Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 01:33
Static task
static1
Behavioral task
behavioral1
Sample
72163073f7641fc3c489df733c1aa027_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
72163073f7641fc3c489df733c1aa027_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
72163073f7641fc3c489df733c1aa027_JaffaCakes118.html
-
Size
44KB
-
MD5
72163073f7641fc3c489df733c1aa027
-
SHA1
fee487ea008d88222d9ff74256722c0b8043217e
-
SHA256
7638360c1b9c50547ad1c2395afc915ba4fa045f066cc5764851e16e44fa11ec
-
SHA512
4030e5e8edfe81b2940e447aea2870134e8337d3187c9c7ca31fd7e5c922827b44ee7dda3f9814bb909f9a739860f9ee2f50c60a66f4a437b866e0ec3f69afb0
-
SSDEEP
768:rhG1mFcoUcPVJd90Ehh2cs12trg0wLWbqzLOnuCJBzFx+a0qJdtdQ+F4kI+s2Av0:rhG1mFcoUcPV390Ehh2cs12trg0wLQqW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428120211" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e1bd9dfddeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C5369D81-4AF0-11EF-B96D-66D8C57E4E43} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000ae015753ffbf9e0fa8572692a38da736ed37bd3f963ff9861d105a9f1ced81ec000000000e80000000020000200000009210ffd10ae7cec5a6493b0cc68f11269e9fb5e26bb977f85edc1f6e6c0131b620000000a68039aa5e0177fd1607f13b5b04ba23332e6c700aab8ae56af65ea4f0dc51484000000094e4b75e9511223c8ce7cafc44ddab05622bfab5a1fed41834e2e7381a5cc0ae3744ba90d1996658c6601ab56c2a6774a98d0bd79276624f59eec570814a2c2e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1420 iexplore.exe 1420 iexplore.exe 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2076 1420 iexplore.exe 30 PID 1420 wrote to memory of 2076 1420 iexplore.exe 30 PID 1420 wrote to memory of 2076 1420 iexplore.exe 30 PID 1420 wrote to memory of 2076 1420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\72163073f7641fc3c489df733c1aa027_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2d96b7f953697fd4c213ca0da201aeb
SHA190d54df944063e326d93fc2d3a2380c8094e281b
SHA256ffee2d6c770b703130a5c8297a11f29767da3e90df6d0ad73495a181cb3c6cf5
SHA51209c27f143195d335ab6f5cf3fdc21f87d56888d805e1e30fecfffa6de4c002585a1605fe661a5ee6f3259a70da9df04473beac77e1b43a5fb58cc76766c611cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5749cbea895e2f10c9670c32ccf20d579
SHA1012d4bf430923e7660ad73dffdf393191fb6bd6c
SHA256e007f7ec7e38df9b343943bbb076a70d05ec82b5448dc836b8e8c6b708a31311
SHA5128090b940c2abfb5b90e687f6c980c09c31207525bda975af89b08b349fe3c05f8e7fdd712148f9fe46d2d89e9bbd78c089b577012aca5e080debdfdd6d52cb07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a3e07f9490167117e03fac784690509
SHA19c7b77e6b92b488fe4c1145693530cb0c38027c6
SHA2566e5e6f33161a41267cc05058522773cf2f0f24c3c865e7e17ee7b139c338d2a1
SHA5124d833b916a5260cc8b171ce20ec5d70edc8e50fb4d00daffce55b22c30d57e37d650edf60b1dabe58ee546971e1ce954729f38a4fb54ee1b30fa333a8b8557e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e065d469fb16d8e43ca4422f152ec659
SHA19a21eb977bca654e9da969a09d7eb24d076e8dc2
SHA256ee0002fec22fb0d921558f25689eccffa0a6b6f2206aab4e879b8904eb54df96
SHA5128157cc3ff29ab77b5ff9188c07ebb534a4e3a878fe7a90be304b589646f8b0488a41d2fda76a23b406026f8ce1704df7511cb6e37f4864b006012dd0b0a707b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b6ecf23aaa7d9a151d612bd3d59fc1e
SHA153e7e6117793151b0899c23ad681a44e023e7c93
SHA256ae5cb6f5eb9f8c066d86124bd1851bb675057dea05a9c884361ca7ecc654a675
SHA51200a51d13426d6f8a1dd359b157d150f83b8140ea35ef99bfeaa08095cb0b90f82b6e9074e480f502ebb685042db43b5b5ae12da65f5bca714d339ccb9c932512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca956b55056e343abd8cbcc9f3dd32f0
SHA190cd6c07e895dbb28f284da20b0b2a6b8b648c74
SHA25654c6312e4bd16178dbd876a6f7ae9cff07dc4e45848799cb5d4af2319411ea42
SHA5123f107e09b19afaae9856bf2124938841ec9c0a00377f48df8126d4e5725db898664929947fc47b111cad92a5661bd97d6fe52d28a633038726d12e759bfe7215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52664a4d721ac3df79de4b4f3127327a2
SHA136ef9147060adb03b5378ae1a867a08adae6b1c6
SHA256ed874ae86ea417cb2337072a7bea8dbb10568a4ef4ba85cd60ad45dcac4b1afb
SHA512763c05c62903c26566a334ba47c611eaf0fd24f3b859dab9663379a2b6e64238c738485a4125637692f8df66c785bb6c8a2d9cd5363d8c6cd6875af2a0d91999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d46ae7ef9bd4af180b3d1bb9af42bcba
SHA1dac043ff531b7a70a42e88c1ddf0654299f3e351
SHA2562b5685eba991008e703f62b2c87145253e17f4feb82a54c859a8b8c1a70d0a81
SHA512257c474481930868895c1db0332b12835a4ebf7b6e128a3beb714594cd758ecedfd33a50af12ba1b779c36922291bb7da75df873951de0584ef72bd67cb78c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5829006837d81874facc811a1e506d45a
SHA1f975bf069793e6611127cb1127f495a54c76fbc5
SHA256b74e3c9ac497f74ddc80cee53a991f6d6d93c37a310a8b360b01f64c2499257e
SHA51222473ce04d00861901ac1009e86740cb0e976cd1c9c4e99b0dba454caec4e1f1bab47fd4eeac31af19ba8033372dc3b1c65fdd984840b11a1388670cdf70b0f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c13e41fe32b34373d6745445b7263e7a
SHA13693b3df72237c0d4b0239616f9fa1b674afcb33
SHA25643526e1eb631eb87dc3943a8605b22219ac21fec039c434bb6f15cd902d15b67
SHA5122a8466bdc9afa1693626472ed5be027e6485f22dff53d8b0b12e9bc86009f8a8f3d4508b3f69c28cded5318739c51000315994fed7e668b0e41089e534aa09a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55db5fd0fd923952a979bb28fcd221215
SHA12aacf74e9defa9fb6dbd7c37772d02ec9970d726
SHA2563383eaba41bb1e13ceb00d32439721195ca437598c9bccc8def36b2ae3ad5ceb
SHA512714b7d98fe51dab4df629fc42e2ba5fd3d659acb8bfffac9ab18ccb3c0e3c41827b864e193559b9cc816ffdd70b95067783c271e9f130ced42f3db7c16d81ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e413ce5b2cc3957cb3ef6e48c6e9c37
SHA1e3431e788755e1f3e4fadf9c6a2e57abf8fb1960
SHA256b65179a0ec0cdb4058cb5dc2b3c1ce72344de465d050c3c0143a88a6b4950b69
SHA5128a2db4553bbdbe05d8953b3225d18b12b6544367fd1a3d2d51416eb48f171b13722de2deeddf215cb2ba9b36a340f8706101a2d5a9fdb0afad4b7585fca7fff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cc95144ab5ee30376ffec2215ebf633
SHA11ee27f9a01a20d781c73ec3704420b2aceef900e
SHA256e4ad2026f14de283a140a098c28210981a40e6dcb9819175739b11110e163294
SHA512dbc1f07bedecf9fb7a455c191fa36cc2d6122af171a8d68e77417e883a0485b34e5eaab5643f08131e9def1986566a27abdd3af5eeb47f24b5ee7a1b02aff7c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51904617457f8dc07ca1cf72d586f590b
SHA143e184f27142e469dc2df42541a6ee826b0d22b6
SHA2561fb093f79f9e49d46c1b005387d79d41a32942e8907a2a8dce417ce49ea75ca6
SHA512d61373a07a154644be4fa07366e9d088b47746f50f9cee184ac58a8ff0d7acc49bb46ab31f4ea6720122692344096fa107c6051a91ff1eee89ace4ab566cb5d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ca0baa66ee3125f082e4371db1baaee
SHA1701668f510a34ae6d520a7d421c595e15cb13220
SHA256d3f5fba48477a3abe43c8a98527f0d3f4a18a9e2ff20ce6e0986a5665c342098
SHA512a4daa494c73a84e99706512de9684466b9856894ad95592981bc63f54472bac50bc54e4da615302c49c908dd65ea9eaa80f610bdc86d8143c9aa325825cc26c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c678a73a19d59fd7ecd1a2150451127
SHA1eb234ec93d64843ccbeb919d19f079302bbb8215
SHA256e4b2f75eb74e91c023d715391fa8d719327e1bfd5e7530c39db28d6e44c5f8e6
SHA512f87ff5ffc4e4a96d7265a432adb719851517a8bd5219bcdc2b083cd85af6652c1a0fbe239de94c2d51d5ceb06ed6aa2053c79f3bb50548773dc30273cf1e3678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1664432e9e214a561bf6f0b8c18fd8b
SHA1e93634a60907797a66ee70a02d85b57302f3cd28
SHA256b4e622fe83550c0dd98315371f3e893238685fe01fe05744f75dcfd08b0a81f4
SHA5127e5a83d018f6072d2786668fd810ddec6c77b3ac0ddcdb6eec1a7ef9709797c30eec647691d0b98073742713d6da1ef92eb152bf48c8b1374e4d420d25b4ef21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5479f21ce8f3f7e7b37499bd3c8f1e560
SHA142bbd64fb39472247790bbf6d1c5d9a48cfe3cf8
SHA2564ea9bd7f5df14b3ff08c7ad91816263ec9866819d3c5859577fd07e7dd48575f
SHA512a85c60d2370eec65954ffad2b64a9ffad26bf20f244b2f48dad6e4dc46a1d6a5650439dc54cc89c62b94ad07ee573d4432daf72257c20067be4be082439d18f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52054495353e617f505cc2c2e8ffb6356
SHA14e242e69d38cd0fbb8545ca1c922a4bc32b55abb
SHA25637e83b03e8bd3f12568e6ee0f2df831473e97e71873f74dac17235b24e22ea7d
SHA51218cc383ce63e7941b3bfcbb9384899885488f4be4970e526c4fc19798b9aa49a5352a2307834eb137ded7ef9399f887c0388560512abba5b5821a0b91c5c0b46
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b