Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 05:42
Static task
static1
Behavioral task
behavioral1
Sample
72cb0d81b41a53bdd44e33922a048312_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
72cb0d81b41a53bdd44e33922a048312_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
72cb0d81b41a53bdd44e33922a048312_JaffaCakes118.html
-
Size
18KB
-
MD5
72cb0d81b41a53bdd44e33922a048312
-
SHA1
905d3b1d9b83a472dea0f49e821b16f0c09b7076
-
SHA256
41c832e09ee2e74c9e70690118c342005db1452442b6c88d09caf9092fffad4c
-
SHA512
8e71e985ce7978087bb1e8bca2c0d33acd174521688ee2e4960f9f699ecae4787ef6d9ca85b7904003180ed375775f69a63f8670f04098300784eff1c104667f
-
SSDEEP
192:eV1hh5jcncyFQbHQa9XGkyH9iQzTp8fEIs7hZm+KSaOek1vpEBnrQ5iOqsFJzODT:+1cnx8n9Wb9C0hg+KSte2vpEtAJSi2V
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "25" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000011b6f366feab75888299a5e317222f685e12426f8e3ffcf33e0ca89667c1203f000000000e80000000020000200000005d33d166f21fbeba1733805e49efd74889110f67ff975f0bde51549234748f1520000000d372370b97c34f559978b855dea12d10e61ae0da40220ef5d17f2474dbf5091140000000a4d68cb4a1d4701b56ca3ca11339934028e15d8dee7e0981a198dd015c62c8cb75b7289640454309c88f335d5371e5b73a604b220d3bb4cbd06624bb72438dd3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "25" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428134472" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F67C8E61-4B11-11EF-B49E-DEC97E11E4FF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "25" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0af05f31edfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1956 iexplore.exe 1956 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 3008 1956 iexplore.exe 30 PID 1956 wrote to memory of 3008 1956 iexplore.exe 30 PID 1956 wrote to memory of 3008 1956 iexplore.exe 30 PID 1956 wrote to memory of 3008 1956 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\72cb0d81b41a53bdd44e33922a048312_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5915a20a09526f8ab3629f12ef809f261
SHA1d91f9992beddd14bd32533cab1e8255d36f46a2f
SHA2565ad71f19fcd8959a9c1f5ee55ab3cd04c4d494fe1995ba557b417c3669c68f09
SHA5122851171b502fde9ac9b47b4e3aa838d4038651cf521bc3237a14698cfa4f92972286b5dbd9c37d29ff49a659219ee27295752aa79fbb0d9ad10a034cfd47d6f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5618d4a107a83d7e8e099326036f93857
SHA1faf77a84e0c5d05c4093f18716d0f81a777e80ad
SHA25642b62fbfc5803e82b06090b291d3bfdc388b88e8d314cb2d8e4b00d79b37c1b4
SHA5121bc98d065227bcd6076777b74650ab82c61b3751313129e072e387e8b52751a559b301a3a19317288e87bf20b0fa3c890570b6ea6c518c2c71219b135b8be140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cd2a224a2f7d058d311ed838fbd423c
SHA17d754b22c45b5f9aaab5485dda9f5eae8eb52fd5
SHA2564ed9e00cbc184dadbccd0dd65ed1d8e5b9985c36c78a75dcf59fec77df6d3582
SHA5122b21a73902f1dcf0b95ea66084e178279c70f639f0ce240d441c15467dbecefc141beedc670af035923e15a22f844915103bade9711f8ffc221805265208aa29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ac034a786dda43051d873498d8baa70
SHA190de99f2956c6dc51c8bf52574191837622d6947
SHA25625334726c9e301c3da205c5cfdfea8d88c1bb3528260e8436bbdcb0f03f72811
SHA512144b5c301b1291483e527fb12d15ca555da70597de6fb33e147e55bd838409428310a1c1f83faed9a5079f665d0f85cec6572797b370b374c6fe63f338645133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568aaa0180b8d040f622e8511a051f1ac
SHA1127987f9616242d551e2ed9d3f08adb376ff9e5b
SHA2562fb23ca8158258256ed7200b422d207584eb0bf1a3c1dcd11c11500b125cda7f
SHA51297eaea2e25870127a862c43e54d991bad40c478828f7a966221f34886d33e2d2de8661aec1391970ac580d28baf3e83e8ef5a2985994aff3fc9d71f668246059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57543b4f7824626ed1e4e2fbb14962131
SHA1f8fc1f8d97ed390c6f6c13d2d718f9e9cfd8bac3
SHA25633094343319ba7f3219e28db506a7c38182d0b9377b1291798c3ce3cd8afb509
SHA512d0b04f5a7d3ce789bd1d976d6949b147e2289a38acbd44662e5ab4770923aa4110b827896108c38edeea221a26683c1057ab54627b249b3d9befe98417b2eab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c9f06a2c5196e5261a3350ca5b67170
SHA18d38ea4e44f81b74c59c6a50f3d5665104c5140e
SHA256f2d263ac8b549754b2c7ae852900c67086634fc13dc20e3926862f44c46438c3
SHA51210d934a2665b90cfafa44a553e5be20be6b13a756a7da6ad7e88292fa3a50b51ac351934534412ae9c161953c9fe678312ae0a6ec6e3722fc83aee4f18a70293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea555946f11c68d63bd306f7c41e0a46
SHA1aa3675655beb61458bca94ce00c912cbe0adefb7
SHA2561ec980e1480f2a22526df46fcd8a4109449ea49109f7d7e4a6c283578fe965f0
SHA512326238103025ce9d23b9bd8b487a28d01ff663df8f1884b2fe81a82cdaa4e8cd01806b92409dcd9af03d0e1046f14670afd76a9af194a76ae7b3196bbfbf8c18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf3f09428ba2520b428040070b688376
SHA1777d33e19242d149c1cf21b77e0c65870932006c
SHA256a76950c881ab572feb39e06eac30f35dfd7f7aca0a51d9af1525030a0d038613
SHA512dd1c10aa87b9dd5b96469c551f5327541fe6b5bd5ca44a2ea430b8821ab68925ab8ec87be400d3033243ecceddc59f93da3657438b46935a3f92bf9b6701807a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab819c8519afcc40ad86f8b114907a58
SHA10078f4e872bdcc5640ae7763dbad0f5d94e56caf
SHA25623d28040942a655f451ff418ebcc572d1b67c839395f025fc1ef8be94e079124
SHA51275c5355cd7619e3f828d1463eabc7c5be791c7496faa18c459ebe335600af63d9b5b7fcf90faf2cf8e4b19a0c23738a9d81b6c87ce8863fc557d5a539e4fc323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD551af73aaf8ea0c772685ab566ee11dd0
SHA1ec8e98be8b115991013b09544a1956029c1c0555
SHA2563314de567c10321be02f14351b913cdd540faa6bef0d8dd30d826d41c8bbf60a
SHA512d5be4fa90b5a97ba99d8278f5739c0af53db67f235d065eb922940fd8959609504436f56c913c21debc5eba7e8b8247c4a7b82ee8c9f6d1ebe5a7b733da99796
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3H1FOMV1\styles__ltr[1].css
Filesize55KB
MD54adccf70587477c74e2fcd636e4ec895
SHA1af63034901c98e2d93faa7737f9c8f52e302d88b
SHA2560e04cd9eec042868e190cbdabf2f8f0c7172dcc54ab87eb616eca14258307b4d
SHA512d3f071c0a0aa7f2d3b8e584c67d4a1adf1a9a99595cffc204bf43b99f5b19c4b98cec8b31e65a46c01509fc7af8787bd7839299a683d028e388fdc4ded678cb3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X761FPIN\recaptcha__en[1].js
Filesize531KB
MD52ea96f82197c227ad3d999f6a6fcf54d
SHA1dc1499948a1822d16cab150eaee16f4ab8c028d8
SHA256e1d667d61bb50e0a815101a7d0d7f379b7219776fee856eedbe965a049db8d44
SHA512dafee1d415487b796e02ef295073382aac48ac76e90c749028a9241bd44ec04ec2ee34163b8177f94d01e9e9d87577ec34c18d780a9f17b80923106d992749a9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b