Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 04:01
Static task
static1
Behavioral task
behavioral1
Sample
c83257e30bda35895e6840b3d8db0a47_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c83257e30bda35895e6840b3d8db0a47_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c83257e30bda35895e6840b3d8db0a47_JaffaCakes118.html
-
Size
14KB
-
MD5
c83257e30bda35895e6840b3d8db0a47
-
SHA1
d7ff8df10c9cb96b8108b9ec2992e76c16166d36
-
SHA256
88c503fcec4f589636fc1c65e443430c2acb1f14af1334be60b346a40d9cbbe3
-
SHA512
b0ff893330498a743a13f92d56e904dea1d3b2a7e2580e4225bca865c029a0e873b5c830a2b6a33cb9c8110e2e5d19d85eb63f6437f24b0db3ff1ac668989e0b
-
SSDEEP
384:23QK5eMjeeeeueeeeYxLeeeKw9e2e0rWMrceeeeekeeplvuwld:23QIeMjeeeeueeeeYxLeeeN9e2e0rNru
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{69F4FE41-65BB-11EF-B231-72E661693B4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0845541c8f9da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431065975" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c92000000000200000000001066000000010000200000008463823a9fc77bc67f5876362f6e2ec1ac0c19e7254413f3c1b07c13710bf388000000000e8000000002000020000000f325d1c031f84a3f16f759f7f24b3b25dab951add0c8a56f878e78d22afe5891200000006f9c7cbccb67da67631fc351fecc8676fbfc44ddbb98c066bbdf4b582bb476fa40000000522a5fb70fd869a12451fcceacfa77004016f9bfc94af037d907dadf8885a97ba1f7eac9e6f444d5fae1217fb284d56814f2ecaf00d39525ea68f9f440688d06 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2928 iexplore.exe 2928 iexplore.exe 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2004 2928 iexplore.exe 29 PID 2928 wrote to memory of 2004 2928 iexplore.exe 29 PID 2928 wrote to memory of 2004 2928 iexplore.exe 29 PID 2928 wrote to memory of 2004 2928 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c83257e30bda35895e6840b3d8db0a47_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2928 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ebf77e22d2d2aeff1129f2abd2ab9cf
SHA19ce8ffdf997f218febde6c39220ef065dca28309
SHA256e0bbc275e5805f3a6d8f3667edd8c09d960b87c7856f236c1818c2ba85cd7c9a
SHA51217fb766da97c7047e86e0b260e09d84f9ef4ea48ebacd7bbec56fd27b45502ef777d803cad5e94b9ca920ac595acba66d8996115fa80bb1597de5f52b97f1629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5778369630b43abcca2017f4e317e2b53
SHA1beb50fb9439c615307d8eac9f67854890c69ece1
SHA25671e7e68127d53c5530788904ffa4c37e1de204426c9ac91714ce359c23547da7
SHA51208e81233c470c432ff37e31cc0c28e952c5d0789c45ba4f5bdd8a8d08283a57afbb64ed42a6b2402e251e7d2e8630b1ee91014c9384655e7b8829c301dd83759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532841e84a74194419de66cbd61198f75
SHA1cd67501af74527a0f599ad14d54b8d06ff6f93ac
SHA256d0be3a7ca2c7bb9fc9c700b679dc6a07e588b37789acdc94e5af85da315d959d
SHA5127b5082d84c60d0a187ca95fcccad366a298e8edc993f62d78f34b49b3d970e384e69a1c9bdae7fcb457cbe241f84b26d69e6d7c833b6ec0547588e5d57b1d944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8488f5b1a09c14635c8c871c0ad7668
SHA173d5fe39f6e8e3452d612a66666593dff1b9b2a7
SHA2561e7f89e194cf1267b2e65e5daf53cc93d5094f013d6a7c5f05e6b804f90ecfa7
SHA512c52cbef08a914c05aa5784070ed9585edff3e75d64bda745f833ef56ee21d751c7aebc9cf064dff7ab5e9ea62e812b33f3b098afd5866dcdb91172357f5ab039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584dda7ca09acbf19611908353f7a88a3
SHA14b80f4b0ea26828eb39a369ab5f25ecc7d5a40f2
SHA256b35ff79743e775bff59fa18486f7689030ebb31acbc1a4cbf73dfbca391474bf
SHA5124995aa565a3bf45b096d0c30dad51b0ef3a635e9bdbfc8f75b1953a1ac10f609b4d5de54ef4688086fb8a9cbeb842c040f8b255dc5029687dcb46b816c48f927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dc132d387d6bd7bf535159e6a0ff502
SHA103b6b144dcd5c7a199c3f05570d25533d71f25c5
SHA25603123f875e40939aa135ad5e86bd26f6e4fa7fd68f31fc16746a8288fc5d2dcb
SHA5127f8d2ff2d2fcc6ec0c337f433cf34334c0ebdeaa5fcc8ca5a48a111a40d8d11d9c615f57b4003f8e536d96d57e8a19b25b80eaf33f05714ffe4132f7eb29b120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55348e6acd754b73eb90be57db331b5bc
SHA115f9b05bfc64291cff3788593f50de02650fc96b
SHA2565711e7cf8b19629faf2f318fcff0752c727fe2987eb0b6e13e1130e75dda6c16
SHA51241de8cba0a4b84fca595b10336b6c216296a57dcc26c0983829b0d26faa0d985de4f30abbac8cd7893208a4124e75397ae5acec9687600579571897faa95c3b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57874673db465f7f3b9824183a064ccf8
SHA14468efdab9dae45e62d1c058d9c3604e59b0b61e
SHA25685a71f413436a3bdfce0e6084ba0b31f4baeb188341b91eb141d27c5999c942e
SHA512652e9dd3caa450a3f8b12d30dc49b2dbcbc20bb5000029ed8809d906fb89acd37c6d1ded595eca4475b39a51b5c84eeb71cf542bb88d9d8b337f9e26593dbc16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bba69f2bc19317495e4ee3d556f4f65a
SHA1864a5c0fc4a39af57148919932738e5d1c27d45b
SHA2565ffa0fa7bcccb863345ad9f652eecd1f47ac39f2e9cb5fdab82699b9a9de9ae1
SHA512731148c6f1211bd500d0b57854f84b19298e5cd663d088182e08f6381a2eece8d559ec8e95d39a98a6c7f7c14a3109367299ba161dfe29013ca624a061dca8b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561d6896bbba1a9c3d36eadc865d6e935
SHA188c0f4c150068b84720ea128d379faf1409aa7ad
SHA25623e6e35e91534e7c6ca3c773554f5d7adfe74f122a27a9baf983e7dd3be430e6
SHA512c4c65e4778eb1cb64cf5d8d3ebe0500f59505b925e5499c6fc6cc209dc870353e9fbd65079b851fc46f867eea7116d931874c2a8db55696cd70d8bcfef7f3dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfc15d0a118a35f4e199d42731ea2dba
SHA12f41f894d49344ff6ee340c5f705482f98d5ffb0
SHA2564367aaa649ec328371d489abdb3b38c28db01027092a1eace878631c7e2d5a05
SHA51274ecdba38854a54fd893b842d6399f89ab47a456a81e26137472bcc8b5045fa83a73825c7a888b025cf516588b98d1659e7e553eea91620786b264c046127dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504a7ceb7207a4f8630ff3eaacdc94d83
SHA1caf74fd977c3acb2cee402ebd14d9f45603e7444
SHA256b708c060a94ee6f75a8b10aa7eac060de4189350d6aaf95789db3d87a66011f5
SHA512bbb75cecc0ea841b4ab7d6ddfcd5a5ea57267e897f12e659525a88573abc4d09081a5a9e3bcab4097936718ad6eb0461661335347e9aaa1e4b64e729d853d857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe7af0fb2cb182f8f4fcd9d70a9d203b
SHA1e95b757710578f4007ed3791bf59a58cbe722ce8
SHA256190a673d397697d89e6748c3a4565111af54358393e7942e492a580f939209e4
SHA5121ad56a71c9aa5fd3ba8a3ac38e87614ca7bd76f05477145cc8cd17a4a35257f125604274819e9263174f25681179281ed85eee52d327e7488a36b0015a5f0acb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5180f1b8908a39157feb57533d8a12d52
SHA1287b5320b1c776cc3baf956d311f28457b37dbc6
SHA2560223e5d97ef409b28a76797597b57f343ab18399ced93346aa8464d0588a35b7
SHA512f4ffce90a2dde604e18f0d30a7ef95dcd8fcf9f8087c162f4b318445667fc7897885d03b6d889151fedddf328b4765012a89e8d4ee819e22ec3bf7b0635b275f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e78af93c28c2cd5a7427030af3fd7dd4
SHA127a9193c89d9504ed148ca93913fed4677a1d40f
SHA256cb64e97229a513a8e3584e90832c8c9baeb5b387aeade199689c7993d2671be1
SHA51291e9b18b666d9e8f55e9664229c14d5b4df7860b4f48bbdf131b836bf10a83e99f1a019937b5ae21b870749f57e3f0f8525d08b01a7cd4a8165bcf8c419f1ac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1f584c7ec1f2484b90d14b2599c95c2
SHA1d1348200390ef1f73d961c00869ed7e71082f274
SHA256d40dfcdb341d70df6bd9a941028f86d066fddda081b029ea6c0e369622d6ff0b
SHA51240a0f4d6150aa5d548c83ac7a5e93d23c40ad2de681cfd0cf4922a3feab06907f75ee9c917c52629d6348368446fb42c075a821550e564ccf6ac5c8a20dfb5e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570d8ccc89b5d6236568d7f99af72ea72
SHA1e9ff24856a43fbb168b8c89faec02e01458436be
SHA256de9ec728596181d4e1718c457465afc7f21cc4fd5b187edcd403cb359072c098
SHA512f7ba34da8bcd3c4b66720123b18f8d0840b4c7a3fc5b702f5615f286142967300ca1d9035a71a6a591293da5ee36d195e739d6bcf15ebec9e66145aad3d87a75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3fe91b92f5b4f405b4dc8f498c42c73
SHA15770857749620247dda9df9ac4407575ca1311ea
SHA256352f6d7f154086284fe8e90af0954558e3fb2a01330a347606dcc2916dbf1629
SHA5122e51a3bfbd6d63b4087fbd9376ef201eeff943d8351cac3f62019c9dea97c0e792e217f8064562ff1e04c421255934e1da53da0c55ea9f7aba55ff43c11887a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5892e079255268384ccd8d21ce17914f1
SHA1ab711397080c860d475a6a467b5af7c812ceb27b
SHA256b9751747f9bcd77541ae40f43d481df26c428290be46724a20481b6862eceb84
SHA51247f4a7607e61023d28aa8d77c991f5052dc7c2dcc21e7f9b36982a8f0d215f05107db50df449c15615a279fa40ce353f9e9629d9c6f8af7298b6f7fa4970b65f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b