Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 15:27
Static task
static1
Behavioral task
behavioral1
Sample
bee38c5a5099f2c70f9fba9f0f21dbca_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bee38c5a5099f2c70f9fba9f0f21dbca_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bee38c5a5099f2c70f9fba9f0f21dbca_JaffaCakes118.html
-
Size
4KB
-
MD5
bee38c5a5099f2c70f9fba9f0f21dbca
-
SHA1
a99b72c9398b125d545420e0d4423d32288d2ed6
-
SHA256
482ec91b193b5be737f9bc4f74d049206d5229afd5cff83eea884bfaa53fd2c6
-
SHA512
2890dedc3b4980482b01bda45d4b210aa7f1acc69e7b15d1bb55ad7d9f85d34e778056002f71465d61bcc7cdadb384f104814f2f0bacc8d16c867dd67809b151
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oS5Uod:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000aa2981409df28824724db2f33c3ca096431015101722108e4b8fc9ce90bb20b7000000000e8000000002000020000000028b6333e0192960db55d09f0b0356744825c4dfe17e966308ef1faf755561b62000000017fc54df89f1b54c044938a561dc043cb058ea8f4b31805d246706f666c2150240000000a8eccd90f5264b73b04674bebf46a83b86707fe8157cc4b34a52c206913fdf7d335a0de278fbdc283bdd09f467021e49653c5381b69e78696f42e3015be0748b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00914f3a3af6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65D3DAC1-622D-11EF-80ED-4625F4E6DDF6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430675153" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2784 iexplore.exe 2784 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2712 2784 iexplore.exe 30 PID 2784 wrote to memory of 2712 2784 iexplore.exe 30 PID 2784 wrote to memory of 2712 2784 iexplore.exe 30 PID 2784 wrote to memory of 2712 2784 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bee38c5a5099f2c70f9fba9f0f21dbca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5135f16ea283aa0f6f23790da6d55535d
SHA12c1bc8b7b9557e70669a7a2fb72a8fe8e7e8fe30
SHA25683d92dff4db81cfb36fa46dbc74520bc7868f3b7fc124e3a9914543d4dd463bd
SHA51294c2ad79f0846865097400da251a6208370b3f1e1fe30d0546ab81bfc6dbedbf10e05b6a31fb1b8480a4f67eed1c16aa9adc1046b3b8392672d34307f1a9bc73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d5d87c85ed1050b32a419ee369ac229
SHA1f4f2f8ba427102a399c63af517d23ed38276a70b
SHA25625d2f61abb809cef8019730e6525a47aeafd6d11840cc01e8a0ac047394f5833
SHA5128ad6211ce9342eaaf26aaf2d451db2dc5dd0775c89f6de714e9367659dab6fc6ca72f64795aa14269563896393d2b2f90db188ab6856c50cc1864fba3e3682e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552d4ebf18bb1c692ad70de54fce2ea89
SHA10f3d7cc57fbe7005da0d5da10ec998234cbea0a8
SHA2565f11ff50316f10a7a119909c15b459b51cba41d4f6815c0da70543b5466d1828
SHA5129ac7f479e32f7ab9b1f92bd2581d0463e7ffdaf2eb19636f3b7bd3c99a477418f53e0b499168e40273e6b5c2897a995c6d51697508a5984e350bbec6804e3df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8a607ae75ac279bde856e01b6b18490
SHA19ca0803e3adb15cdddf2e12ae99f7c7d3e654066
SHA2565082f8e0123b9860d38e8d0123da90d5d44f0d2c35cf918a187c825b748c10a4
SHA512fe608aa6d60b0852274e6ad0e84e04c0c3e26a69bbdea9b9603b0ecd29011952e116febc5bc5bbe91eaa3cd4eb00883072a93349c0fc5e478da60590597e5360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521519edd3e5b1694e16671625d50ce5f
SHA1d9be3365200da3eb650275a2b9f3116f7f7b9f31
SHA256c5dbefd85f76219514f62609a2b6bd75a8b722c9e04f7adb62f6bb3bfef4376a
SHA5120da6aef6eeb29e26874d26c28a6b7a5a894e4e7efbbb6bf15fe719cf7a79f72b19cad6f5f2fd0df4bec5559d45f2e32355c7443e0c58f0a1806cca122e46d8fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c70dbaad32eac12cf03bcd4ab5bc6e03
SHA1d877aa0efe7933582f3f24f47b3ca6cde8c19a31
SHA256a8dd9c88bdcea7ed82cedcc17d72d28dfdb51b7cf97f18f9be399a55072536ed
SHA5128e3c1e2182a868a5bbf41db2b5bca47729ec81e6889537dfc8a5f03372b28e58bc81c312310e35a69213918f54629f1f4c96c832741ca9867ad16f9079990097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e824c9d2d9829f2ffe05e986ca21bb0a
SHA1e1dc2d0e7a26fece9ae77cb5765f4961c4d6b156
SHA25657d21caec6d17e68f11b7266e45137986008cdde6a227b95539bc1f688767fa0
SHA512ab4390b6edcc7371414c217f3f5d39bf149225d385fe234b0d630c910dea18b257a262adee2a3fbe069715fa134bb23c610778dcf9d615736ae4316c296ae576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddf61f97df82c10bdd63f43b83bcc41b
SHA1db2e18941eb06b227765180842f7f1190174a0fd
SHA2564dd6df8e8c179bb8a43a9ce0bfd0e044430284a0988a7469e42e7f7456c11e6f
SHA51247d952373a988be690545f2d6366479b4f5458c16ec481b2503629ab1f8e051a4ee008fd8e8dfbd0e250a41321eda0b4808cc6a2dc397d22b155c2f9a639adf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533267209f1acf4f1645d4198185c7466
SHA1d407bee8fdc9894150d1b5c67089990f32ed0489
SHA25645e4c30b701b33817fa021f3a5b22e0735c1a93073471ac86ce12a141e2b0b2c
SHA512ddc184d86996a34f542e2b85d7d1794bd98c1032c02d6a7511e2a746d26bbde02b900d7bc6d3328721197d2a9a57b704f75ab07550dc061eefc8953194e7f534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b887053b0040f5b2973ea6d50f3c5d89
SHA1dd97f9695fe90ca24968169bff8e85ea3d6cf541
SHA25618b378f47d4be083a0f9e0b543289d7f47cadc8c76e5d01fc3887caae725f39d
SHA51272bff591d043ca06f0d433075c8aafbb191bf968a4f0db40064c10e6ddd2f77a1e7482cc9ca3ec981855688384b1524184ef4743fc83c48dc9f89c2c6ac2a30a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5904f72cd1f7195f0b8314d540ab60d2f
SHA16559d74812cda518138cb50d0f22a0ea1da0a7fe
SHA2568c87045a397269752c1d9d3454fc7af75dc89a3959a7bdb62160f46df2bcf227
SHA512d5fe177496294b2576732768f21374d19d047e9f86ccfe23d6090917a57271a3612554b5a96aefc0d0d440a6de7a51e5d783c73dce2fe91f2345903b7a5c3ee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558dc9722e01369c1787c1db020843961
SHA17a9a752c676c5135dd3588fadfed66d5ead6aa98
SHA2561b8385f526bc2ce376ca8d84eee116ff4fb887c4c0d07bc85a2bb7227de5b82a
SHA5122f28e6402c8a7c5bbc7ba51f26b7ca30e81b10fd59fea5b1b851bb24011d858eb627b36a99df35ae4f467f7540b4a976617e565e20ca8cd2f6ab7a550b4c1ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c733b2c894fb94e8d573b58db4a5155
SHA1b6f993c61209fcb6662493f25efc92b2647343c6
SHA256ca8ca48b8e4634e0df8c05169642e397d0195fe4cd0a77b1235580f3a67c6b50
SHA51214526dc2f06e8f90d08fe87c263db051c07ec75d1eb7890e5173bcc516ec0f2130c3f4f64839dc86cdba741faf2ab31df82aca858070a1adfca5f9c68beb9c05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0627f1d804adb491f0b1665518f5a02
SHA1571fe140cb6176c56df97cbde94a965baf298d48
SHA2564fb39f03d058a525cd5e3d1ddd941836e48a9eff59a84905f1521fe3b415e1ec
SHA5123ffbef37e230fec9535c45ffd821e78e0a70a1f86d14d6093dd9019c53262ec745eba6ac83e0f0bbaed33ad1feca822f7f7257e1cfa8336d1fe627eb4da590b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2f2cb9d19f0eb6616b53953c343198c
SHA1d5510fc2b93a805094eaaf1ebffee71cee609b8d
SHA256589fa9e91082980b04a9e528e50f9f0eeec014469447d8c6957fba447ef30841
SHA5125f1bf5c10fee70b76688d90bf7f9a8ae2e331a68b11f7160f4613c8e66e9c5a4eb14d9da48137af63fb0bccfa24f5b677d90f16f275ac92b6227c0f3f0c87be3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5442229740b0262a2c98e82aa79ec0e9f
SHA1405dbb94ac40aa204dd069d99c3686979699dd4f
SHA25638f821133f5ff3a77f908953bd2cbbfe41c27fbecd377d73d8afc1fa9e6431db
SHA512fc823bf07ee513be6d2e31856bd747d3bd45f8f162794b7fb7183e63a18c231bdbf53c945bdda7088753e102384058ef79631a42d5d07962daf86cc41871fa0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c669a01fc54ab37cd4eb7ec6fcc141c
SHA194be1d877fa9de4b16e04f42fcc1221aa62a99fb
SHA256f0ee01119fcff5f15ab3864398a2d091ff18665ee716a91065f8fcf46eaff25f
SHA51225c97d9ebf1dcf8b58c9d10b1418aa59be5f4ab5134b72dbac7e60d7e471cd3e94edca78739ebd103bb5c15d8cea1d3db95c5b0df2c291b17e626977ea2e5504
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b