Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
bf384d72f97ca71cde760abe8d084aac_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bf384d72f97ca71cde760abe8d084aac_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf384d72f97ca71cde760abe8d084aac_JaffaCakes118.html
-
Size
53KB
-
MD5
bf384d72f97ca71cde760abe8d084aac
-
SHA1
9223b210d176f0bd430f78b13f969a126cb633a4
-
SHA256
15343b6b8c8b4d336b4282d731f658aafedcd5ad572fdfc69d67b52fdbc873d2
-
SHA512
36f894c54ed1968ca6428b2fc2b08c415bd58f99491af1ef68b4c5e4d4a14afbe71b46804300707815345cc7a38f58b8bfa6c24fbe54245a24d6e29d34cb4d98
-
SSDEEP
1536:CkgUiIakTqGivi+PyU/runlYj63Nj+q5VyvR0w2AzTICbbloM/t9M/dNwIUTDmDS:CkgUiIakTqGivi+PyU/runlYj63Nj+q+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{71C9D281-624B-11EF-9E52-6ED7993C8D5B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430688032" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000008115c243150c950c18935069837d027e97fa422654470b79935c655583d150dd000000000e80000000020000200000006ef5dc3266cec78071e76de5ea2c546716f7dd6d38e6b9aacdebf84448cb2e9e200000005e69bb2ae82fd80ad482875a555ce08606e605968d630167bcb7fbabc5296d85400000005605f5a8036d6616421f43a9d2b0c13c7966ceda6f2ba246db20bb583ad70ec40427075a71d53234abf71a29de4f53496131a2d384c925922dbcb08270b3f415 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a085ee4758f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1596 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1596 iexplore.exe 1596 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2212 1596 iexplore.exe 29 PID 1596 wrote to memory of 2212 1596 iexplore.exe 29 PID 1596 wrote to memory of 2212 1596 iexplore.exe 29 PID 1596 wrote to memory of 2212 1596 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf384d72f97ca71cde760abe8d084aac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1596 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5405af8eff2915d1d300c43b6b3e89f5d
SHA1aadb35332498d40fb5e594272924cea4ae76683a
SHA256df24cafe17849c660c887a2f73aa6a87c3c639b9733f83d9ca69dbf9d148ee06
SHA5121531238e0106fa625abde8e969e0e9459473fb534ae53055a694457217a51189968bac94eb7b75d0a05a02a4ca450195be4314411bba700ef9635ffd89495792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1ad24e8ec32e98f142642fd0237f958
SHA1353a1f49caf16f652d8e8190b13e7bca03a0730b
SHA256e40a0a553d74daece9de50e7c4c3a9b91ac81ee4952400526b955768a59a3059
SHA5127135767d1b63da4f067c04ff00d884e33970fe4653e999b0add4199a3525ca970e8d0f448c7e57d1212041dc6ac5d44a5c2ba04778d17f83e063ed3240618465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7e11d7883f2ecf00fc0103a9b763c8d
SHA10a01b55a36a4f19840f55c7bc9c5584dab5788a0
SHA256bdf45e9f0637752f6cf1d235b64ae923aab08d12b0edd9f43653ff79d5cd63cd
SHA5122fbf6bfc8d4d30d39ffb6b4023e5d05baab6a61f4737c0c0fb684a53bfaccba61b62fa4a87126ff1dbc6ef1cfaeb46b4e2e5976413a607d64e3bf27ad640fd1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6133d8f59f5c832c2c751a0feec32ca
SHA10bd7c27ca06d8d814d72d671ac20789f82ab5a88
SHA256d5bd53ea6a37b4346f3d6337e5dcdda375a97e28b1322bf247ee3e8758ca1d81
SHA512ee54e8ac2009d5737b69c9a0c8fc7baca932d9228e975c77d2eb60852f83a8034664f0c3b80405dfb46b0fa2cf57e8ba2a80692cabedfbdef40f8e7ccd428bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a24a9389c28eb3eed472762fd659dcb4
SHA1466de1f2ee478a4fc6f7f45b54b5d4e4349bb74e
SHA25601667d80465daf9c412a0846750a7027e988a16c62ab0312c6f55fd48de5306d
SHA512051e070c32934664aa89fe8adb2322985ba029f8b6ff7a389c3dce2527451d07b2977047297a8959cfa4b1512b3df7e9e3dec537eb60befc951ca548297c6f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544a85b450a59a378f680025f182d7f0c
SHA13cf359892958073e2bdb030e6303d0c7cdbb1f10
SHA2565f951be9c5930e670e9d8122916a586d0f9186716c3207c0362e4bd4c387dfc1
SHA512e56eb5cb02f27fe32ea8e7869a740df34e919beb174ad37546455a3d0cfce1fc330b5d15e61ec7d5bdf94f649a99dc11c64f584402445be07b1eb70cc347e380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab1f39503dab9fa46f3d8748624b83e8
SHA1efee96688d1de3ca73294963cb20d6b688216657
SHA25628b8f176403168366613836e2e01dfd2f18187d750c7d92ac49308339b5ded57
SHA5126c7567216b20684356974547a38a5de14f47a612405b23c2a5af2a6cb93afdd75ff21af72c83e73c705a817b016795fcb5ca7932f128ca0b59515f5915cd4b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502116904562f7dacc19a4ea0cbd55629
SHA1f10769b8149b5b8287598e557502a1168ddf1883
SHA25683fd6dd57de2fbbe0d2c3436016c4840b77664cd2c9431aa2459eca50d030259
SHA51206fd7e17b359fd930dcbf1d0f52181071b3772ea673f3141dd2b3ec6d5dd7c218116e339d709ff204c90886a92f72ed2ec1ba1cf44a3ea111b42665eec51589c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b332ecbdd3a754259c88fd1ab42e6adf
SHA16a983ace5065ce0ab7e717802f420e3d1c3593e8
SHA2563a2343c165abf45e4d5bbc61e40674766f87482e1d015cbb31ffaa4bc79d99c0
SHA512fca628f20631ee2931023af5b32c89bc297d1c4f03e2fc584d431b7109ea1e6cb90478dcb9b03006b26e9d5bd40401647c08b1ae3e9dd4d9594166ca6616ea6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c37fd8e5ba76e7f54258af62c3b16b7
SHA1c53c32de9849d5d461bb63b87645bf51fabbfcaf
SHA256a563728d7ff57cfafbfb42b85b974a688dd13ab4b48f07fc45ebf2eb3607c81a
SHA5128f2e12119520ae71d8392da51d99fe7c846be9a7620bebd4a2862707058f45cbab1d25ff3341c8c76ebf9bf7130b83d69244998363e5351306cc19953a69e3a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eea9b66d0a4c39dbee12374c4f6721b
SHA1b8a16668dda78bc21e80355a8ac8e51721fdb72c
SHA2569d0cf17c033c01a09c59f9a11611be401b1c4402147e5b1f3473d4d0b34bc1cf
SHA5129b79773728ea474a61408aa5edc9434d49f81014005ebfbe9e13699def2470058b324b2e69ad59e4bc04bffa867008fc79584e8019b06f44b3f1dc5168b099f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fce555253ed91872c0f556d48f1b8b6
SHA12e05199c0f60eafc31d3c0f60d7217e29edd6bb6
SHA2562e697ec6818d81868198e55e92e7dcc51ce5154138d48cf3636b10f85ef75080
SHA512a18135c102683ad874d181a4564204c9fedd3e7166eabc2fa4d36682799709667abc0169ece67d5cd11560c54f0ec9a5a6931ea509dc9eb3eab0c042170871c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e3b55ee86894c25db490434ec45a4d5
SHA1f236c6935b967e4ced19fde65d76ee45263e3a6c
SHA256342dd947d3486a46db8bae5820bcd2596239d07de84aeb25d44a06f895ce07da
SHA512d4cb802ecf70a8cb06e5f017c43054ac4e775cd1f710b4c02ba93ccdb61789b0f69cf4cef8330c8f11eb55307bdd645571c0292ec290193146bf49b4a2c8e0df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5731e858a518188c9cd50ac6c93eb3fce
SHA1ff79c10fd415bf2eb4311fd2ff1b4111fe6185a4
SHA2562f27c7a63cb6ea1400ae0759727780d046164d9bd625c7d2b8fde2aade35e65c
SHA512f888eb84799ce98704b8f153a495f594d2df68a8721831513b5b1f2e1eb571010f192682a92c99e11c56451a70bdbbf97342f6739d1548fcde41960bb7b229e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6ca07759d9da36fec681598c469cdd6
SHA177a3f7f157b70d6e0ceb5651b094b259f9f03579
SHA2569729a9dea23e5d43fcf82d0dabb7ad3f976daf8eaddc621b4f6852ef66c76e35
SHA512319280a1e65f3fab0a1d9b2874d85f25178da574ce8ea5c0719c5c96fb7d5cdad4b05d941a1deaf734eb04c73663a5d39d59927c7fbea98cb73b54c604e3733b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f7ca82c40a88d1b837f8ef3c0b2233d
SHA1f64d5ca5da3f6b991030b6203d036d5fb63a2184
SHA25682763c31b327928a98014a2b75a018879466839508e5b4270585c111140e253c
SHA51214322a81c38867e349e0ee65c83af04f0fc6fe467c510b6c524a9f6fc79d16793000c5c0e8e0cff930bd2e94da187abac992e138bd097a57485d4d8f902838a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca1d71787d4c2c87ea9f986edc548d32
SHA1129d79a1538c35adfa952760f0b2c0404e90f926
SHA25626cde2167492a8953c6ac2c99bbebdb1a84991b696bc4af88c24cef2ea4bdbd9
SHA5121456e4255d069ca87a48c74710fe8f3720272c064eea2175005bc18981cdeb8ea4bbe9af1066ef159b5066949b4edf6d7bb76e16e6a6fdabbe5efb64345e3d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4a239de9e9bdce36638d4da20c7eab1
SHA17665002bf2a689e52b5f4fb7b6b3a387015bb28c
SHA2564bfd025ffdcfcb3f41204f5421c2c8a1af6d9ae398835dae4200aaedd2339e47
SHA51285c575e4b2f010b8c79e116cd0ccd3e77bbe3e3ebe0ba4a3007eb3832df9a020415748beddc7677d602945c353176cef2625478941a89f6e0158300ee8009d32
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5J67VDZD\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b