Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 22:15
Static task
static1
Behavioral task
behavioral1
Sample
717303dec13d7ea106d1cecb64dfc1f5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
717303dec13d7ea106d1cecb64dfc1f5_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
717303dec13d7ea106d1cecb64dfc1f5_JaffaCakes118.html
-
Size
8KB
-
MD5
717303dec13d7ea106d1cecb64dfc1f5
-
SHA1
c6b88036c1632cac9c50784153364ca4d2d6d0c3
-
SHA256
584199c586615674b5c01dbbad2bd2d2f360f5b115c91c8d01039582b35e3e43
-
SHA512
cce104a2a89e7184fb5cb1e93bf5ac08bd14b96ba07aefd09e05b382eef3beb6222007260827f1e8f60f9d164a826a8b63e66152b408dc5fcc22cefee7178147
-
SSDEEP
96:uzVs+ux71SuvLLY1k9o84d12ef7CSTUIzfSxG6MURT2/13pX4m6WHXCmCGq8k/lw:csz7YuvAYS/KRTg5o3b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AA15B171-4AD3-11EF-BCF9-7EBFE1D0DDB4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000059c85195e615f3e66f5d44674ac66f3c2bd0d069e07a055c0865d528179681b0000000000e800000000200002000000020a44c6ef2a090a523624a5e5b59d3d5a7dc3522d6ba1fed4d147b23038917b62000000067a032f3cbd9e3903c44c20a25d21fcd0e7da0b2c27544bf9ca0ec10b938a331400000008805fd68ef5ed11ca89297040ce0333a66db1cc5c2080a6e66924ee54977dd9cccc8bc0f2d9ac034ca14db8cb9ef28fb01ab51884d1435510c5b350a8ac8edc5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b8257fe0deda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428107710" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2680 2372 iexplore.exe 31 PID 2372 wrote to memory of 2680 2372 iexplore.exe 31 PID 2372 wrote to memory of 2680 2372 iexplore.exe 31 PID 2372 wrote to memory of 2680 2372 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\717303dec13d7ea106d1cecb64dfc1f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f619357ca5009964bc7381e850f654e9
SHA15de082dcd038cc938d71be317c2996a21556a73d
SHA2563468aedc57a29d81884d2a360a62f088e2b1c1671eab7e5a0a825e51c99d3f11
SHA512729748b2fc1e7118002597523bb9d9d1f9ff160e585b8ff230fbb9fd2e22208cd97fce4e34c208a0353f3135ec83e2a4dfba8751402174d80490821b09b9e09c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b91c2e77da275afbca5b6500e0fbff9
SHA1e6ade45cc0fd702c2a5e7ea88c8037a7a33e84cc
SHA2564ec541188001f07a2be9bc108edb3e7590c7380190dfb2d6ad8b79603d94cce0
SHA512529d691f63a8b0529a438d1c850189e01e9af51603f966b978543017395cc9e873c9cf77a6499ac6e83bc2860b9d68ab0f4247eb686a237a9cce938f65dea90e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbc7e0344696101a1cbc0a0cf10c6e2e
SHA118ffa97ab4ed1cdbb0b50bf1b9d6cf3d81bb3dc4
SHA2560b0420c4819e1636058de39d82c606a55265c8b502a16da0de96001388716040
SHA51247d503aeeef962a81774f8a0778b4ad849a009f55027889c20d654c89c6f320bf19f478a555102bec312a6035420b414204e8338d7a38a6cd58ce47818a7e905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7befcb5cad50944d1b8a9cd57bb15b5
SHA120ff0d0b6be4441d631e737283c19b66c7e3cd73
SHA2566a1da11a2f8c0a76b754249285692be00f33074d174c63f011729c0ecfc8b150
SHA512148200afad3bc9b44ffbff3452d9c6f5103bcec332e88584f7b2b1ee160670ecb9a06404ef881bb757fcf64cafc365575b34d8ba9c366f323c74fe83c2f1a099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b61e92114565c7ea5555fb9052ceef3
SHA1b07cfe430d062793f5753a9138606b9a44e52dbb
SHA25661bca185a92d0841312272f0b1c6a041b8d703f882a5c59e554291dcf3cfb22c
SHA512fe50908dc483e9b4974aeb6ad331c909587acce71693b11cb84fd732ff029bd1f6e458a41fdedc7a0fa28ce2a06e844c105e0c4e52bbc721e2ad2af8ed2ff446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530841a4966da794f2ee7fc0ec9303e58
SHA1ad5232e8ad0617c8887b14819ea214f10be13673
SHA25654d83840f502c2ecf2c2a1909fb382bea420212d8405f39526eb394c83a1d506
SHA5124d6d810b7b89c8f0e7a1e17f29414b6cff322b28751a13966605a46b2fb2899049aa3dbcbfacaf88f00271980689bfef3519b75de6c4257b8297690be01ba6bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c18950daeaea11f533f517d9c8f5fc2d
SHA196bf46321ebba7ebe85638b2cd79e9c9718ddf79
SHA256a73a8628f68c5598a1b8000146f312e2381532e3073050d9f4276f3778971c9e
SHA51232feabc2ebf557925aad802379446421b872dd611a90d55b856baddb3310ec504e7ca68b070558d7eed528298e6e5ca7d31b0bf4243de66ec3109a39dfb4c76f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5385f016176437fa98e81b25d011a8e2d
SHA158ac34dcbc7cbca8326094b72651bca974e3dcc2
SHA25609c4e00625385846ed0ad493e0bbe39de2b4932e7fb3f8cac6d3c80dbe491c3d
SHA512919553a00d46f619c5088ef14e796b06665ea793e2c16ca7b5231a8a366c086fb7069f79ae24207b777ace7bb2938eb30b05c5b85ebfa196e6e09fe9d93e778e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58889112770f432ce401278c816101690
SHA1baf77f675703177324aba8329e6352532a8aa1bf
SHA25679e6c39a6451f64f8bb83960e46b1560f06c226167a282b601adcb0985e2c48b
SHA5128b554a91a8f2308e769a9836618b3ce3984bb9bea7df6b27c7efc5c5f5e6413d08391bb8e53ef1630726d74ab1afe0f71ae78c21bd964e96be47992541ce5980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bf16aded24c62aeb01d67ee3d44cb76
SHA150ab52241565b793c5d1a88014c6fe95e06e54cf
SHA2567dc2ab39389874dce38763026925926e295092a0f5b794ed7fbef107d897ee65
SHA5122a3785de346943417b0586856a8ef8910be3b00ecdb0563ee1cca996d4699bca1cb1a4675bdaefbbb89812a2b2822169565203a8c1bed5d7837e98fb8e65d99f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1f8eeef8dd1951cb9aab341070ccce8
SHA11bf5c08db112742787ad52206b9b9319065efcd2
SHA256ae711430d031ea4a29efc01c16e4ebc37b42ec70a6f7f63ec60d81152cf28df5
SHA5126412a49e3b1de797e2b34c5866bdba2d28ad60396920fdd2200827433f891b129c5d749b22f8b489f1bea629e28a03b2f4f83c27aff7e5f55cc0ddb144671d1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51597176b40f50f969add2adb1f6aace9
SHA104d3ba6083bb871e2c5ad1819a54b33ef104afeb
SHA256b3c3055b080b2b9660ac6d3af5ed68ad847499f94d319f95895017dd621fb7c6
SHA512ccc808563274261a33fa9b44a5dcb9305ead267cee7c3cd37ffc0db123be1635eee73aa1f3394fea94208ce87e9c5aa8ea45f8f90d03423281e51740fd25627c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5071fb044020da8b1f2eb9708763add9d
SHA14d4edc6d74e178e1fe18ade8b75abb6bc2150282
SHA256bd468f8c7dff556595d57fe7e8e97e4c47a69027b0a67a85831f94ca507909a9
SHA51208d4e9841156da988badc61a414dbdb93a0f056b89294533144afbee47f62ee7fa236275fcaf239307cfe988adff98ed7f5024caa2da2057c8c92fe938bfcbc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538364871c0c2f6b8c108d66693bb0264
SHA167f7e613f664a32a25406789498f627dcf22d6d2
SHA256db8ba52e4c2c41f77ef470b14d47c3336b3e7e5047b84e84fc910ef885d3e467
SHA51217f48267443919545034744a56d3d836de5d37a193aadab536f553fae93b5e1c6a4bbad1980847c3f8bdf1cf8302a0941979c2fd8494d3ffb0232c4419319274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541c5a6e588fd4db91686577946eddc6b
SHA1395fb28e646b70031ce9da7fd208962b56e5d547
SHA2562850341f8c52ca2e05d30373def40301d92a839d1e3bb4879b098366643a3374
SHA512b83976815e76364c1f569b88a922f003ffca8941c5f88d219a1522f699c8dfb135aeb32e169aa70e9dd6fcbc112fc126370c3e9a51a3faeab83e6ab35d985685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d8d8531fbfcd5fe2d94a29c3dbda7fc
SHA1310187d7bff977f6cdcede86ae610854d1dc77dd
SHA256b67ff6e3d879d0dff5e3a6661a0c3435fe75344a1bbf9b0880c849e3abfd08f5
SHA5128735e53f8ef5cf9682c682ab2631d47d7d91d6866e45f6c9f5c7967b78b5a80ecf20aa065e47c949e32c3a8f8a2eb9541fb1b0535241e4db963e926de65c3f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b00b479fe3596fd89777c2093c71f698
SHA19c7a0682dc18892dc46d8510e2e11eb4c183da9f
SHA2561e2a5c5f26ecd21f86bcfee7a4f05d33dd5224524f8136645a0868d7e994bce8
SHA5128496ac66a7dcfb74198d3b49aa59ddd3bb10f251d4eb9436bc9c61fa8c205be6c074a37613d01390f5fce508959f1f1364c1162df7dee0d40c0db426768adca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c32283e43fde0c6f7d3c99bb110b0018
SHA1f8b7be235387f9f44cc7117d6bcaa448ac5b6372
SHA25614016f1c99d32ececc47575bb020f1ea7a1f0a934715b1d7162db054f1c06d37
SHA5127e903b3d649dfe24cbd27ce646c33f800232851e80b7dbc45c009203acd2bb01ea82363db787d941d05c6de87f751be0f4f076315a396c32059b14947428098f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b