Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/08/2024, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
81ed2185d942230c81aca90e399de945_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
81ed2185d942230c81aca90e399de945_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81ed2185d942230c81aca90e399de945_JaffaCakes118.html
-
Size
20KB
-
MD5
81ed2185d942230c81aca90e399de945
-
SHA1
b3ca7fe136063e5ffd149e379192c552a5bcec62
-
SHA256
82ff5d9ee26217b6d0c3f8fb3fde997bf4268596c8ce75ca5344d59cccc2bde4
-
SHA512
5fb4908f691601686dc658d1b25777046137c7cc813a92744007bdf6733dbc0b34eeaf30941bde93830bca3d87529b2298b074837ddca99f67743b73fdd43b03
-
SSDEEP
384:2QLPBQCSnWb+o8IyERagQ4pAS9qgtgcVfrXK132mW:2MPBQCSnWb+o8IhQqFbXrXK1GmW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FEBAEBD1-5052-11EF-8893-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000023a13281762f04d748db5aa3d7f86a1d16168a6dde38333942b0e48092531894000000000e8000000002000020000000523f21b2ff6448e7e8df750c64dc793c6fae2ba9606df46374f0f0c6ecb3d5f3200000003b04e48df72e772a1ba7c17a4ec048ac4da1dc630473f9a1f09f086a63f34ca340000000139761070c1bf73b31817cd252a3dfab1cf13fb697dbd4d96d4c20996e6b96d762178c6857763062e0a1af6dc2dbdc41ae312a3f002aa6e3e61b3db4a5970b80 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 001a5bd35fe4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428712153" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2096 2692 iexplore.exe 30 PID 2692 wrote to memory of 2096 2692 iexplore.exe 30 PID 2692 wrote to memory of 2096 2692 iexplore.exe 30 PID 2692 wrote to memory of 2096 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81ed2185d942230c81aca90e399de945_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9bc4c336ba5b720f45e525934080ce5
SHA18bde1016cb980a8a698f776324f37070981fe5b6
SHA256dfe79a63e001ecd3cddbcee51fc3ed7dfb45b294a3d16538d694e2457dfa5dd8
SHA51255cb8856f5c19eb55df97bcd9fbe28988775fb91b5f58f88c589958afcdeeb30e366f98936dde23bf0322630e175e2b4060d4716a10f0cc385c8dfab3379fef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee05be1b4db4bea3cf6992c9a932b079
SHA116d7088ad29884c14570a1552520153e025a2edb
SHA256050e7dc3fc8b5077fedd37d5b851411817946fc026bc21c1489d2381d22c195d
SHA51254a67f1fe7b569a961963e00b903fc127c2ee4db7abf475b7bdfdb39314f74ff670a45f5d16c6cf7d4d15fd23c412748852ab07bd17244b735a1ee80ab2a8695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3df6e7f0e6ce44fc1bdb453fa700d39
SHA1bba4c37d5fcd90852797b65797b9aa04e35b759e
SHA256ecc17b762263196c947a375e0933f792789eda22db7edfc63992359b659c0eed
SHA5129b93c1460b7c80f702949554e99ba46d9b40aa2870dfd3243acec2bc81ddf6573c41e9c52874993ec6ef6c58ae73c23490eedbc33089a68963253b8b68d8e0fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531cfb018aad95c91b6bc76d753b7f290
SHA1a989a7ca40f7a31c26c20c298e6642f23e6fcfe3
SHA2565f30d6f93546b280f543bda161168caee4bbbf885bcee2ac7ffbf1122462cebb
SHA512382ebd3ac568a10f8628f3e440ba65048272b0ef3f0a422eed4613febcfd4fc39f91da4bc7711483115469ac3f26551bd82c1ade04fffabe6fffbe8bea55cb3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528526107fa0d524a451247f5a2814000
SHA1862e33c3968b549b0647fe674f17bd0295a7cbf4
SHA25690722bf8ece0a236ac33939a2221110fdccd5d0256aaf1d3cf20b5422e4e5c30
SHA512a55602da8f7e3b6c07afd93df8edb063f0216ff4778375725e905eb15fc1d916fd3db5d87afe26459d6fc60bfb36b137beb119e9687a24b9f9e40b84b0f7d158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8b66b483b4eb3cc0d73cba8a5f14b80
SHA1b2f10815d0230e46a7a9416e71e2a4819230e613
SHA2564794e1393470b92582c19d5597bff85e02355bf365b12432248dd734b482c848
SHA512fe3575255cbb31451907483c9e2395ae089b2f8719e0ed9dc2697bec9443ce135305e528949e97359b73ff82a089192ff81e1f21a5b323b2e8b1dd802d89cfb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504c32f7cbc6016d5360ba93dbf74fb18
SHA16dfef18482ab445ba69aeb1c8f840bd03d428f97
SHA2560aa19bf038e38dbe850455026e4114ea4b0c89e451095be6c564393863b32c94
SHA512509e2fce13156c23825d0f0d3a77fc96426f4fe5e0cb7f3b3340dbec518ce1ab141d12675e302ecd3a6a849047a6b3c4a4806f409bb46ccd6f887468391d3a56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc657a3c0b28eb23d055d2eb89e46595
SHA1550b3e81296eed7f1cfff8a298dfa09486d870ef
SHA25656ef77d91a2d56385e41abea2a37bc2fcd1b66b9bd94f4864f5265ada3dab66b
SHA512a87436b2178d35a861d07eff11b90015324a2f9ce0dce29fcaac169f868d909012f6951e48fed7ec2974b29cdd08d069f0c3a32aaff04afecb46a875a1c67a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5708970331928a2d4d0c59ad79ee9a9bb
SHA1691cf93195717f146ebcd245e99399d6842bf514
SHA256ddcff2558b6d3bf816baa431268a5024d2d45323dadc95a8a190ea1b6ffdf4ac
SHA51241d8c0af9c5f5bcb385af3903b3d7f0892b490e0a01ce111c6b0a3625a01c78e3d214efd14900527d5169fe8fc32b4481537bd2c30699f6d1c52e3cb51e91d91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b24e1b4b8c9deaccfce1a3c5347123f
SHA1d6a791e008e25fecf8801bd36e30954cbc93d332
SHA256b1a8de370b4c69e9abaef9b76b65662a4650572483a77f61e9c39527d659d7e7
SHA51204a195927d74d4c94059ea134655c66d0948d80f00478e5e52067cb294f3a4dd494712666d58ba0249dafebc662643219c02eda7e47f60ab5244939951f3f873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9f7530fd3863540c71883be85c0668a
SHA10f876e18dc7dc76881ce7ce2a73f7a8d71c481c2
SHA25655c03bcdfa0a3ae0ae7e6aefc272d08a133e8b567710ea465669efaec127b99f
SHA512ddf59e72ddc0a725a661e89bec5cb6f7ca8c632563bfd5d484de021c3ffe3eb6aec93f1034170db23e68b6c96b34e2e00feebf3de64b27f46b17e8fd86765833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559a991d5c95461ed85d80f3fdd9aadd8
SHA1b973d6aadb6917923ae59bcf2e7d72b0ca232bb1
SHA25634d8fe7cd66f378e19e711fdea4a3fcfeafbf47e5840771da307ff19751a4be2
SHA51231eb000f43145a3865e6ecf90880ff8aa0f7395962986bda0cb5d3fe3aaac4ec009637bc67c1510ba5d107f28539da55857de4ae06d8fb8a9a1f7694f487fc1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595b99bcf949ce93c0ef95d44cb583bb0
SHA13ab448f47b1a8cf6cf075d613743308ed4dd3e2d
SHA256fda300e117523d6e37da9db86a633a021907cf5bdc982cc41d226a1e216d4aab
SHA5127aa96861d3fb56c6869ff2f17bab96cff3784041ffae5f9dbcae1fbb83cc876fbfaabe6df3f7c886ee6c738a83ae8e35fa2d61f9be38cb87f0fd97d6e6874c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588dafe211a7e3a4256aa110cdf398a00
SHA16ace304fc81535285de7100d9d6c137b68938dc7
SHA256241c7a41c3a3e79c420cb956bc7713328ed416087fc528d2c4f5f941cac51445
SHA512cf07786c166dee7d38a4068015d41d8c762755ec1e46811ef380a47f403820741dacd39bd180a092249e71e90f14d64b69fea2f89e38fc9dc7d9189e649b9fcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a64f01cdc3f9ea98a9e124de9f32852
SHA144900d625ac21c418e38b5bf86631005a902bd4f
SHA2563877cfea73d7139cbc3b75bc9cc3f054eec4c0c620ebf14ab422489ee7666b32
SHA512f09203704aa21bdce69e26129df1e79f7b65d037f72cfc9f9d3e796402b5f2a6531bdab3bf7edee21ef365a74ef384d06943145b8202bd20e98f09c8d209355d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6f44746228a8df7d35700e3945e4fd4
SHA1c31de0c18896b27388476c5cb547af19924932c2
SHA25629b3989ab846a77b8bed7ddfdaaf9a0e257593ac7ed38949de6ef01727cb84a1
SHA51254ee58726cd37c62190dd70352832d7afd9741b862f971fdad1f8f6f9146f45dafdf7ea89258cd9b9ad0d0c8c6d70361b1648401bc04d7b36132bb4dedfebfb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5491daf2b3a606795bc58299d2fcb6457
SHA136dc0d945392765ec4ee3e259c93cfa711c9c7e5
SHA25688a759ddbdca985eb3cde876d84ef487305624d6f23100b88d8bd5ab1666d7f7
SHA5129b5af6fdbeb04334a175d87996f47c28edb9ec6cfb567cc862b7800ce77cc1a06e28438894b641799ddca86fd182af9fe8376bc50088abf9f941f64f8e73ddac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570b4fd19920ecea694bd3891ae35ca45
SHA19a355d574cd7fe2079212018f310ac248b7e0bd3
SHA2569662f9647c04885cbc5bac526961d99c9cf6ae31d6b54c8fe19484b34955f159
SHA5127107ab723ae3d78b5cf2b897bcdd78ea66719ab682b136200f2d6be38b50ed58d2388ad6f92f7f5688e229ffeb9538d6003efbc2453f2fe84878b021eb0225a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571fca4d61bd81425013fc65e270069c0
SHA1317485179c1118a6fad08feb0725fdce814d40fa
SHA2563820abcb1294f980383602c31bc3dd16266b8706c27e3852e616692f500743b6
SHA512661f8e3f05335d370c2442e9fecb47e0a4b0836f1afe160021d5916302213a6e5a3b0646c4a1856699d69abca84f7d2317d3387565ee375d24e4856a0191be70
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b