Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 00:28
Static task
static1
Behavioral task
behavioral1
Sample
bfc0fe836c915404710ea091f33245b5_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bfc0fe836c915404710ea091f33245b5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bfc0fe836c915404710ea091f33245b5_JaffaCakes118.html
-
Size
61KB
-
MD5
bfc0fe836c915404710ea091f33245b5
-
SHA1
c5a90959e517c1468642eaa232dda4c6ec5cb6f0
-
SHA256
c705cb15469b222d74cb1c01e5eade4237615d8ad3760b7a54c5ed772a7c3fc8
-
SHA512
3b1871e2a72b9cc2bdb7d71644dea312384a8b2198222ff3cff2bd441c4799b54b06b1072206bf0fe80389765a737ebb0a5dec2a1d16a862d694e7121d97a558
-
SSDEEP
1536:X9BPNqoqMiB8z3Tf+Zv46CdOwdMDvXAZM:XPFNqMyiD6CdOwdMDvXAZM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{01C5B611-6279-11EF-880F-D61F2295B977} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430707605" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000d75bccb95db43487e1001118baa167ced0f763eb2adf2f6a5ab472abb27356ef000000000e8000000002000020000000f3315eea17e6f66ca8247ed454c7b84849a4d95b33a1acc74219195a4e53a32f20000000cb07252a817bc9bfe9487c67934dd485db08e7a63dc14cb7fc27d47ce2fa71c040000000da765a53e8577a8b14204f58edf34c563e2add275e13a795319407fe6f7fdd8c23b00608802e170254cdb7035c7dc10db08b9b249ff8b81116a525afd920f16f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 501dc51986f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1848 iexplore.exe 1848 iexplore.exe 1248 IEXPLORE.EXE 1248 IEXPLORE.EXE 1248 IEXPLORE.EXE 1248 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1248 1848 iexplore.exe 30 PID 1848 wrote to memory of 1248 1848 iexplore.exe 30 PID 1848 wrote to memory of 1248 1848 iexplore.exe 30 PID 1848 wrote to memory of 1248 1848 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bfc0fe836c915404710ea091f33245b5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1848 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3bc88c026c3c5a91891085c5e3fa638
SHA1eb9d0df29a24ad23b832f6b5408e8c19848f3216
SHA2568ecfd0ecbb99d593b5ab502de9e92953b5a1f10d417567ee9fbfb4912c1cd60f
SHA5127c790df064ab79890e496fbbcab301b163909b09e1b219d98993932fde0b8015a03d036b2ab21e95d0ed187a7d8771b3c52c916042b32c1f08abe25a7267cd40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c820b142cb1351b7c4b483eabb421f0
SHA10e86c9e720a2fb4ed2f4ceaaa44bde52fee9e8b1
SHA256d62ea123a7ee109c9217fa936b2993286a624f209edbdd958889f3e2270df380
SHA512fadc94791481d13a34a75453236fe08c744b93db538f74eb43ecc74e46fc6a8742c06f0495759e9385f19fd5b4a6349dff876baf79738e3d5898184e1a91108a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e39e395f42a0a4030df4b3db29045b1d
SHA1966ff05e628ccf2f65b39a3d063793b47c5431e8
SHA256f53dfed974ff244b1fb5e31e8b7eba977bee5c67dc7696bd96767070a43542f2
SHA5121d46abfdf3ff0804a6994449b2fb35c319888256cc645e2a04d91e6a142b662239112cd4ce0c223e4d9e2f8ca2e67e6744fbae23d81fdc5ba120efd32a81f65c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed1368425690db24e91ed7da895cc1d8
SHA18fa9fe478440b4b2bb7632e60a61311871c7a38c
SHA25635bba72e3cbbd422449caa065c250da3b023369c3b0c2b188b5fe51ae85acc4e
SHA512cb81a9fb0130a80eb6d917bb603a0a744166a677b12fdabfa0b3a124a74c42997aed3e3c882135ddce2e92336a373a7c206736aaa1c84f501a03232427c26a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7db28eb99ff4d9c168f812a32cd5fa6
SHA1b0d502c8a0ce201f77bbaad4247e6c64bc7af0f2
SHA256ba2ba23a216b17a59186c3816f7f694278d584a05be796dcd001b0e8de027a39
SHA512dd9235c0ebb9de07f1f8ac267ac5c0487414e471e43902d9e4a60c348dc3b5c2f0931a77095735dbc988aa0f4a561ac446b5b4d83cd49b54d596d5b62a19b69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a40472563ae573b9a1ee4d575fd32fc
SHA1b027e5bcc29311c282f38497420a465c262aa200
SHA256a6cc3963d30d2e99a40088364ddd95987200ea514502908ded2e3789d62ec82b
SHA512d12de8718b9386984392280a83f066f1655c1849d074ad6af693d95f953f27f602f58f9176efc85d7036a10e56efe48199b5aa738eb2c87b8c9c0ff5191b8071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d83d04ce2b458d8819280886a8213e4f
SHA10765f7422544023e1f13a9a521041db6c4fe9874
SHA256ee3cbd4e71a2dcc26186f8fae25e30959c1cbac61f9d9bfff80006f1e276df2a
SHA51286a93dab824299f8e8681a0bd64734d6b4f7fd36293f10084a1f5a8770e1aba344d23fd72f560735ccc3f59ecd5a52d6cacd844f1225022f34d150f616d9a80b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5297217475f46af199c496db27f6732e8
SHA1e5560fa3b5224f2eec6ec2e837a1627a2d8717ca
SHA25657b710f2927c062614591ae2a56651b952335980ecd45b2e1f55dcce29122dc4
SHA512c46518c9ba452f550d377c870a006e32cf1a42921f5fbeae200c1719493ae5399ca03bfa65e2350b4fa193a29dcebc6d9528e82f9e9cd2aaa0159a0807dd102c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f78b789d16f1b3a50e6ff76f368dde2e
SHA1e83da0c8858115583793372f3b5a137d286d350e
SHA256ff8e1a935fa59dc900edf06ee3bf8825308774440a375dce69891fb61883457c
SHA5124c512d36b819a83f12749987554910a6f42371713b71fa5d8c6449a6659a15c1208908496269cc53bfdbd3c679483678cefc098d1af68a96d83b42b81e60b9c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ed50ee15c2ecfd849b3b0d2a8b12346
SHA1529959b613b5f27c89eabdd92d0ffcacd7d3f76d
SHA256d0899d45dcd3377726b7d5abbfed4141e1765d1d7aee5fb927723952961c626f
SHA512c68c5ff14ed6aa58bc2867033e4b7b5a0125c73e26fe44826b88d35030ca1f472cb3d898b155cdac715538c9eda67b2be84edfdd46b5cf313df0c0855ebfca0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9e13f0a53b5f49d88b1f3e360019ea9
SHA1067705267fcdbf43eef28a819f9f706a608143cf
SHA256f1f229cf633cfba3b300220fb29fac3669a9e3eb6a44ca3cabbff7eca10d250f
SHA51241c67d548ff76e5f175f1d2ebadaf5da6414c8d14cb39cd03b608d4be9580eac2370261aa9b7505d8c26c25b7130f7241ac9c68fc96074e5c76ac352878ccc53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d100dc65d13e2d1fa999027f083bc7a
SHA1a9c8130b4a2875e57799f3c0e8c0b535b41e1f47
SHA25652402a928de2781eaf6e3d9a7349fd7a6e29a0345045c7579344fc90a940302b
SHA512d7f3cdbdcea36399f3ae597a3b1b3270d044c9247c253c6fafee3e8d99aeab7f8f18c48aae71f3fba2c11c76c7d00c21654b5fc0cde16d26f5adb702694a041e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ade5cf0a0f1c34c02393835626a5077f
SHA1db67737f666a3d2bf2e43c4f5d70bf1fb960a32d
SHA2565be43ab2b3764e6c9a885d79b5a301061163ec03b758ffb2a925e95e3ad9c9a5
SHA512e120f5787f7dafcc7793b8d24208d8bb11451a53cd43b6f5af32883e1f33c56210c04a18bdf98b30ac3b8169bfb505bf0b32c8c390d7fc7c3a613bb6f7f6fe7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efce13537f4b431d12d619fa9c19e4f3
SHA10db28330c9ec40165f27963f9be6cb6142bde7cd
SHA2569ee3ed14971b9e7a2a74fbcf3d48253174ba19db4cf2b30a06c77db17944c7ec
SHA5126b105c15d059b738f4a176adf3e8c1bca5d61499d8f1b4670fc3ce92d7c3c70db170bc57894faedb865c461bac48239b039351bba312446daeaa59349deb4ba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2b2b6123201f35e069df20a59a4776a
SHA161e7c8bb9d8a0e184c47579d467f9059510c5d37
SHA2563e6158d75cad766940328224f1ca3612f858b62d47aabecce998a4ae50b82f75
SHA512c8d45b27e9d792073b8aba8aa6ea10fd7f3b0286fe04ba881e1b4b1354ea391a7c2c64691c1764ca89bf0be41f94129272934463c2b799b13534a63805cd77ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a21c01ff00090273aac6bf97ed5350b5
SHA104ab387f492fd74fea6ca4dad1e28b6aef46236c
SHA256324a5fa88e5a53b43316e2a198d59a67b1fad4b39c080a0ee58b173ea1e8965a
SHA51212e607cc95bf6caffa1629cae7224fd242e4a12e7178b1d6f0e50ae3acba1e6debe58495773c5a6d5faf9b9f4fc9378478cf5945baa1ad9568433e7ea61bb8fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e9514a007c878d7fd113c7eec734657
SHA1f3c661a1856486df577d4b78704ef1a2d9d3655c
SHA256ef73ebd95413cd35c59c9056685667a59ef674253b340eb1039bf805f440d5ae
SHA5121f13f30d43d9615f5f853e2e5610ba52bc5eeeb041231a21a3f41553ed85b87d5f08554b6633962c4a3b4a4c76504b520fcef8b14c802c166b23bd0c1e410492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5491656690430497307c0c7af5c387ec2
SHA1481e1ea3bbb5c436f38ca1237a94b9ac77255836
SHA256f32a383c1fc3dc0a83841333d25dfee0ac1e7e57c896ae973e1b7d487a356d75
SHA512dbf654379c928d2afb4fcc4000e86c8adea53f99c534dd0d20d0c29403541c5f8fc058e3e9bdc9b3359afc8b46f122c5652861328a8e4b1d0478fd0f8662dac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eda84abeffb497edaab85d551529533
SHA15621d8fb29dde9b2b7246687ea40de2ed8300dc2
SHA25662636e749b0a719c682d66f695e3f601b700be0144abb4d2dc51e952aefa2141
SHA512ce6801b92b8b7a0b182400df7dd92f4991a96e24ea494fe55f74330127ccfaf2103dffb6d853ce88aa0b3fdf714ee0e6fd70ac4f4f741f5bc1c1af031944abfd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b