954f52621e03157cf6943369390e046
SHA11e775998a8058f2ba336ab8ca147876f9265a3c4
SHA25687bc44ca9fd337c750e7872b929a3395f26d7866a0aca82ae09a7a7394398780
SHA512a6ff80e352bdd2b7553472b9d9639798a6ef63a6aa7126480f58c293cd0b7f95c697cdc100f51daa496b83d10be0dee28b8af4eb93774d5f7066f5546d937113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502eba8b5230951ed98cbfaef84135030
SHA1ef8bda7f23a7dc779c99acb98bc1761f376ecef4
SHA256284ee7f61d9f43531850f5c9f808a35ca49dad8dc9150e7a08487d97a69cceae
SHA512a499019fb739f4784569f02094e3d8f3f311ce39c1bff97cfb4575a86b1747e06550181ddf5da70ac9f4ed98875da9ec86d5debbbf0157d31467b4d3c63b52bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56682dfce5befc2afc8e25ff8100eba27
SHA1dfb4d25342ef761c2a48af7bb5b72a71970cf880
SHA2569c24fc17cb7ae09f1c5fd73570e0050ef7886edc4ef8b09cfbb232defdb2c6af
SHA512efaee596fce0a14931ec1bf195193caa7ed713f3a39b19213b5cc9d668bd1ddf91d23d87ae3c448aed006dffe367d4fab276f4325eedfbe742a7f339dd4b003d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be65ab2ee2fb0905d7ad576a5eebf5d
SHA1a215e68ca0b7a21aeefbe2d3d20dfc9c64290b97
SHA25641484b63c05fae538989b96e292270280e8b34febcc8915e7f4e9465a702d8bc
SHA512d55f35e220ebe1edb56eeafed222ff58465807e0336c342a5cf6d482e284089c5a5933826654036e9bd48f50f2d2f1f0d33c601b973eff7018f4d172a57cd597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddacc403cada00dcb316fe5f7afa5eb8
SHA1fafc9f3c4fd36d6d8ee360a2e7dda8ed32c68048
SHA256b5a20f4a10f594ee06d7521d4b627ca3528df03a741d4460ed498b158f26ae99
SHA5122f61626afd64671bc69c1dd825a1173463ed6326168bcf1320e1dbf4c6b65a6f51019ad25192454ba6a50ca86ec8433cb37952cd3f967ccd8d8867ea2c4d36c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3456e6cc39f5d6f8a25657a74d75a5a
SHA1f98e303c6d6c24b0d475288611db4a8f311076b0
SHA256f53fe6b9e7e66004d81aba8d64b1ea94110b90e2235ed33cc5dd056bdb1facac
SHA512f9232eee78877d46ddc9c854a8314d84f1f201b545d7cadeec33ad1d2f720c6f3b705c5a15839a886c01b4575c210ed42876a096d34b7683371b5ac9b4092495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9e92f44744c2f96af3ae102e86cef5b
SHA101dc4ebad3ebc3058ed25305dc405faca44b6ee0
SHA256582e1cc1ca2cc2444e5c1d037565575f68a35d9e9213a07f0d0a25bef17618ab
SHA5127e8ee239b5eb639252042b573211a12007dad8d7a5add29eec40848ceae89bf641770d756af88e8ac866b52feee6f4b8f64237dd8e6ecff26768bbd42af67e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eba6f06f2c2497d02c15ff66cb456db0
SHA1562c832c9936fe6ab8089da30af1e1575f5bb0f2
SHA25655b3e0da3c2d59930890b1b79031a1b3e572436f56d187d5655dd4e544c3e500
SHA512496e21688c78ae958743bad2f20a963c2e3f65b058e75523f0eb30404fe21a652ffec0573720e514a0eb01b192fc093811670a8e1201c85c50046f08f86ae16e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9467434d18059c63e7d7e655761d620
SHA1a42336b0835093ac8a3e9ff3aab312f08c60c754
SHA2569ef21d43ef062b6e45a9f73580ea091b30b0d0598e977c29b2357b93f3eb742e
SHA5125f8fc570b5b4f7c71c00f11649d9f52fa6a328573b129b88f452924564b76989b0e3231601ac36bf4c3294d5ddf58d554375c0e1d8d7340466cb2ced70400799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9cd233dcdeff789d1afaa01b51f32c7
SHA197fca55c16a628f7c34df760061451d4e4899b97
SHA256233df42dc96b13b138802c8b57b6af24edd2dd9023ee371a79dea42e5fd9ceeb
SHA512eaec57be8bb31bcc812eeec2acf296ad8a999999a6f6e956ae310c446709f6311361871289456d516513d6a6fcd14d94177a2d3871cc46c961f468dcb65c23e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d50fe08ebaf4b4957a5cb5377acbb922
SHA1b8742573b6e683a69bfe0c8f9c4eb6cbf5e6881d
SHA2569a491e06c41df2194be125e1a5a666eacda87fd5d32cef33a65863f8fc120fb1
SHA512d6573e6be783f33c852945379bb29ecdac763a37c983257afa82b891ca25f1acc602b4ef53a892306e109a3b44a2165e74eb015ef4917a8d1196c5ab06e29e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57958c876dd8eadef60e0b164ec611804
SHA1e07813e0341bdd01cb60eac4c918ba0b867773ee
SHA25661a67bde5deea80224c9b9e792fdd28ca570a77dfa78536aa26413cb4fa2b42b
SHA512021bd781e5bfe83d389cf4356038bc28cd199b6602304feb3ad6148965fc95a7663a13a0a28b2542f81da2b9c1fb54744452245ca73009f1d701e83359f9c07f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f162e8ab4f029c202016cb8ac4774f7
SHA14f55ceae809139df0e833a80aef60997c4ea777d
SHA256ca259c2540c5da85d87e362784d26457cb6f4013bd1be1ec584630b50c6ec846
SHA5128a25980815e60ef8faa370c34999ab7abf802b60a9874846cfa6ee8b7753cc9eecf7558dd69613adb78f63853fb0dcd6c0f6afe041b805b9fdcb138bf6c41a57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd84cae9e123311fca7c76bdb0f6cbaa
SHA187179f95fae91f65d4cc7f93946d363f436a1a17
SHA2562a24d08048ad3a4eb5480e74a9b20daa3e4a8f26b59da8e9f12296827d01e6b0
SHA51250ff952d17728c7a09ed3e5962bf41c068c9719149f07fb72fa912f58d2d26c4b9c2727cc9bb3ab1643e8a53606ea29737b42bdbc365df126bf9a10a83d6c420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5269b707ec7145ac64f6b8577c133baa0
SHA1a15dd047e429536bf32a6f49d58c65f862c3a5a2
SHA256dcd4968690a1619df24964ae6bff6ae61b12913e667e34d29cca574ef83e9e78
SHA5121120cf38f46bc3f647990c25bc82d3fc93137d23552a7289a02c340f8766f40543c7619cf8320f0f43de2630d696e68a88ec9cdf7acaa482725d58a44b991748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a7926366cc960cdebfe80471e9a3d91
SHA1158c0e81271797201186978a338bb564a6570212
SHA2566204d56a2691960b82963e7165d399449da78313085f73470b3331e02eda9151
SHA5126ee1791d88e47b7e322b050effb5e70b243850cae813abd75f43ca5affead9893422239f0f31d13e58b9ddfa70879d7dc19d9c87ab1e7852f5f98b83fff49389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518b0a37dac2b946c00614e52b705dc3a
SHA1c4d8289d113698de8f8854bc01bbb4b51995ccd7
SHA256f87be79f0ea604416d416d5daec9dc41b5ca3b7fc0bfc6b6c5c0febb0a9ac441
SHA51290973dd4adbebc33d108922665010c14e8edfccf32c3bbf30c6308d71c035163feea884dbc7ccbe7d30067c09b7dc36edb267d7718580abab046e58de104cb2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5450abc621ad6734f97f3d1dcb7969f07
SHA13d9d50ef3031491621dfbedda25115bb1bcf4be2
SHA256ce3c7ae077fe5f3699237f8ef1ed60b44985bd53c2054325d23e02ce5e2b1254
SHA512be0541751c8c243e9e4d3f774c83dec275c0b1d761810323e9f76e3bc3100c0aa340e647afcd9409f558518d2c0c48e7ee3cd6431476ffcedf220797926178d9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b