Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 19:01
Static task
static1
Behavioral task
behavioral1
Sample
bf37e0b846b30a20f475246c069dc68c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bf37e0b846b30a20f475246c069dc68c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf37e0b846b30a20f475246c069dc68c_JaffaCakes118.html
-
Size
4KB
-
MD5
bf37e0b846b30a20f475246c069dc68c
-
SHA1
a871c18ce0d8b24dcb05de775ac2e739e16444ee
-
SHA256
95ed98949049c8df167a73888cf698975a3811d1afe44dd1e7bccc1d2c661c4e
-
SHA512
f0496ffe3bd4cbf403104efea85a811029ee4c0c8aa5a1c4a77cfdc0d6c66bf786f91382df30a04016e9dcf808eef7a278cc9a0f22c1567e03846e59bdc8ffaa
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8olu4JWd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4513FDB1-624B-11EF-A205-6AA0EDE5A32F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000ba379d6014bfd1a0d6c6523c4861741b8714dd433bd3c0517bfab2d0533270bb000000000e8000000002000020000000316d8046ea4c7619fe6f86c2bea11ac487aa6bca8fcbae1b37d50ffe42e0b27b200000007b24e9485fe18169058cbcf91db4c3c354c0ec916a4ea7c9e4a7ce37a08f8d334000000050d0da5cdbc9e04af892bc9152fabb026d99fa615c5bed10391983ae4af1a48fd664f58652928b34d910782337c844ff9f9b031d510e1781b24eac9eb3a88076 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430687957" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 001d851958f6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2400 2372 iexplore.exe 30 PID 2372 wrote to memory of 2400 2372 iexplore.exe 30 PID 2372 wrote to memory of 2400 2372 iexplore.exe 30 PID 2372 wrote to memory of 2400 2372 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf37e0b846b30a20f475246c069dc68c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a931a523908f35bdf93f1521b5e9d10
SHA10cd32e795d519ca4146cc8be66f3b10a27346f28
SHA2563639455bff7fd3add8b0872ae8bd6c8dc428d76cb4673c35e249950e6b2f11c3
SHA5122c97aa3f838732f178d7af01761955e319e486fc565a41eb64dd74d737b12fe0299e013349f13653f10a9a08c8d8a596d194c01a1bdae5d0e7072ca9678b8cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512d4f965a669ca0e1bd54d797c39b708
SHA19920bb0d20064c768ed90892ea2d5de1ee406521
SHA256bb2478aca412e5eb66ffd549169e91cfb7ad04e1c3bb7deda66d2765032a1c84
SHA5120e95fdda99d4f290b9b2430b5601773947a2b572f264fed58523191810f61f737fa653061293563d977ab05849f3cb71713a6add6b38f51d9905e1e2c2e9a39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54275a2bd42c5970935fa4239b4905da1
SHA1e45e5cf3e1dbdc0fc10d3803f7fc511545a5ae72
SHA25682164065297094da875ec7df53fca2808bde0e3d5ce2649595dbd29274f1165b
SHA512a32bb3753d47523ae31547161f01160233bfca869ea629253b7a7127b472f4dcf1945f476f0890d3fb81d4012af1f87c01dd9e2c0c6d5b634ba6bb8ed5202c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a19dbadebba8449ca9664d150077ff7b
SHA1ad0f49f6873763d72e344fe78f062f13c1a8e8d2
SHA256348c087c087d058cd59e44b6b71eebdf74c8204faed55d8564b4baf299544d15
SHA512a3de183d54b3d6a539617b9941a0a763f00830b013264fd48679a7d280c21b605bb78613bae1bdf0f75793f99bb6d0d95a7dee82059254e5ae149abc0ff73395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa3401b7e248b7944acb2b3c85df0d1b
SHA1861e057aa950cad60e390946f01e789605985a90
SHA2569d92e40ba21f796540f4cbd67997a23b4a0af26bd423ae64291ad91f4be98f4b
SHA51249352690c9d31e8a29c1fbf327c25a27f55887eb633fde9b1bc297265355a496f4509f42630914dc61971e960931d9f3256168caf2c8d0ff4a642e643f40a274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53883141de02067fecbc91685b9b892f6
SHA114cc2c0b5816d3f079ee10b1a9e5e3c27a5abee8
SHA25618285b59a39309abdbcc8d5af139d964183c74befab00bf634503a03a1c70ce0
SHA5125617277a5f4136ee48c8b89eb6b40091d3a6e8b86bf4d8d30a5c8dcc40585baa71eaa16e208d3208e59a84a14adc5f420694e525bc6c33c43cd453cc204a4ac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d1dc2c3efc909c3164d0af919190191
SHA15ac498183f6255764dce96704cca36ba84adcca7
SHA2564ab841254254f85c857201b05a6506111e7a2874be0c550cd42ceb79cff9510f
SHA512c07caa56712379ae4dd42b360fd65bb77929cdbfe34bdecfbc5d16efc09e710ce2af67572e57a1fdad4d86fcdc3556c4413e9ff76a0726b12b31ea3ca468cd26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520f03d4ea62b54d4c558935cd56ed94a
SHA179576d440cf7bf141f3718abe9cad35d4890250b
SHA256bc53368728c375690443aef6cfe8144d76815af473eae64bf920133244055d04
SHA512245e2a662f5d1bc8bf5c5f5d10984e314c1d44c2c19e904e35427e511dba026eb82570643c9355ed1c35ca18a93e9dc86f5b64f3321527b6f9e6f997ecadd458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590785d90c44ab17f4c1ef8e5e644f0e6
SHA1df67f7f62d4c8f40028f4df74c547fe84bfde5a4
SHA256dbd3bc6e5f5d6662b4e09663250faa01b201a48bac5f67a3ae7eb874e338bce1
SHA5129dc4f44d3c688c395df21d2ed37378c353748cd9b38f49b166f61c5861ee9d13f2eba98a0dec743944b76ce05dc634367a59b4038dd4ab1d0083aa1ac1445936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbd2ec864b44543e3be5a003ed67cc5a
SHA1da9d4139a523d0f0846f28515902dfdfe7cf373b
SHA256b024cc1d37fb4badf852ff5f3ad3004e117e2919118fee01b2c27d605d5e870e
SHA512253817860f4aa3761a7517a9f9f0707796fab94385ae9113538ae82f7bc96d3b152f4ba5cdd797b0a3c91071522675dd16824bcb36fc0c6a8f9e089940532f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599777b7f461e84f92561ce6d4e5e61fe
SHA1d541cbf8f8702911c334e12c01801b94dec5a00a
SHA2564064ec630422909fedff231df4a5d152b4c76d7660f114932a170f713a761a6a
SHA51287eabe00ff06bf0607eb13753ebabd9fd5f732b5f6ff23c4822c6d315bd941df608893472604c8e711524444a766d10f933090829eef47ed3e9b3bc32ba16347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598013c3b7d44279e94978541f25beb77
SHA1213e3784f09b94b22d7c0aac4e6c061c4971f51c
SHA256804af255776fd006bf9b6f592fecc880f024d3bed0c274b92045c0faaaf2cf58
SHA5125297edae64356beca7e6e13ece9b6d6bf7761ea89aaa6bb4db16b3f7501490c848991106b05b87a7090d4d88f0e6d3c17ef04ec950f7fc88434de7e3cd123572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542b72c0bbbf8de47c340766ee26ff9aa
SHA1cef18f34be06980c8a8e8364dc72f9e1ae8612c3
SHA256d8fb3b1e4aaa259bd40384c756cde8ee4e94744a16a35357bd77f0797325dfa4
SHA512c6712a48e7986a94299d167e1ca48dbe931456eefcdc3d511f17db44c4edf6d73ba65ff1502335c115451c911c5edba8ad3eb053480bccedd25035b331f26ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53956d9fa4fdf6e72161275b68b569b4f
SHA1ef568e25209592be6cc3094267f5c83f0b0d895a
SHA256112b8bd9edd4e48681ab77bc2e920d6ecdbc404eb2c56a9e3a4a5d7a66118896
SHA512ed3dc1203b7cefdf1f82e7af9a42c9be99ee3ca4ae915195fa883d0bd3a11f3af5ccaad99321a06b7718238905f2c138d1a902964a588aff06f5fb4c5460cacb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535e70f0beaddd642022d315d6242866d
SHA19a6ce4ee864273b5d8894a8bccc19eb6e9f0bac3
SHA256f34cbd6ea9c22422d33a8a820307312acae3fbb05b0bcbbfdb4e2481d9d0e374
SHA512582d1ec2011d96523a4571971ae412ddd93278a7272ee5a4113d3df2ae82f5fbf53b406960f113a8263fbdaf9eb6034c50c3a841dede495fe535ef17e7515f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5138567e3cab653418f7ede8c30da6be1
SHA13d2052517e632401bc7314c535f6481d9be97f1b
SHA256806f1b757c7eebe05a4ca22470d806ebfbe17b4050517abc3da1dcc0403c12a1
SHA5128caeb05515362f7f55a2424ea448c4c8b9821fd9423dd1970cd55acacccb272a96fb404142d7c5b2fa298b3a94d6da6480b24cc1c3364ef5d5942b1a17ba13e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cdd132abb2a0e9f3a266a2e2d8d6bfe
SHA14378544122f1f38a84f704117b4db05d058757b5
SHA25606349d32f2c87ecc414ec928d20bc6a9eec5c5c5b6c0282f701b4758950b0c49
SHA5126e7bbcd11ac8c1aa0cc0fc390679b7b02651d7e037787d418c3769fd4debac9c746fd4107ff1d1b74e02a95b580d918fc9d71e46ae50f7c4e464dc3af2bd4657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502c14e209fdd3cd19a5014c1aed6ae9a
SHA1e25deba243598c6e8ea4f9992906981faee7dc5d
SHA25636649bd2a87325009ed34ea7f50bb8de7853669d26539cc0450847cf11fe1ebe
SHA5121f245b05319186865ea0b985d1af702ec24f0772d66a3607311936a112a22ea0516b98ce6fca4f271bc9b3f122b3b89c4c7a0b429321ab2596905c2b8f000c86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572d97e4b21c4f6e78e8b09c78a263878
SHA1129640d2843da469d83ef248c77f6d39269c84a6
SHA256377c67494d2b4e457dda28c463e31dcc14ff4ba0c4c125c1e9bc4ebc96e1e854
SHA512439080a42714b4ca1308286f03b0010d2e26f96c744487442e6aa98a47876a71aecb011949355630f72abba15de253517e5bb37aea0ae6ef671c4f1cf065a0d8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b