Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
98s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01/08/2024, 21:40
Static task
static1
Behavioral task
behavioral1
Sample
81d3172cbfbe2e75b4581206b4e43523_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
81d3172cbfbe2e75b4581206b4e43523_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81d3172cbfbe2e75b4581206b4e43523_JaffaCakes118.html
-
Size
10KB
-
MD5
81d3172cbfbe2e75b4581206b4e43523
-
SHA1
d9ac33fe6df8a17ac4fc21dbdf7638f9fb3523d8
-
SHA256
9787c0a78d8180bfaa566ed2e710d1a1ce9f6f54bd98c2f839d1982923d10e22
-
SHA512
c09ee0edbd5ed7944fee548f118f20e680b9c02ba0ae334bfd7ae4dc5d64404939dc7589580e6964aab8c02677129c41f496a45e6a7756adf0a8a21f3f38b45b
-
SSDEEP
192:2V4lIsr03F28k/w1wvqVkZiBqxnQviYbk01SZauBuLbdU8d:s4lIcuFG/gYiBqxnQviYbk0kaguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2072f7ae5be4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428710307" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000005c5393f612b8e6390194cb779e45f84834a72aae52dc861e4cba66558e7daab3000000000e8000000002000020000000d2b2ac0d666106c1006304d689b4ca4f76160934feac3e01124ecffddcd5dbc420000000c9e0de7d7763acd81eac7814a5c89424470304726cac3861be45932e70d8951a4000000004714a361fff0f77eee4901b5a0157f409e85e76ac04c1067a4b93d9098b7580f8954e4f2ff824a57eb0149799f8f3bc6ecccc8e470fafe1411b5a79315e29ea iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B1DC0B91-504E-11EF-8B64-E6B33176B75A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2744 iexplore.exe 2744 iexplore.exe 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2152 2744 iexplore.exe 30 PID 2744 wrote to memory of 2152 2744 iexplore.exe 30 PID 2744 wrote to memory of 2152 2744 iexplore.exe 30 PID 2744 wrote to memory of 2152 2744 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81d3172cbfbe2e75b4581206b4e43523_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5229a219db6da66e0a55e9de6e490dbba
SHA113642d2c880dc823d4313731bcd71d27bd8a034b
SHA2561103a25fe41b473563fa36b47993a8db32f7f488afa49258f1ef8051a7cb79f5
SHA5123e9eddc0581f993e49c78ae4b9351b84fe1146234734d78acf20c48fb9399f6173685625f793bc6f0c36b8bdf923546111f0aa5a4a0ba1ef41db810b396e6fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3f6ae256247c3497cd8d8402e34e916
SHA16db765c18415e0c6f67d7c56f94f515ecc0613b6
SHA256dbd3feaf192e9319c96c05c5b092002f855034248dd34750e4e22a717eb3fe35
SHA51262b651aee9f2f2daf8540ab1aee4c9c9c4bdf0ccdd4e01611d3092673cd142362bb7f704b41d6dd332906e6e30f6ed6fb2b36309557b0eddca1b0a9c65096267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f609374f176f562901a6a8d69144c66
SHA10a741d12b8187d926eda296769129de4b5877307
SHA256e0b61301d85b76b1e1961b47e678805231d58ff76adc427261469730d0e66aa1
SHA51296021a4863a80d6763c5e73930544dfecdf21515c0287d3e26480ca6d1b403eea8da95454d487bf09e0d64b701f3b4b06ee594c309810720de7cc79d9f30d4a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51debaedc22c9f1e90c810f633c9efcea
SHA1bc89df8b120b0780f4babb10c8ff9e61884555f2
SHA25667e562b2efc4228c08fb4c4a2a90fd6db00977d24dcaa043f95c3cc84e67e4c1
SHA512653569e2a11e86946c409cbd832b3f032409ff8da747ef1d7b8d258e34db76ed55c49ef59da0985b3ad38106e258672f8c0004e82498f43ea10d6963e0b550f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5863136d607c03865292294aaa335f208
SHA10c027e6f4d47b4865f8ae552ef6903a819279361
SHA2565d2e1555525d1edd900de10e1c17b034c1222fe177a24c26043ced7adf762b09
SHA512148785da81da0ab7492345ab8c6a8e0957fbaa6143a947b6c86609b737b34e05a38b377564c04c674a1b952992f8cbb9b52c3c2fd7441f457f3470110af2ed71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562fa91f0080eec22ea3a24b3930484a9
SHA142be19a75d3ffaff9d0e1b28f303576066247f65
SHA256f0c50a1428ad44696def2581691a0bfc61f79f96a7787708766620b3e2513cb1
SHA51211988425b4afd7879528d96d1b91c30593164c5140266cec96a8025a5e660ac33445c42f4d9a4733a2573139cfdd6d5a465ff5b27a3bcc0432b88bd787c87227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560a800eadedb2d957cf14ec858b9370a
SHA1e47d6d83c5be81f43f0457eef91e4be667de8f45
SHA2566237b32285f310e25fe9e712bf36d6e08889d978fc408206b764f7cce80b4276
SHA5126a1808c8b855cbe876c2c7525cc0b4b3b264889cec98fef6aa9697ebc1b439eb4486e2f4922b334fd3269e01e2a3619c248cf67f108f3a8cae7e0574bf5cb54c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5970984932dcf19baa4eb3429645a6ab0
SHA11687869ae5053b7259d12bb978f242ff2bca0253
SHA256ac93f4d2d8f2cc54c06ae32f287c77dda9e4e5275b668459edb4446a9109b626
SHA512db5e72e1bc8121dc002c04aa3b0fd8d59aebd04b948f29ed80c2d824693b5d27735881a8f054b6cfedaf4b9b86f67114f694ca3a53bc644090562797b81408d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578b737e27420e24be47585d9e8e8f943
SHA1d05a02e0826e026a8a46af649712b4d9670333f6
SHA256a85132b1ecf49b5c935d59ecd39a3a65f8140e54cc13623069fe9f1d2cf6b975
SHA5124618000f4f52ef0e548cafda9556db974afb6f4e570179a95f01c54f7c3f3e28889de946040b0cadc0b7dfa5dda2cedd94040e99497ddd7d335d65dae9e94385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0e1f97bc6b68a45b4d8f8f6ca542e9b
SHA1dc01cb0c2ffcd801a9cef38e8766fe4e706e5184
SHA2568673869eca3619fa3505d210e12ce304f693f4c77daeb811d0eb7fe62f23b971
SHA5124f0801bf8eab866c8c133707e5a57a2d18a065637ce94fa98bb753e53f84fd3b66fb6ebc66bf13a341f58ffa4308927e472bd899b2b03f2b7d676958667ca02b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd9acadababc404680a6110236a1666b
SHA13b70088c6ace965a17b5e1067ad1e09ce5614b1a
SHA2567642b37be50a74f4b8f1c4ee4f8bad52b208172454098f1ec6ca639c507bd21a
SHA512d1a796a5ac9169954414b2a6b3d679e90c1b1ec67f4d378ed1c4eb513112ecf836d2b3cb8eb5b8e1c5d2d8c75d70eb43bee00987df61bda55f16be4c8ff8c82d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c25975d218c3b72219faf798403f57c4
SHA123f4e6ddcff707342ec45294ac1f5a9844509b04
SHA2567243af9ca02229fbbdb88ba156006f6763e6473ba15677bdd9ab3b05eac2a2af
SHA512defe6d7f6030a0ed3fd67cda87d4fa0fe035a0f01c19380b07d408864f4c6f9050551496f6929ee2cef411b78aa3509e1e56c9aafe847f22f275e9ca74d5c645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f173d43bc5d1ccbe8bc6f7190f44f5b
SHA111263153082c68b6d6f9a91f11b4b424c52f5258
SHA256a0291c8139398908e7308cdda5cfb367b2b1e4899bceb520cd6df51434d956f1
SHA512b6558b1025756c5ac457c1f2c7ed54e2ee6264c51e4a769fb1a3ff14c4d449d0391aaf151fe3e4f80631b2e6057c00189e2089c9c10eb79787c5fa520fd7916d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aebad691fc911224d4ba0b20d1f9b20
SHA1880ba0fff2979bfbcf69c8654435e8181df12ebf
SHA2562c2a03551d017b43f8010268035cf14d15cbe68f72ee96b208928220885f87c4
SHA512eb68db9299ffafc6efd80c5329ff5ea93316a0772472be308db053fc70e98b1aef4e0d56e4b226c3dea891b66f43eaa5b8f3869aea01191456c23be62a482b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abbda1d7d42f34908fc3fa70891f84c1
SHA1a209a87fd827e508d846599df8bb1977c54b1e05
SHA256deee8ed5cb3393d1b21ff60779f532191d6518a29ef83be7608b5ebccffc4a86
SHA512e764cb5cebd1730c882abd08a7a6536aacb22d801cd8d890889329d45cda53c718e2f0f1e20607304e8818b7e15b6d84b06ba3936dd6773d0876bfd6a1cb059a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8c4415ac0607c312a0495c339798293
SHA11bddb0cc3e01e0638c0f8491d4d933568c141db2
SHA256bf7fe895389d8dc654540dd015b0f952b0ca24c2ee0efd4846384b45348c7cc2
SHA512be206473b0996f238f7d64fca7f2a976fb93d5b58eae52aee879bf94b984a2e5eea2d8ea356e5a956d1ee60421962e4dd72f1869b20946deddc34bf2f0cd8a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d238fd4ce213bb2c02a225c217073d05
SHA1b68f1574a6dc9ffcc4cdb3ea09361a580c799492
SHA256967502f8cb9d2afc652477c085dfcc0562b5e09d042988323cba54d85dcdb4c0
SHA5128600adbd7ed7d57885fc329c892a687cf86492258b6727ac6590e0e3494b4b4f604e7400df6a7e8d24561e5458106079208f02e550c7e29405236ec5568107b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ff95dfd267121e17ae4eac80cca96f3
SHA183dbc351163e73a1165ce13e929b9e70313fe429
SHA25611e189546ef33d10bed3b90de74ba39353a30ec5736fa1dd19949934dbbae1eb
SHA512a48b91ee97597b0297bc84902b94fa923b6205ac6752192e27eb9618e4a41afbd1daf589f241c27c149e79cc8d3ed74849264ce6928fe2f9e7b7ae3c042a2c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587b623a752213ef28831585980fe8bf8
SHA11a1c5acef6156f29f41dd78f833579a3bf763129
SHA256d0ba2fd6c63ddcf28a05d3aa9ad24b52473e59ebb175705f15071c96217a3a04
SHA5127e2a8dd3ed56602a1898963fff9af4d003af0e7104447a04d35462681c959a7918f1935dba6db9af003be15727b235203b687baf9c06917f1a06ffd414111d91
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b