Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
76023c83e2bae4577ce01c4d3d2234b9_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
76023c83e2bae4577ce01c4d3d2234b9_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
76023c83e2bae4577ce01c4d3d2234b9_JaffaCakes118.html
-
Size
7KB
-
MD5
76023c83e2bae4577ce01c4d3d2234b9
-
SHA1
291ebb6c7e51ae1dfc9ad5c1ce654fff48e4bf83
-
SHA256
1d7daf246ab00f446945c27afe30e3f5b855cef22af05bd093f8bce428022599
-
SHA512
b4e798f357c7cc1cbc5c11acd449d0d81b0529a38aac60aea04780b23084680b237a2fbf058880f0fc7abdf8022417707069a3c63ac835cd49c8bf2ce2cb9a94
-
SSDEEP
96:uzVs+ux7vri0LLY1k9o84d12ef7CSTU7zfNhFBqIYP+YcCcEZ7ru7f:csz7vri0AYS/Uwr9zb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000fec044716859d40405aadbddf0ddae47660b79610d14713379b89c72888e257f000000000e8000000002000020000000e926924ded23b71d49b9ec572b008befe5a3f330286899af1aca53d6f5dce2cc2000000047e06c361601cdfd92bce3dde44557228c9c5a6d1698dc03ededfc20b89f717b400000008b7e03aea5357543f18916cba74eadf73a843077b9bf2f4e5aca57848c9e45740e1d6f91657b7794fa6b934cda8d4c7bb1351dda3c7b53e5e1d12970ea581bf5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 105d7f623ae0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428256264" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8AE7E7E1-4C2D-11EF-8920-7AF2B84EB3D8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1244 iexplore.exe 1244 iexplore.exe 1916 IEXPLORE.EXE 1916 IEXPLORE.EXE 1916 IEXPLORE.EXE 1916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1244 wrote to memory of 1916 1244 iexplore.exe 30 PID 1244 wrote to memory of 1916 1244 iexplore.exe 30 PID 1244 wrote to memory of 1916 1244 iexplore.exe 30 PID 1244 wrote to memory of 1916 1244 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\76023c83e2bae4577ce01c4d3d2234b9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1244 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4aff0dafba9ba1da9cd3bebfc2a32d5
SHA1f646b6047be672831fef359e7752ac43ed221275
SHA256cf349c903f6bc1fb171af11fde5cddf42bdabed583acc50635e61eb2812f9a29
SHA512c3acf5cdc1db62cabc65992ed96cd6b20883b051cc3885076cf9908749627206be1e0f78f57c8e6e0b657f8c6abce059f96816b22daa97802a586f4d03999c1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5563427789d1ee1a35195b41330bad71e
SHA1039cb00bd4d99f4c2b875d89abd64331bfb056c3
SHA256e8b56a2841d18650a30b9a262efd712fdb33880ea460c8fc693ceb12218f7eda
SHA51220809cd6cf736d4803c36aee80a36116c72b7ecd5b24a3278f33bbda9a39e7df156c603b511dba8461a7e0575c85255cc6549a80642f9c5b25ceb6b6b8d683f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e1cee7839c28e1cb506459c72fda23f
SHA1a8bdb1a3352051e2ae35147e45c7a5616f6fdfef
SHA2565e217d071ec7717d4a86cb97f8a3d69989688586e0af15d010fd9f6908fc5328
SHA512f50a5286f472e249f60808b165760061b99eaa1e01def6c6df5eaff93773a9358374f8a3129b2219f0fed5c9f748f868d015169840b7ab47f2b658a16f407236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc62a4669dae29a547d2f7160f8e90da
SHA1badb6726fa78caf2ceca2b4e9c9df7b3e606e77b
SHA25673355870565285eb43b245f1db3b2184bba487279d47e3899a1fa83f686a4418
SHA512e6c73545d92c7c274a229b548b30a8f5c1bc668671e0ff1d0f70e22fe36d6bb2aa146bc5fe5c0f9339eabc25edd7d7b899230664f00118346bbe7d5cea93bb5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560ae6bea0ef85e91af013aa8dc884415
SHA1bf01007bbf608c4da1ff6228a661443a95515b95
SHA256ed7bc9d8e158f852685d776cd7dd06d7222ad75aa25184847b13c34ec0ce1a56
SHA51260e1fe3c9cab24ffae224d9e314e3f4bf9d37fac50f06deda5c5866b9d517ce43d871cfe142e5b3995b61d3170f90474058805cc52bf271a77e9f0ce4a779cdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c43e47098a658c13a58177107c51524
SHA18220209ac64889859d71563fef9fd6c1503fcede
SHA256e1a8144b0cbc4dba89c14478bcca52673830d4ec2b1298b2d5bd2ff2c0689e8c
SHA512671338a305c203636e4dfc8e09192dfbaee547c0407f93793b8257898e335b08b07a1fc2d3b8efb3a68fba0d054bc283a3835069db817ef54340893dbf17d7b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5441cb4f716107f85d7042b552dd8427d
SHA119032f17093677bcf56762578e61cf3eac40d755
SHA256deb4a2ac25c3f029f684f75af142e79f7f159e5b3315ffb8d660fcecdd38a747
SHA5123e9cf1b6a1a569980bad7aa2ae60a751dd8c8002f4c0d94a00da56da0d3c8d13166b847e5afcf81aa1c0b3e5bcc57445917e10ba06ed2168694b284a9a600077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bc70f1a2dfd98ae578c5a2cc657878e
SHA1c86028f16d180ad01f57f102a36207ee2a523380
SHA2563abc2d2bef4c7d2ceecd33fd0931ffb6ef5cba311a2b4573c408abcd29382dc6
SHA51281bbc743c59587be49f8fb9deeaa12780834f8e4e14379240155746a9640885d2c0fcd2f2ccdbd82e43a160153161996a4201ad65f7c24ef1b7355c115668544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b71170a747a0c9d84a4c976f0a1fc0d
SHA1e5ac5447c5d001a31be13cccbde9cb067f9b0fa9
SHA25608289a9629d7a67dffde6a14d68f8bb89efe5afe48506504021637828aca4594
SHA512eff2d854129e063471bc31b6d9e76efc4a563b5f044297e69a7bc30f594cb7435468d127b13c9535461454e43ed1e8bd224748a2125f42e21d20c89cb62df155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e96170f7677913bb3d8e52ababcc7dae
SHA1ccd5ad51edce829570baaab16fd1300b5b40c18e
SHA25696b3e84f9c62b4dbf028f22488c24f110d6112d862c1a09e9afdf53ac3f82474
SHA512d87e875c174e84788761dcc6131462bce5b279073ffc57ae7a738ba8ef6ce001da4d64c140c241bf9a27b7af93add510c00ac96a781ca784f7a4573fbb2a452b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1be3f402d3d42c6c87ead526bf83492
SHA1355bdd34488824c40d6c773ea4490d75f58e2bef
SHA256d3b4e4df4961def8a7677147e26225739d4f660ba4e86387a9b4af3b4651356e
SHA512ae4231b12256625531486d7b5d46de9f4267def9260593dc7ce4786d81824b9cfd40ec7a6a2bd78ed811c2f784854abfad518aa8704d2be1926c4edfe30ad22c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8434f716101f77878264bd9e78c4aec
SHA1e00e2adc3482930ae3b1c2aa7593ee564ded3f90
SHA2564dbd7855d1f7a762b58e3869868260e45a8253318d75700fb923b3de42dd9f9b
SHA51225f63edecf0dc804307faa9ebd4b707c631d0f3ca5cf3afc987050e2670bf2d186dfd56c3ddf90d82bcc30a0a5cb4c8b5609c27f83209c5e88c97424fb8805bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539cf3bed9c6b02f40403d45cd6c94762
SHA1d8370ef00d4331f4c07d95e0261fcc7a7ddb987f
SHA2561449164cf13c93987e6ba29ebf28dc9e00e40db899b6272a4f8ad8dcfd81c879
SHA51248fe27dde58f85faf2982e0c86eb2e9f32ba25f44532ab4fd6e3bdeb98afba820539601e3d85d014f3debfbc548e22cc938990bee298a758d6ae4119ea997c68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5033fcab39a7e63283f734ff4b3314f60
SHA1ac3d6a08b18c539a6e6bef05dd2b0c3958865852
SHA256fcca4f1640435693eb39bcf1ec8cc12b26aba064237aa20addaaf52bd170309c
SHA512469b89a9d9cc3ef1aeae37ac226bb510fc646aa40b1e7f9fe09560e285fda0776d62aad5e6e5f1011370fef04d3c9e5ffbe160e8d279fcbf8b6ba9a931e83c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5933d0cc58470d8502fd80238c3633af1
SHA190a7932f906b68b8100a53b4aa9569a15f04e5da
SHA256ceea8774f1335f915fa8fdead93bb390ebb7b2972013cd78eff7f5c4a7f7a0d3
SHA5126001ede587bd884217f79796c6cb0f631f89711806338fd466cb78f2829d6ba74b10eb6be676d98febbef4719d47d13867eb3ec00b1fb1697d9cd5e913aa1871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5408d5d2d9a3a599f96eb001627d5e02d
SHA1d7fde4f137f724a37183186c5be1a6acddf1e271
SHA256be06b63d82c3925d83c183811cbdc928bd189f2c364b3346578d58ddef199f08
SHA5122697e7594fab67390215f81d0d35302e556782b4e08832b208b6431b7c44382c75178c7963b8b5f2795df8db0a2645664107fd021590e6fb9e49afa2de2b7d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f0e0b9f15cb80d0603809e2e24948d8
SHA13e5e8db4e2aa7abe814bf645741dac4af21c0339
SHA2569a0fa8486100d570a1968e88606be9a4f365715ff92b3aaa0f8ea2f5ce783e4c
SHA5123c9d0af10bda65f308a8e88d2d07587db6f0e48c397946e2fbe74f5ec0436bd2bf9cd9096600c86a3d1f8a0430c86a42179c0e497387dfef31d566584cfeb0ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a6a13c7921cc72d1de5875110ac2e4e
SHA13e2b91c18adfeb827d325aaca20a1c826bcaa35f
SHA2560daa389ecd87a07957680dbb771380d12b9cc23464fce0acc4f99c915641e983
SHA5124a4e82b4d0a70043f73fb8f12bdc54c33e992bee87e64a37a0041edddf11d2be8e35bfbc2a0d6e81fe737a2424f4ef5efa6f66933d1002327cf48d7242255436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ad5569ac766bc8deb08450ca40e8775
SHA1ffeb48b57f92e6aef6794257740b8723cc634447
SHA25623e5bd0c9329ee124a92fcc3ba725dc97b135d6f8f23dff33f6597ad4779a9bc
SHA512c2586bd7cc7d2d6655e13ec56efbd9455dc0a198e48aa858e9b10ccdecb24872b09d1bcd63df69fd290580d98c7fe9728fd22b686cebb65ad5b436cf96e5d05a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b