Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
c885e3b464cb891816a38e421af58b18_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c885e3b464cb891816a38e421af58b18_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c885e3b464cb891816a38e421af58b18_JaffaCakes118.html
-
Size
82KB
-
MD5
c885e3b464cb891816a38e421af58b18
-
SHA1
399b9c7fdfde236dcb593765467a5271e6c774f1
-
SHA256
eda1952ab71d79eb1673568adc55b776a9d79313dfb4a4e7eb6a4cb8dff6417a
-
SHA512
680e441650430c07cc74efcbd3b5e15fb15dcc6bd553e3fd1582ecaeee8068190d9c375d8bb95be8e06cc31c1ed337d1fb7f48c26a526482aefa09183301ae69
-
SSDEEP
1536:ArG/lZ+6waGi67UFroE9MSh9Mv5cAvbuEr8W9TZJewWgTyz7bOAlLGDCquA5HDg1:N/lZ+4hNEr8W9TZJewWgTynbOALGDCq+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e3c107f2f9da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000c4e88f3eafa042a56f61cb15937313797457f9cef4ded018c550ee008863b31f000000000e8000000002000020000000dc54433ce72536d9981616219759da819cba4aace17d41fad2ac49257f273e7d9000000088e27e252a7a7931754976663bbb9e5b320995b051892191bbc658f94cb19462f42d576d89e8d0f5cb6240e90f1af328fd68562f89be0f556f576efcb115bf03277648c5fc4ee2233a25eec58217b37187cbe0a1b6bbf10a83f1186821477149493e085b622258a2426e6005705545dc494e1c19c841b8b0413071c358ed2b9f02b546dd660f13289b63c0df9b58214d40000000855c17f27b77f4ba4c401a7d54d7400de4b1584a32c1e93a35bb4c344311e35cf6d803fe4d6b3cf4531b528e552a7d8ad388071de89c605f0eab399dc22cc7bb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000a992fe46134046b4f276c7475bb8035421926f72ee1dfd1b23b0203749af44b5000000000e8000000002000020000000331f283007aca9c035b5a58041cd0d1954b66e0732745bdaccc554f74b8cf69d2000000040c3cbaee138db10404119df9684e256480c094f02d232742442f8bff6998f42400000008f83ac6ee2836d7ba1fbd53bfbee97c613a2706f248dd365c3c054f2daad3d418f269bf67feb2516549483a6eac6e3cd16867a86518533e781ceed4fd8cc3fc4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7A82EF1-65E4-11EF-A0AD-C26A93CEF43F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431083827" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2824 2196 iexplore.exe 30 PID 2196 wrote to memory of 2824 2196 iexplore.exe 30 PID 2196 wrote to memory of 2824 2196 iexplore.exe 30 PID 2196 wrote to memory of 2824 2196 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c885e3b464cb891816a38e421af58b18_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5af57888f36ccd73cfcc742f262014edf
SHA12518489651f3589a4730c1cdd97e3a3cbb56c424
SHA2567771711568fece31578aeb3e0b188721edb26fc82f308afc04220f643216d95d
SHA512f13d232b63f50e2507de0fed2d4080e773cb807aa79cba6f8b6177c761cff11aef138444e097b6ae50b3e0c1767ab02ad5eb11b243da96c8b7b3c4f506b793d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504c4e4f7d182d6ca9ce1e7685b79822f
SHA144096fadea4cc15a4adf6a88ddc419b3e7440a0c
SHA256df563534a9805f2a791e95109a3bc98a6c3cbea535a898e1f98482326edac729
SHA512a36e6ac64f27f18ac1a469ce32ff7cbbb57f179cd13201f046d11fec28e67526fd1aa3be981f8bebcffd4fb034d077063a3426e45a7f180a297292ddfb5bb5d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8702c7245a80b9b5ec208034a7f5601
SHA1095cd4e2e32bcc1cf3336a1927f2fa5d9ba10bf8
SHA256328177ebb49203dbb1de7ffc325e15821e62d114e112405c3a8fdaa3cb5f61f9
SHA512ad54434a1b597c2cf9090d0a1e5f324997d6ac664e1bd48b7316a2e80bb4ff69e9b861c82487a261c93599aa6857017212f10d84dd78649248e4cdb618e85059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de7f26704c7e7625fdbfeb845d05fcc3
SHA1d08142f59815a42b428113d8027af3ff90469085
SHA256ec12af9b131f4252742d1dc01f5d8561d41ee4576542aee49ae8ee8a0824538a
SHA5129500de520c3f8983db74079e3d57396f8f0fea5b2ce4298b3df75f9310371fe0ca48826f17bdebf9e569949c55b51bf13609f3b64006e2bb76b3564d00c2133b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598aad10a553d3cd16bb3abd7afbc5df4
SHA1e31fe94724c60cb94f7fd72c8cbd6019cae119cc
SHA2561125b8645bcb58e28bf9d5e8bb88f1d6fff7d88694eb2942acf8716d533cc6a7
SHA5122268cf5b94396abc346f6c8f8e7c53ae1302c74db3a70f42e7401f6c4b2cacbe7ffd077a38613bace74df79ab87f46fdc4a781104179f99372ce5133a8578df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9b022d86ad98ae5033813234d6bc7ac
SHA1b57b6f47bc4315e321bd42c56cabab17bcc38419
SHA2563415d92f20655378759d9c0a170cd90b8b7a31b67c7bf6c1db52ecc013a64ff9
SHA512a8c58e8d909ee6bccbeb11a21645b0351bcffd5e66242001a717ec9e6f81b52eea5f6da4579baeeaaab72f0da5e2f09c61aec15ad466a6afe2ce95f449974a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a477401102c97213009860f210600769
SHA1f47e5e7e3198a88bcf83a2065fd799569e620a26
SHA256ee8aad9b281d6fd6fbb0d4a75b9128c366fb993cf831a300ca022f5f470eaa1e
SHA5123741dd2fbe722164020232e7021a14c134008d248eb43e57f7ee61db6d7ccc35eeb297f8bc91e1fbdd6a889a32813affa5891e8f2fee027c8c2ff162acc55269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d227b30880f174bbd7c572dab1e3ae17
SHA102abdec389aa14447bb9fa7c8ceb9a6f63c51dec
SHA2565d5b0bf634c7289a23da01f258e90d1a35314873e4451e84ccc8f1d26aa872c8
SHA512d5ad1846106127f89a6639917c763f78b6e8210a2892567b7d8501614ba35e1ddbc86b620a35b5e362a24d0093c99ebef12bef0432d85845dd08772dcd1623cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534e275cbf7c674f67d73d77420a9e054
SHA14bff82fb4d7058cdb5573d2c779f66b6920e0b81
SHA2568b764918754cbfe85d5fff858373bccefeb42475e2949624e32aa7f9e66129f4
SHA512e0b9066fbe9fcbf716c12c22f403a10aa7099849e33e9dd367ee39711913bc827b9128841ec45bf141760fd329f4ccea3d8fc072aabdbf717f2d1ce22d442eb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540330fe585e2f363e8ab4862e20e985f
SHA1621f8c7b581259e1a770fd6c1d83c007d26406a4
SHA25630905b093e4e22891d2056d0358f90be1ef206296649c081a0f786c2f0c05c0a
SHA512b1fbf7c11bc933e9bbd2a8e8d64668b5a07fe3f4b9f60f5005623f5614f698e247cd7e2476f167161e196ae32c496a44e5ccc457f404432862f2e4897d0f847e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae4d41c41f29e289b10e638d2bd2c990
SHA1099a7e8b14766861a6724d112d39a453298491cd
SHA25616fa6764cbfc0aa47a1838dfeb78ae4347d9269a559571b18acb3939055b4c1b
SHA512bfb5625f691cf86a81a8e690fbea0eb2e576f93b313963032ded85bf14ba16472bc3ecaaba0f8ef10d726fe158a079a9d380f1a1369336728892aecf4b1aa092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5173e53656bf58381db96d160a38e3a23
SHA1a05749bdc725acffa0e2b7e7ae4e900c2a32d3ac
SHA2567fdc834bb8a7c33eaf793420cc9f34a296023520ee767e33c2b3546c8e3e9d35
SHA51211bfe742a6a7a99a5879f733663fadd037766bf31e1f4e312d8efeebae42f65feea68507f2149a841d04ed8da5430e9bb61587d6b073796bac195df2e037c13e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f84cc88250b97ce053d9cc4762b931cf
SHA158cca56c019b2a0c101290fe09be23c0309df538
SHA25626bc1eea95d58e581c3d94423018e8598ace69b0e061a36822b4bd4d0bb04776
SHA512801b3a5863088290755738b861e36553aba03609d048abf802d4816903b10405d6e5f0c0904d8c99f56960a99c6615b9a503a465866659cda47c3a40ddd4fef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a9397c9820612e222560dfb70e7cc49
SHA1d892ee6cee31c4e17fbd7ea8f9c8ad72456eb554
SHA2568aa19a2d73caca1cc9bb97f0f2826176ecb823a570739aa24dc5a4f18b1d63a2
SHA5126cc22acfbe855975c08da151a0d4f59ae231fae7565446aa25a31237c214c8cfd205a07ce10147c7f399bbac0ff2f6aad35f30c186b45b6636cb87dda10683e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e8fa478664d4e839e97a2b39ff085c7
SHA156e3c222c838c76a228030f17a62838be3a04ea1
SHA2565757407fa31d71b3e783f750afd85a09e0c0e6147ace3e8292abfcd9a21fb58c
SHA5129c1fe93a1e3eaf5326ca746bf75a83fe25331ce004fb3172b4d34b08466d878cab3491e5e580086c1c10e14fe8d159dee7130d5fd40ff536f43ff08b67a05137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d10855606064463364c0336d1b5ff571
SHA195cf631ec245bd84927886070a124327eb17390a
SHA2566d687081ff5a9993daf1000ceea6d76d07cbdd21cd2c935af08c92a5a85697e8
SHA5124c35e00a5286d3714bf5a1d42e77fd038c8bf1b878491605915e17831df8b2eee0d1d336c4e1d1af5f75736f50f5085b0e21a6c93c6917a7e8ca1a5a87e79ea0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b