Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
c21baaf1a522d921560260576fc8aaf6_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c21baaf1a522d921560260576fc8aaf6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c21baaf1a522d921560260576fc8aaf6_JaffaCakes118.html
-
Size
12KB
-
MD5
c21baaf1a522d921560260576fc8aaf6
-
SHA1
b0587a57981718dead69b00705da90a4544c6469
-
SHA256
5305dc1dbd6f186ae26f4a7f342f45051806c87674747ee39c8b28a607edfade
-
SHA512
7b746a18c5bf46d3edea5c803cd8b7aff230a4ec83be61e16b93c8fb9e884c1ccf04e43663be938bddcba59cd85dc84a0e7d21b40c24b446cc0102d59b6685fb
-
SSDEEP
192:22NzKAp+6KqYDRNuFDNHGXUIf3Q8ycahqaV37ocHG7nZxzmdVJT:PlKqYDRNuFDNHX8Chqad0vjZtmvJT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000cf9b202b7d7d4f0e79d66d93d48cbfc1f70f59aeefb2d536090e8c6a4b3ce2c7000000000e8000000002000020000000166b316dff50fc7ba55f394019860a733048edffa01a35f3b9275f136c9a89f420000000ec0b48259460955d2d04a5e55e29ed18e25a7c1834c032f50bb32745f1bf22614000000032b9cc8f03fdeec3b19ae4811cbd6e8da54bd5c9f77847781663f8339100d8f7a65afe04f38f9d6587b157013dbb0414026267b762cb6827d33ddb47d6d0ce4c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{856394D1-6353-11EF-9E5F-7A7F57CBBBB1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1032f85960f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430801451" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2764 2240 iexplore.exe 30 PID 2240 wrote to memory of 2764 2240 iexplore.exe 30 PID 2240 wrote to memory of 2764 2240 iexplore.exe 30 PID 2240 wrote to memory of 2764 2240 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c21baaf1a522d921560260576fc8aaf6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e43f23253197a9a6163417f4538282b
SHA15b0e3d4e3cdd550f571ae32691e4fca00ebf1e04
SHA256a59851dba966daaf53130d95faaa6d56d3db9790e0581147c4d1093c5643bcf9
SHA512dc9100023af435f38be5013b6add702e633fd2f398bc1f45992088450966040132806bb8feb3edcbcafa048b7b586e6b7ca799fa0c473299dbd698d6ef62aa0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe6f87d33321a0c534935fa7e3f3acf9
SHA1004484eeaa251df6e15bcbe7f48f53ea4c1828fb
SHA256bc531aeee6f3c3b90c9536ad6658c968405b023849e75096264abc07303a2ed8
SHA512f16d7bd13ccfa1045246b74526332eb8437b66a2ef836a32978f88287cc2e590a67ebff81e9e90ffe15d618d3381b8e93d2c9645b3e9463f0f13485676fd84a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a371ece172ef4434f65870a2cde6dca
SHA152c702a81625d95582c80d114beed68f3a1d1bc9
SHA25699207472a047afbf22a35adde437e6812f94c3262a20a9c03ae7fe9a48287fee
SHA5124eade50958d7a18ec042b47eee577de3f6a30b728996483503ce99e91afa0802d50528e2cc5adb1385a9b3f08ab404d703958e535c661b71453719137c45d6be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5850be23ec405821dddf5d17580170716
SHA1f6fa379d3d9eedb816a2b28e2cc91d4a16849dc4
SHA256bb9479801d2050ab81269f198aabff0be3a1ddffc953b4c8adb070450edec2d5
SHA512678961fa6128fdb26254a9ae2fb7c363e187cb7c4a64b8dad63dfce67b980bc8f2b042b7bae705dfb9f7249caa243effb2b30eac7f1c4cd7284db069cdef7fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576fa5f4429d96ef0530c46b9d6749278
SHA10f1a5dee98303b5e1c5f48a16dc5496aa3883a2e
SHA25632f7006ed3f9f9beb810cec66487731f514f283b600c48f09b3b3e1c3e3914bd
SHA51205feec4b8ebef1007f3d6ec60bb75d54aaf08a202a781ef4f5fe51e6013bd858045faec6b7d80d842c72d5aa4b23088318b00af9500e19ed907125f87b8b8c20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581bd779e8749ac00f622566684604790
SHA146a2f55e4d8d7ae70bc04356d800c9f1a5d7006f
SHA256b54a95bee5fdf2ffdf4e958ff169b49370903722eb47289207799af886dbfb27
SHA51229a5ad2ac56f4af00e0df0a8abf2a3865c4701dda4c96c4b3c9859e50c3b062f3a5bf88d1a3e5bcca14ddde44aac98f57f7530cb3b51d4de18b4ed95b782895c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d94398d2870f47e17dde838ab0cb61ec
SHA19e36183052e7590fc88024cf339ee9efd5fc12f7
SHA2569a3ede339fba8bdd796aada66da54a779cc68f48af06a5a63eaac163a3644ee6
SHA5128c25e463243b0b2be93211021ece4eef2789f09d070b111109f30a819307b655ba135b2c632e9163d6614a4bbb5d3b61391d405e49ed2575bc8ed565c4be3cf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5383c283449b07b1a131515b7cd059ef0
SHA1febb3596c2ad4d3acedfe54b0427e58136c8226e
SHA2564f2a141a0bb7c09bafac94de8c3ed1cf5f87239130e4f544026aa73cabacd2d7
SHA512760e02409bad8d1cf014f4225f13d2577d99a4ed41d462439e8115a49b323f8d8f97a14be50db8248f32d55312c658454d092935839d6bf13d116e41faf2cfb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565be53a62855e932e68a192631fe3395
SHA1417a3972f88c4ba40b192c82e8b436fe1c896a0a
SHA2566ebf3adec8625afed3b6d251f82e240764161d18c7179708e92c01e30ab13c5d
SHA5120eaca03ceaa514cf5912eb57c8380cdb3907e88570fac4e43e8f08016bc5b6b68f7b1fef3a5fad04eb9b4680d543fbe56172dc3e8fcee6170f736cba66d10eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d3ac186c91f3734ef1a96676b658e69
SHA1dd1da34e756b7afcdc506eacc72e2800323cb24a
SHA25601b20a93267699142bccfc4fc1802769874324eefd4674c5dc2a177f47b2accc
SHA512064a65ed4aa5c3352df1c0f05ba4f2c2a5656a1d57e238bb4c76a7809f5072f8bb01e44fac29696de744c6695f52bb0490df0c0b2c73668f187aca53ab848de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503765de28c0eaeb3f628d430ffdf46d4
SHA1f072c10870aa9c673fd768201b1ab225f9797756
SHA2564f95467f0d6b6ca19d1c2c8dccb12c095d6cb01379e21f0cbfb4b495ce9b7a8e
SHA512dae86c3bc2a9d8fd1d1c9153573a84bfd260424b089c656ad11059e75ec80428375e01f0228eff1aab145af540cf64fd1ad1e2b3f7e5af47a017ba14ce281853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542b7008c8b662632fdac7e175509672e
SHA1958d9b25c2e444a791c01f48bcd0e370663ae092
SHA256f7173234dfcda750255806b6d6678d3b873380a88f644fd2700d073b7ce6b2d1
SHA5124c689a38d3267d88a9b9d6656c502bcc2f5498a8a704b00def721d12cd31139c32db74d33317fb19ec4d284debdeb7f668664aeb1cbecea007cea82ce184df1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a57a21ad497e45c886730539c703a44
SHA1931b6da31f76413feb25bb4069350196505f3b00
SHA25652a91f6a14679e4220d7185a8864b6151027809d2be71aa80a20b3bda9c1bcfc
SHA512c0738ac3a10a4ba96a354213a5b6791ceebfa44e0fd94cfd8a475ef7c42c08d31db1013dbf1308557aa57828c79f2509cb5ad1e196b2207536114fc92728dddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8166e6b45984d0b2258ef871f282063
SHA1e24c238fa9cbecc2f6794889a58526d2ffe8a254
SHA256d6cdef43114bf5744c7f23ccd41a4e15baa133740866f2e2125c85160440495e
SHA51224a9b2df55065dafe27a3e2fada4e6529c0f6765e927471fae68fa5519075d3e4e0a37b071365399eb557053d5ecfe0eb284463075d0f90ce836403b5a924028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c119b9f05f602d559a7c16636ab8a4d6
SHA1e0b0d763b3fe9336a3fb95b3833942a07eefd137
SHA25666f468deb1d56f0c13014a6ade5914ed0c4f0cd5845c21e4715bdcf662723c94
SHA512a4af5c0e420c4c66475e8dc2f462695b6e5b08bb6a85e32b05c5a83c378f044c723be25839917b4a00474f11ab5ebbaf44e8374c86123c5d45805f09936eb2bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5841e150d0233bacd63fe33f596dfbbcf
SHA16f5b7ae9a8179a29240213327831dfdd1a6e06ed
SHA2562203c45a3502ae26e117bc1bb45ffc1b48c3fbcffa0af2d221c7d0bbd1e24bb9
SHA512122265734efa1768dcd05bbff73914b7e01f52c3dc4010deedcc9780e2a77abb07d147b6962a6718459e46f83617f8b2a7eda01a42d6f454106007e55b81dc4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d566a7e009a4077cf3ec627f2cdf5d55
SHA108f6f3f89e5b0492c0129043f12dbf0af0c243a9
SHA2567db0012720fc464535693130158a9974cc676f1d69d7a8e4c2256daf8a36643e
SHA512489f232e7c6a330f0d2e9106c33bb9fddf2881ae9fb0a00902ff6d16420e5c6f5a2492414fc1439aae5ac16d2135030ee421e7406d3cf9544a4268e597bbdce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540239854d2254c73ebfaa837587a2641
SHA1c3bb5f8060e38ba0687e75308d31e3ffc40f9c82
SHA256f2a1b24aff223a212d5a2044e322904c0c666a6e0f8614cdcf5039d8668321e0
SHA512967a1534da52c10a686ca2fb5f5864f4d5b7ae9c7da10550789dd15615cbae588f04b85cc4d01a43eed7a55250352ba09d107503abceb0ea29326b10baaf7604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f70f04fa714f469a0445ae4f7b34e194
SHA1b9ede91c4a23cd6cebdbf1ceb968322a2a5d91cd
SHA256c0143f2cd451c268e63eab0a11c507dcfeb64707e4af36a7425295f717e4a3e3
SHA512cab492eecbed899482b0c828bf8e72f5e531cf3bf5316345d110b8b46b5287cee9c24ea75607c66d99b1c45f6844837c19e909dbd2b10e05c51e5a134beaca43
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b