Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
bee67e497fc6956d29091234466ccbc1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bee67e497fc6956d29091234466ccbc1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bee67e497fc6956d29091234466ccbc1_JaffaCakes118.html
-
Size
226KB
-
MD5
bee67e497fc6956d29091234466ccbc1
-
SHA1
382d81272cf2bb6b0166e7e971fa586a8558abb8
-
SHA256
5c7e3aa8df0d19376020e47acbdff8583fc4f46952818e993c54eb44f7cf86fa
-
SHA512
9d4b102bfa84604574cc5611e8baec6266d7d5daeba31721816878d5a67005e17714e87d4e716a4ab693a4c8a5fc68c53f1be959e48a375f594b30e44fe08ee9
-
SSDEEP
3072:+ayfkMY+BES09JXAnyrZalI+YuyfkMY+BES09JXAnyrZalI+YQ:gsMYod+X3oI+YLsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 408d5a063bf6da01 iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430675497" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 504b3e183bf6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{41C71331-622E-11EF-9225-4E18907FF899} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000b9727c97e27d8c2eb662c47c8c314e342f434d1aa7cbb922e0898691f39b665d000000000e8000000002000020000000d0cba29e295079da61198f93160522dd2c2c51fd494f52f16d4b32a23fdaf28a200000004d10b7dbe88fe972e65796a6d0dca170a3ffa14841565a446a71b4ac797cf89540000000b54bc71a081f56776ffccc63c76af458d78821e42002ab437277594f37a1ef41c73d43e297124c94786cbe70ef2971ae2989904bed854657bcb46a2fd34b4394 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2376 2084 iexplore.exe 30 PID 2084 wrote to memory of 2376 2084 iexplore.exe 30 PID 2084 wrote to memory of 2376 2084 iexplore.exe 30 PID 2084 wrote to memory of 2376 2084 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bee67e497fc6956d29091234466ccbc1_JaffaCakes118.html1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53dc29a631291e6a5f39d83ce04e02ad3
SHA1a109a3d1989933d2dfd1b7d668fc68c0bdad972d
SHA2562094d3b828273fb92ddb459322c1dfd435924fac684f6e6e54dde0b3ea6a9d1e
SHA51206c181b52c4770cc0bad558c712c3a2723b5a79d9ab3195ac38873e588dbbd668a797beda1e242377dee87701307ff011743d1ba30a8b5ef234b3278fe110a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f9ee62118c8a0c5126ca1e2714b10a16
SHA1516df03c8efa8feb42111a5548860ba49e9870cb
SHA256bf511c609181fda3e4534172d7eced77bdc29f72d4b4521d4acb1da1c2fbe16c
SHA512113d93120c40c2b16c4071953dd8250504d4d656991122752e8237444a37342db81da82ba036ea81125e4ec261b93f2922318c9d3df855dd927b6116474eb3cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f8da7f0abcc0b0fbf4663c2dd4a15341
SHA11bc8295c53d04c049a5ecf4978b70562fdea2ecd
SHA2562b1420c331afcd88d070757584e257876db866811061acf4658c74a5c331ef54
SHA512c4b95061b70adc67055edac7ecca663d0de4585d85b5d9142a897a0b40759be5ebbd4d664618bb5054542a780d099d5efebc08ae84f0bd386b8834f60828d763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58369a991426f38f773882fd5e2486ace
SHA125eb8022933759abed6b52742d3b4c25500ed9d5
SHA256a721593966390b4a8c8a30f84045916b455fc9f5ae04773653f9b61bba4055d8
SHA512a04a9bf2257f6c9ae77cdd27d1eb76ee829cc0ba63c82d76d15ea3a8cbd5bd356ee7461b6ca45bab71cc733c3861320cd8075d4e597c304940c61b78ab265157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51f88c9aaddd2a0eac402cddd2eadda11
SHA16d999768778a98c37bbe506898a3fa806ca7280c
SHA2569ff02da584d6a7c7ad9020bf2e0b1c64098cc56387e91e9883f63d6229aeb1f7
SHA512bb3ca27ccb324215c8afc1879bd05ef4df120175c77e89f246262ecfa35cd1302f3cbc56d23edd44a6f08969cc64c07da2e3d0212f1a3fc8c093c9403cc227a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD546fd2aab3902811105145e950c07143c
SHA189095476060fd707dd652dcee14139142f79efff
SHA256bc37fa0373605862e5028553f1ee2f0a42119d7e773f351ca330ffbddcc6f93c
SHA51293b6b18e540ca0b4b197fb481c44470ca42f1a966d6cc0246ffdebc05affb52e3aa3d5bf7122d44e369a491b9b7da3cd0f6320d353eccbf6a12f505a1e7f25bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52408f7584dbba147acd3c9a7f02e39b6
SHA16acb2004e39502baa020de6f19c41b497a66fe2d
SHA25699e09a6e52d224bfd81042376dda4e03734a2e2ea8ecd7b5b8d7b186a749ce90
SHA512915fb52833095c41d949ee3c48f7919365db017226d386801f201709cc83ecb6a40a11bd84974983a3cf7dc24d09c3cbdc33d235441d305998708315a02dcae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c16e5f36c5ef4b19c4a442bf3c0f6490
SHA1a1965757b56ce4496de3006914fde7be6801cb0d
SHA25618d8c75c52c82f3a15bfdf9fa78363a9746fd244551f06ebebf9edc453c88c2a
SHA512191a03241be03151799cbea4cf8a67499cf80ad67f660050adbb3ffc9d3489e6e6723d5f5203bac0ff6934e696eeb0a5e257c585a29c65100dab8eb2feaeef9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD555e9cc1ea4b4eadfd2b97490163debda
SHA16e9441657b77a3fa40d4822d6e89e7d6ec675f11
SHA2569637e6012b29f2cc444f350a672687627c9f7c77edc114fd0f8eb74829116ec3
SHA512170de1de41442e1b1c8e08a6c9e5440785eeff51786bf4518464604a635f833fd2faeb5f8d6759e554f5a7bb8a6f8dcf88d92dcd5e87e021340753f8ec2f2ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54142c46d30d5163787550aef30f173e3
SHA1ca773486c520a509fe6333ad14db91e982e388df
SHA256a9b7595db95f689b514a60bed72d3b14d20321aeaddc3b5e8fc874285a31783a
SHA512479a3368fcf49b5afa357e23795331f99a8f29a97167d56db51b9e07e9eea2ad6a08e87b18ee0e18f4f7cf7b39625407c8d8cdb64e1969088078849105c68d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a3a3c9bbf4c8a963e3e6c73a5a54ed96
SHA19dc03b6f71d5d1675b4b210bfd4b67638fba8f51
SHA256ae052081a498526c5373ef7786a21b2810d217926e31e08fbe17fb03454ab394
SHA512ac19e8f4c5188a15953924522b95e952a9ebe8c9a331d31c08b2bb4394b62cf4db7f7a7011bea488b88f702f320a42eccb06f280490cc7e3682addf5ff1d09b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f5c4409dc5d51324d1411d9ebc1272ad
SHA13d778951dba889b1d10cd43be8608d6ba9f70cbb
SHA2562aeacf68248317d981f4c3e0975a46abb38b7de792c5ed2cfb7d90bd0c730087
SHA51225009ce82e33ef4dc4ac2f7e619ed295a51289ee25348f68a3c72a9abceaae15b4fcbe2734e79ed0f9b7b5eea9e06b5d234b5b4ee95b95949d17dc63247d7014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bc3625a664b33da27481d40a759ff83b
SHA12f9688abc589fbd582c549afc516a79f82b2c7ff
SHA25624c7abb02e433cb482e1c14b947ffd2875df6b3829ddad5fb8702780e6e82d64
SHA51215d79ee9d732a4cf86b6326956ac1e7e54be740a33708fb4076d8864e228cc56168c447804fea8519272b6ec2b52ea7b3f74fefc9184d1207cc311fc304705bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bc8bbc0e71f660d7a9eb17e480e12101
SHA1613c99131757a01c5cddfbe5a5832f92f30d15a0
SHA256a9063a97b69dd7d05400925b31d5d20e7e4e917d1f68f8ab163112eeb9ea7244
SHA512c19327c863186ca2544ae29462a38d67ef20a7563b497d4b8eef59e4a1adcac9747c02caed338f9b8baf54d02d8bcc221c5363ac426a6e2a08cac29a901c55b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ad98a86989977fbab6052dbd3232cd2b
SHA1d758bef1bacbd4f76643c37fbed3547c8686df4a
SHA25610c100b4c49cf2700439c2f373c8cb061a49ab61ed24564419c9c78a77662086
SHA51222aa7cd7df5b3affa5a4e8ba1df6035c2bf5b5711e7af91362578d94b685ff5ff808b6d5d6d2c33966a73bece4e71175e19695d238ec356e8fc0be939c8b10fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d5b3979983f2faf931b37f8283dc9814
SHA14453add5cf804f88421b2874d1c7cbbf73d410ec
SHA25623d41d9b9e69669ddaf5365edb012667875a1e5d18ec06c2a6a0ac865f3ee46e
SHA5129254cd8b0bc8175aec015a2092aeab8c497013d2dda575ddf6858e9f10696073f2e8cdaf6d1ca5ba85a1e9e852b9c0156da7662abcdf258dcf0ea19fc4b865b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59381d2fc0e9d1a2da39787828acaf44c
SHA1b1f213ed0b56f7b0a45d6ddb492a050446d8eab0
SHA2563c5b023ff172a4e5f755f0502d5aa9fa2396d29d02b2df78c926b6f6bb49e9ad
SHA5126a7bab26b44ab434a56db119fcdd9cb2267fba9619a7596a0ada460d569c1db87a2fbcf501b6272e9955b9f3ee172c8f2735dd8005fef5003e1f4c8622900c65
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b