Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 21:20
Static task
static1
Behavioral task
behavioral1
Sample
bf6fae870c68eedf817d28441977bfda_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bf6fae870c68eedf817d28441977bfda_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf6fae870c68eedf817d28441977bfda_JaffaCakes118.html
-
Size
63KB
-
MD5
bf6fae870c68eedf817d28441977bfda
-
SHA1
7abfa70cb3ac9d8b4394e32d8364cf3944d5ce5f
-
SHA256
2e530aa92f7223318d1a1870a2b1b02e88d4d0cc4f3b8b50ea0a4fc624c39713
-
SHA512
c6f458661724efc47fa40bef374843fe63d695fb2914f5920e1e55a7568cc0a397a6e5fc9f48342edffb271ed682f515450fefaad72bf0ab61338a9db24637d7
-
SSDEEP
1536:QmJS/gmv9sEmCV1f6y5R5LAil/h5jQb36hegRuC1xo1Y4cgtvFe/vVPxxkMYofYN:Qmqg4GMf9RJFhBJhjTxkjt9YP/VfaQI/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430696326" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000007d0ad92e787a38636e0190a7c7f0acbd398b24fda672b990f9f566cdf58df8b6000000000e800000000200002000000078ad42320185fb7ce689f5c5c0b36caf55415d3f15deff8e1e505efb31bc1ef720000000925b395d7c4dd10d0f4541b6c3365603f9fcccc54a9175723eff82a0b44c5f1940000000b0e486b945bf7c704b8e54a42182ad252753f5d5663ed94bcb6156424fb9ffe9fca6da2534ff1569ede14f29fb24964ece2a257cd80b318c62daf0f07a79682f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C1684251-625E-11EF-A1CA-D22B03723C32} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80134dd66bf6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1532 iexplore.exe 1532 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1532 wrote to memory of 2568 1532 iexplore.exe 28 PID 1532 wrote to memory of 2568 1532 iexplore.exe 28 PID 1532 wrote to memory of 2568 1532 iexplore.exe 28 PID 1532 wrote to memory of 2568 1532 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf6fae870c68eedf817d28441977bfda_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53101d5ac7891fd725d046b5f5a27c532
SHA10fa1263f65b55faff24ad15e8bf267385494c70a
SHA25662cc8c632884bd8eaa2760f2b9821b5193261dbe941759575a8b12b721f229ef
SHA512cc3e1999cb7d078c76f28388840b0c1b2ed081d61027b0fac5bde3447a775bf8062493b400b855991f2edc0e5099e742320062427f53bc5529d83c2075db24fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2217123adf11c1e236c64405816980a
SHA1b61b4cfaeb50982983e200d6597deada4de69aeb
SHA256475ff344aeaf9611fa60aa708b407b1b01529da3e1cbd69e60f347428f037e99
SHA512d886d2c9d6b8dbf540cebcda29889f744d324f8eb863ab2c1bb975912a2de1d83ea581b0c2ee9a3ccc50758fe610c477d03f48f64f153536544136d251dc0c71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da311ec565ef90ea4148c215ba6b374f
SHA12e12b9d87f8fec289df680087072b59a659f2a6a
SHA256fd5ee4a5dc17707daaf669ea75dd2e034984c03f146d00da6854e8310ab46015
SHA5127b9df457983056fb259e18463c0eeff90ada2137d337435c3bf3e443e801f780a1ab2c2921ac92873bddefd766c78c1ad6fc5cd2629fea41933b8797da58952b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ed7e55143f8682cb0c682d2700d3b4b
SHA129c5fadd2e2d7aab8d675df7809b86035710686a
SHA256a8cf2ceafa911cac3dc255bcd409742e742ade71e6570c9eb8ea9ded0ee3ca5d
SHA5128fb314a6a26c54dec2e36df836ec8007139b280a95313697f97a307a9ccddda006edfa752ba78ad261f0a969040dc6b132bc9062844f82f559d078a9a0229da3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7f73155a0cefdefaf416b5ebeec8ccc
SHA12f9681f8aa5fc372914e37ee665b8287d65ca8e0
SHA256f2b7ff0d167760d811838a292ee1c8498f9ccc8f2953089aa2a4daad7687885a
SHA512e4ff6aebed8167237267545947adb8e9b800cdb71691a0f11ff9b34375d2b2fa92c8e8ca22ac3d835b23699916e9812d631d67c457325ba2c059632d8c1f126f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf342553caa0fe03f77fd609d7232c13
SHA14ed50aed3553741ac8ca9b223a67e8218fb7e587
SHA2567c5ac2b9f0375817a838df20491d2ab76980d86155bca9eb91c6a1ad00923db4
SHA5120a1d113a71dd4db71bc9a37150b5acf601b0b97e6615e34c131b50ef1507ffd94bbfe948e50dc871f18a2dcf2d3341f0351e3301ac829400d7adab2bd1c8406d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5370403a75d287ad04ba5694a85d71c9c
SHA184da1d26833086293e9eca8797326cbb0d208304
SHA256ada9ca67a2b8a67ff7239240e5e01977f6cf0d2e4669c6a8a922477431fb50d9
SHA512c95ec0a541072ead89ef1984de0cb3e7c37e390dd33103c1886941401f4c99f17ca75e714fdb26781309826bbe40459cafd7658d39bc05978e56d2d5f88e8b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1bc9cbd634f4afe465d91ec658b4b62
SHA12e95ed84616d2bbb2ee45c2e29e608c02697777b
SHA256036481e5fefc563d7e8d4786167083b02092b21739c8ef346c6c5c18048cc9a4
SHA51251d0ca894c8921cb60f91c4bced2e7ea299cdcee6c6d537aa5d312f25bc46e0f488a5499ecac8cd61fbf32208a4a370ecbde624ef47ed2e93a68109d8d3cc87f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d06ca423ddb008205c5139a1d117c1a7
SHA155a312b0763d6d9e858c600904e19be089da5ca9
SHA256a2e6bb07cb5b42146e6516ccbcd2bfc2e5ce972cea2b9ca73157c90fb1999107
SHA512dc33103890d0d960ec4a066f8b49b6714fbe72f7c02b952811cb7893cc52c316f3c41ce4c90fe43fa318d9591f56b17db3d660a60df008e000a1d5101e6b0a5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e9c8cfc89791999016c42404f8a730
SHA12aac87218a23b6338d811bf4b3a5412589e6bf88
SHA25674b49708bb2e959e29749ff7eb8b759b6cae293618877a7b51f79c9a2d74a0fe
SHA5125c83a734fcee56d4d9f33a3dd2a16c1154387bf1c78f0f8b4e7d2adffb77a4c0292c188d31b5983bf0631df5f56ff82fc1f11904d5611b7a2db7cf9096aecd60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce9952331267bbfa4765f05f7cc1f5da
SHA16e9dfa12d2d704567dce8daa078f1accd6f3642b
SHA2565f80846c9b08dede0c5b6f9584b6822b73cdb00e884291b39818e5077b962b33
SHA512500304b29552f813d4219c74e637a4cb10b786f69f73f1ce32a5025aca12456704be1300fb468af51b8a58bf06c7220cbb0f93d98e1fe1d63e583098d742235c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dac4b417e50c1d4cff536d6fd6587981
SHA1be3292f93bf5f92971d7d6d293ce360171b25e5c
SHA256f7ae02e3b4b654a359ef7bcf243956e5f5d46e2e6e66f9eeed4ee61d400a879b
SHA512e7124fa733027e7f8bb7204924631e3dff3af3ccc34de2407ed30a9b966eb831dd2496376aed9b77c172bd9c29fdd7b085db337a393e3ed33d3389b9a2b63bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50382535b6cf4d7932cb80255ee1efb8d
SHA1f6e5548d3440502a64ad9a303981631bff396652
SHA256d1862f620677d4dabfede0657a5d578d6fa5e5b9f94e316c509bfe4cc0041399
SHA51245ff2ec11ab225a04480eb455f049a7fd2c2ee3f36bb1a0d1f2f52711c5db2f916ba9c190c7e2e7f37f3aad7f50e13b75ff632ad79c5c728befa6b6c632c33d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cdc6484543585a0c710d74e861f0242
SHA1c5620526a93fa4049d9771793a996b6c9619a624
SHA256a28205c9d9f96b204040ebaa7d8b45656572c736431ef56615a0937646ca17b8
SHA51240e66591ce6aaa411c191410e95ee2876ce6b3f57da942369f42b4953d79bb202e92fc6a093d87716724076ed5fc82ec1bdf7fea4755942f7948d04415294173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0c3af1f56df367773145f038a98e774
SHA127336f99f667c8b9a2f67f45a0d47c4017c90006
SHA256cc90c5b123b0ed204d8953831e954556b12fd59140696e95f54b4ee0ec58b34a
SHA51286968cc46a4931dce217536ea84824a6653c3ccfb4ae2bf111410bf9406e62eb5fb631aef79b1788d200dea1ab152224cee22a135f7e002a710d685b556347e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5050339ae44796a8416cd64f3d0a33a42
SHA1d32d30932cd321d00b09a9d2d3c761a742b578d0
SHA256a6163923ea69a61516f71476644c27fb9012076bf814aaa1495867867f88df23
SHA512aa01313dfd2d4e1bcc33bc47e865010ae97e3945893c7837107ed1320690a8720a2a5507b0f8b70524488f4aea29227345d2f0430b807776f5826462235026ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ea88177fb905217283468311cfe940d
SHA1d66581c9eb17fea9e061ef8c6908d7feb221139f
SHA2564ab682f0311e9c52a8ee3d2677b034debf34d36507d76a687864f984609da0ff
SHA5124c621aa6248b19e55ca263187c48d16f6cb07e89acc1fa570b7f8854d18d2e6a73a888feb93314073b3bb6f1d5c878a8a8a7419a4ee923f6350e4ee956f4d5cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5542742507257cc97d1fd2527cc0b37b3
SHA1e85cb8446f84551ca12014633aa686a57bf82500
SHA2563795b5cc4cf18cab3762e778e6631aa33c8f4b4c58fc387c197cfffa894af233
SHA512b38fc185835f71f9a74b21e05f33aceb4fa493dec0f077a59d5a294de2b6488c3d5018cccf2a418acb2670242d2b40f364357dda3e6ed93c4a8e1633181d6651
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b