Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/08/2024, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
82190dada2f253e8963c8918da00297f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
82190dada2f253e8963c8918da00297f_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
82190dada2f253e8963c8918da00297f_JaffaCakes118.html
-
Size
7KB
-
MD5
82190dada2f253e8963c8918da00297f
-
SHA1
56bf580acd8ceae114751c0d7bd52f2f00f2a16b
-
SHA256
441455777a765cd31a87519ffbbe8e106f2612f97843db3b01e082cbd1203547
-
SHA512
04561e5757965b352ed8a9bc73d2518235d11bea611f684cac755224e523310cebc8e387a6af0c82979556517a259f825a77530dfccbb5de949420a391251cb1
-
SSDEEP
192:ckRcajt98jvi8pFJjM+VC3YpME5T1z35X3YuoD1kNTHZ6VOj4rz9K14dUBLcb:ck6Ot9WFNfVnpHBRJYb1sHdoUSGGb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{42AFDB91-505B-11EF-9AE5-CA26F3F7E98A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000f49293969870ecf8b03621f84ec26fae98659a6fa752edeb926f7846f554348d000000000e80000000020000200000001852272e54411f1624ba0792dbf63ee7b89a442a40c49f9373f2d2135657cba02000000095a7eb54cbee1b8b48ab41b6bbf02a93d91916bc53fb5fcc69bdeb0cf9d534484000000036a80cb624aaa9c0b3dda9f2690ec0ff673b3c493f69332cfa7d4f4694f97569c8c41f8f601da5d46826d491f44545c9e256334cb33784641a0387789c1e0335 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b001b31768e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428715703" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1892 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1892 iexplore.exe 1892 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1892 wrote to memory of 2808 1892 iexplore.exe 30 PID 1892 wrote to memory of 2808 1892 iexplore.exe 30 PID 1892 wrote to memory of 2808 1892 iexplore.exe 30 PID 1892 wrote to memory of 2808 1892 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\82190dada2f253e8963c8918da00297f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1892 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528a33ad90a057a6f1a524e603d18b52d
SHA1ca05716bc492d08cbad448b2977e0c0818f96cb7
SHA256d2f7944046d740ead134252421b842ec62b499de5638623baa407b7faac7d5f0
SHA51232e11437d0c693f3e5deb539491d210b0527697bc67dc32840e1eaefbe35280a7131422ebe2d1bdddb185d29d189ef3ba2875a4e46dee739298c28acc0e49de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c41980103b85106cfd19b5824ceb1270
SHA17f8dae6a2981ba0da87aba2a84a41d1f2dda2335
SHA2569f01b94b871718b63bcb5e133f6e864c5464b78c4e1a5bb5465b379aea9ae4b7
SHA512c303fc0d0261b14b9bebb392eb187374166dde1b2558f44ca47d7fdc799c3d1ef6389974a640a092897c75c1b7d143feef3f97b08dcbb4d85f4eb7646904f1a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507787da593a61c53cb653d4f0684e5d6
SHA184fc23b1861a015e50cc5aed08a594809fb3f295
SHA25622a2654311c253dd9d665af0bb75a1ab69d6c7100c213df9ca1e5fbeef230f2b
SHA51210665a9daa26fc37b2b718f6f7a8004b71c72242a703575d04cee77839f52d0d0cdaaef7fbd83d27470a389569cb5a6ac9507a0d46eb9507b3f56d9c4b1b3fff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ecf3fda21c627cf29d7be42314152a0
SHA16ca0ec3276e1bddd5873ae1ca89f3250c5517fa8
SHA25617ee981dda8ae4aee4d63b461fd52c439ad442ac0b8d3a88bf5e44b86c28743f
SHA512a3d8cc74cef6878c98d405734a80863b1fed0822a49b481091f6050f60b00b58c6bd76260b20c7fabe8968de55477bcd873c7000c33e5067b8a384805f5c2979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3a41fbf78d69f2f6713bfa28386363f
SHA1a8d5c586ddfb309bcfe81f9dc1d28e4ea31743d8
SHA25626842ae4402713f6f33d5a67517dd9cacdd23f3ec944f3891b626eb5e18b338f
SHA51218c46188567bdbedb348d18b04c89056e7919f013a54cd97d8af9f146b6fb1759582daaa1271384c0ca6d3fcbcf97aa538b5743c22582a67524b5f897f03d7eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580eb275b3ef9734f8d63d67aac11feff
SHA1a9733041878dabcf52407edc42f52313e7448c20
SHA256ddd739d83a2aec72f5c5b8a64434e547579bffb845d76ca364f7d619cab8917e
SHA51243d37914487cca3ce6488461cf700b19627a6171d8b3cdabadda60027b12c41d562325e5705eb738891133cea1ae237ec08b9386b9cb3a3b4812b48bb5f5caf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ad4074568cb991f8fa3bdefd1c30f2e
SHA1cacbfc53dab85ea240830b1e3eee15faad92c843
SHA2560f65ababcabd1b06a127f65467dbc35a596cf740957db4b7fb38ae73f8b726ac
SHA512069ef24fac10468692c5d926c7dd50e3294d14d4614f6c25fcf5eabc41435af5ed3dd44703a38ff18f76074ef45e19454acf3af2504d92abfda9b0f5c0c743f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f782f6157d553fb203f2fb43cdfe1a48
SHA1a45cd9f7b4bedeec201495bdf48fee2ccd670e96
SHA256fc846838fd52a7e97afa3a018cc293817db612307cdeede69b4eec0d662948a3
SHA512a060b289d42bf7cd973c2b36b99b4d9daaed9a9171b0499fe55bd5957a680e66b4709d98c07123c2ea5e37eeaa24d1a8f6da7762876d62fc0e3c438a2638491a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a5214be3d2bfd00cb69f802d4820c63
SHA1d5251a71c5d950190f779be656eb0b044c9b6baa
SHA2564257ee1333bd9e68b3efe36a73a3b91e9ec76badac2af689a342ac69457a84c9
SHA51258eaccb53ab00b8bc4837077f18adc4d9fa3036c8ab63cb7ab42207d4ac1de66bbce2b8699149a973bd84aae6b0fab0a5827ab65a9e1456eed21c90886156399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518c18d6ca8c024de88a57fffefb4af53
SHA12435a1e85355e95ed16444ea336aec3b20762720
SHA2561aa7d36cecc2325ba416b5138ff0610da9e5fd5405f70b327a5473bff8738193
SHA512be9a00237c12f284b7fdea3e2de480b491c0ef0aaf68da6333b08d1ad4ef659e2a7686a3c26d7a205ea7de62f259c67ac3b085dcb5cf24b1898a53d1696d2ed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf9300928c86b298a4ec78e2371976ab
SHA1fa2b1cb817ea13bd35342e782a58b2011f9b3622
SHA25662c498de2197da56d2957410e6c7568b5fa4efd0b6904e11a7e38dd6130df0ec
SHA5120bca60a425cb91b7c616038e628598f14c82c99069e3ba5fd3aee30f098f34946c431445a75d608e9c93adc7597cc26dfea69c8929b46a7deec1a341419202d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56483953a5f7442e7ea2ded1af11d21a1
SHA11c8fc360ddc56c2185086ab311273a3c0f4d10e5
SHA2569f531eaae6590995232a32c91e531554e115a1a666692a24d6719d86bfb9462d
SHA512501346b31344f0646ec0b820d3fd57cb14b6145fe15a6074aa45ec0b521f82604fe1167e709ebad595a0a88c603d06309d1bc4752a529733da363d22079d0b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520a81def29ce2b9536138724491781a3
SHA1e3d1409b47f5ac9bc531aea23509b494234d673e
SHA256cacd5611fc62090c47ff08a44dc941557719567091e2832545b59070829486c1
SHA512c517e7865762b51d1be5d4730c3696211f4072438c960b3f01f0937fa11653ea2c217573c29913f6d371523df4edbf309f84f5b18686d4300a1110468b7dbc34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f3e145d7eb626f129dadf09c267acb6
SHA1796add6fd3c6ffff88d799f59ba36af183ff25c7
SHA25654f4566ad2e73a2982f0c2ff854b952dd54ecda36eb7b8b1bdacd6002cf19303
SHA5121b3320463868b2780226dcbc0f0b4aed8378e9bd6b66d85ae41d75220ae5ab30689b6a3098ff91a42b42e37ec9d69d2c0ef19dd6e9a32be1fdad9ff3bb7ec3c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c5393f1ae5389fe73809df71a877a73
SHA147a395604f095bb8bbeeadd6d67c9fac54ad646d
SHA25630e5a291487f1bb95145fa21a98850c493240617fefb2e89a1951d776d6c4b7b
SHA512f70f30d8e6cbc0264197944f9e5b684a0d6ba497e6db8f9031910712de8883cada8af97208f2e4271ef1030c536d6296af8d729e4554a14525fab2888e57e4ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ff8a92bc92ca3e09690ceec25b4ff45
SHA1efde75d7cf12af2fa0a9b8a978998e01ce15ef9e
SHA2560347b0f12acc7bb2e394e4eeca2e4f979a58c9c7ad10ec359931e60bab1ca5da
SHA512d9edba8e1c611a32307d86c8da5e4a11c7d8b5205b2c7cd83cec10c0c55408e7b4bdeed8cde47b1ed18c51db114bed916b08a97f6b4a9c939a666e7ac2aff50f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5607be7f99ec35516a4ad5439c4680746
SHA1e94151944673959f39f77221b0ab9102395c4995
SHA256c21df6db6ad83d3d957e87869ef60653897ed7f3b583869bd9dff967430e9a41
SHA512d47d2c511c13eccd6a4ebc0815d02f0f87de4a17dde8011dfd971580838b2f1b5f451de9182ee1f09ea4717cb643874ccb408d5345318f223d7af0b184002403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad2302c354141101a72d143f168b7392
SHA11cf36fe1a05733c23a9bc7ebc85cd1dc085659e9
SHA256531e6e8226b576efdaca4b12b15f07af7850d108cd102b971d21f948c71f66c0
SHA512218d19b3908bf816a16b6072840d287397471787bf73addda553113aedab3f9b564fcab7d82de67c823c2de3d50b31371502d94727a6b7110450117a48665b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beac684b3473ad183a87d74f94ddc4a2
SHA1f7387854a6d6b83cf6c138b893ab93923f007b06
SHA25638729ec794c32e07e7e541426cc74b542ffa2f42d4470d11bb3c1e39e24992d5
SHA512749deffbb4ca42bd740b79c445f18de7373244dfb83df49be6489f48733a6cf053ad12f446d9f549dc4b1c03b70510d69e482fc5bd8d6f04a869784d3157ecca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c589d0591fc68403c09d87de4df2ad73
SHA1839f12c30a773908c6aba2341ecc03064f4aedfc
SHA25679fa3b34401396b30744aa259fdb00c2359fdddf2b28107f4aba4fce7d73c202
SHA512aeb37e28cc41c94ee2a4cf8c1079b5256c8ba28051521c6aa5239fc148b5163c34287c34db0be0da32942fe160890ce45ced0e6d8f54c01d2e79b2738c74703c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b