Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 01:10
Static task
static1
Behavioral task
behavioral1
Sample
84424cba0cccb4b53a2ab2256d68d05f_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
84424cba0cccb4b53a2ab2256d68d05f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
84424cba0cccb4b53a2ab2256d68d05f_JaffaCakes118.html
-
Size
57KB
-
MD5
84424cba0cccb4b53a2ab2256d68d05f
-
SHA1
96439ff237628f45302600a84a7fd277492f7cfa
-
SHA256
d4de6a78fa7780effe84dbd3b0b004dff25f8b49df8941c6b414b0d8e900f919
-
SHA512
7fcd91780d16ee57023f611b9b93721bedcceb85164914b7c74dfdad1700c44b973cb9b0929941d92b698a2ca27e492b2c9a185a382a77986d9f16589b7ec6b9
-
SSDEEP
1536:gQZBCCOdg0IxC+TG84fEf7f1fpf+fHfRfLfIfDfrfMf9fVfRf3fUfKf6fKfafUfK:gk2+0Ix2Mz9xmvZzgrz0ld5vsSCyisd4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57BE5741-56B5-11EF-88C1-C26A93CEF43F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000274f938c251fba3ce0245ca681585227004b25ebefa5427337c24470d2c36661000000000e8000000002000020000000e02508327903bdd590f18f79cad65ff71ab3fc3771a94ff387577b7123e9e13920000000b860b5dfe4b02c97977a8fabcf40cfdf21823b5d8b30e12522fb595220941f69400000002ab7270f456b7a7c0a9742013e31ffefbc2410188a4d48d014993456fcdbf313639ae27740924d0ff5663131ccc8cd6c02748f9225fadabad8131b30218be8b1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301ab22ec2eada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429414101" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2136 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2136 iexplore.exe 2136 iexplore.exe 576 IEXPLORE.EXE 576 IEXPLORE.EXE 576 IEXPLORE.EXE 576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 576 2136 iexplore.exe 30 PID 2136 wrote to memory of 576 2136 iexplore.exe 30 PID 2136 wrote to memory of 576 2136 iexplore.exe 30 PID 2136 wrote to memory of 576 2136 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\84424cba0cccb4b53a2ab2256d68d05f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6db2a077f31fcac785165cc5b2946b6
SHA1a16af6f6de101e0287908bbc89f25de31e092ecc
SHA256a4e12de773af72c2e02baddf4531d923819ab25821e1c67ec2920224195fd656
SHA512642e8c488a08486c3901b9d42e41bd1702f40afb915f493d14f551711ff90ad0aece5c219d66b41854c6f2149f2ff044665664433a4d8295dcc286147af4691d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcbfec0aebb23c6a116e5616528cc69b
SHA11c358c529384ac438c658c2016ea0891e9a302a4
SHA25683a53862176f26a6a7aedec0aa155984d484b37dbdad3055bdd5ed597a27384b
SHA512c2094d8ea758d685c2df66832f3bfca31ad00d20a86c823ba9c7058f4a5d791e02a7ded0dab0ca3e5f024aeda880d1e7749cfdfc605018670e5dd3f58cf5b79d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c4601593d81c7f38b40bf6f5b4a4796
SHA13e9b2f9c9626fa1f3d5d0e454f077e0305b55541
SHA256bd0c6ee424b60b20c7417c6cbcc12d82128f78517b938986049a09c18838d245
SHA51202b0c14995ec0085f806547f4a8750ceac423258d4f9d3905d8c3e891e3442a16b4828ab5c7d40122d13a538a498f895d237e1ddba8e7f61b61d825cce0b787e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e51ac26fff476bb12f3477cacc1ab726
SHA100199a9be0219d44bfd0fca54b234344620075a0
SHA2566b61ecf88a803cbb24ab38ce15c3de8088787e0e02f987afe0b178dfdf4a04e5
SHA5122b116059c6c4b53aa980c3815713f7f5057bb81029e2a85470c46df83fd86446ef79b759ceb7c69ebe471afc6a7693d608ec6a8bd765287c3423b35ea16ffe12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e235065466b21606d3ad29027d5aea4
SHA15b0b7bec25aa423828f64c687fff9d32f56dd5a0
SHA256d3b1fa38a0693cc6e5eb6753666acc7dda0333500722fed26be557b61a227eb1
SHA51274284505e45eab667e4516e2d417b5fcd1fe0b6217e0a8b95f8c51406b9d94c257e006f7e98168046d89be57046943dda73f8314d3cc69a17486a41159b84fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595b89ada3ef0c8770da178105ce634a0
SHA15d4b9b6c232cfff6fb1f2e8dbc0c789b357c1ba3
SHA25669f44eb397da5a3f5f469d48837df7303fdddc0297169cbe2f49ba0071ef855d
SHA5128b967804ca2b6c1abbe4a8de8e1442784ba1618a62ac0a6a148846cac95c7d188ca47024c7249a1d50f224cb96567fd9ba5381f257419a928fba2d876ffa55b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f47fc8cb8121c19d83034b5bad0ab11
SHA1d9ebca1518408ae52bbbe17c17c1f415a4992ecb
SHA256bfd9be2796b15d58020285b61ba96df4b53f701853fd9e99d00312a631f0e599
SHA512d8357a77c6f07b518e36eb3e4c1d1cacc147b3cae0cf5d089a404fda1c3112fed97d236dc7d18529d24a1c118bc824f7fd469ae8db40bc920c9595957885f856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544afe6455f9e598f4a61af9666012ba5
SHA1f7666e96b112d80a08d52005be290a30770ca000
SHA2565fa5fde55d23351121250849f905f78bfdd384741f7d6ba26b37d4f4f7bafb0b
SHA5128f2933237a5beb266f26f8269a2a3d305c5684fe223fe1338930067122c098025db4d65d205ab3fbd2d99c43be2534fd20abde418809218a95bf72d1d1ad3eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffc4a210c8e7c1cd3434500df7b0f6fc
SHA1b44f532138dfb12287d2cef1eb8486288500f40e
SHA25697543ade83f0bf4f78660859cb5c893290538b519286fdf0e9f3e4b94353f28d
SHA5129c006ab3645b4841e1840784510e8ea75130f130322f1c309c578a9c68ea0acdadcea7b83cacb799560303161a3bdfa812765951f085b35c334ab4f5ac8026e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539e9c17d34505c41b86e8740bfea783e
SHA1d42070f09aa431af5a969d1cd5a52befa6e89c23
SHA256566def91547ba963a412ea3bfcace2c5842ee13345178af27d93da955173b1bf
SHA51286c36a8669fae9e886807ec3dce7683eba5699d01f2d7d1425accb63f9e42d8c55a361efbcc16be7f58e6e3aa5e37a639cb042459b43b49aa41b366158f659d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f4f9d9227a44bfdd1b501c52199751a
SHA1a2a0b92298fbd115bd104a9a600bcd9ea073b85b
SHA2561cea5eeb7894ca2c60f5ec90c028ccce3f87e3605fafb1c901ba51942bf4c4d0
SHA5122e06c83a208b4f7e3033666596096ce9851bb5f43a2ffcf5bd2c0adbc1745a7caeefb11e44bf49e4b2c72ad60046f38257a399e2a8d02ab1f0359b8e1777e24e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e37d98b05f7e412a2d49b2cb587e627
SHA13cd282019c36528a0ddf06e2950eb0471e13109d
SHA2568dabe65b73f8d2bba82d000170a922caa3e7c4c2e805d34c7813ac193a746cd9
SHA5122381069e5cafc802970c7bd8073d6f458dc08d611e1230dfd3715994d47b7ec6927e71729eaa8ae5ab29e6861f6634583a3c29fb8472c998ca723aa89415c0e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5894d4c4430bdd12eb02408c83ecd88e5
SHA1df72a2bafbebea97ed867ac3bc1f8716aef04a0b
SHA256a9a830413b414b2830a3b01f0e453d1e0b4ed9bfff114df7f40b32a8acaff4d2
SHA512c4e347b4d98c00539ff24552c434d666607555b37b9aca6ecf31227efb48dcb41b228fd88b451f04a1551ce6a4982781823aa6ed855eca9bdf4ce2feaea5f7ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56082259accd43c1f9be14b56143b8c21
SHA1b3ec688959467f0f10cd5ef868c870c0c9bdf84d
SHA25654e57480e5815e851600674833f4c63125790e0a3f1d71e62a3f75e6ad594f68
SHA512285b09f7691b078f227b947306e8ed004a299f729e62fb360a61dc45558e261ff7b3c4e851b726262c8fbd60608db401ad77d1936e29dc3570217c2012431ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5335d07660ecc08d6fc5f1dd331ae085a
SHA10745b0bcbed46b135560a830b718c909d4e177ef
SHA25650383cd8e2aaa94b2d7cb6394d511ba8a33dee1be5ffa0307860130720479857
SHA5128d58e1f7838fb048b04d4374994a2d3fa871ba1464d756c30098d8a07056b7f3242306abf1a5fbbfdf556b9486c91794c7f67b2dfc87e55bc3fb80bad5c4669b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c553b79588c004b07be0fd5bed99d2
SHA147adeaa5b116e4d84007c0118ea92b6d44081770
SHA256bb0e9dffe4686c62d22aa697c29016686862ba4421b489b5866090ff6eefb5e9
SHA512788f5ffa5139334594672026e547939441bbba43808ca6553e127495acd48e5451c9510a51d214bbc7470cac113c3130bdf76d37f8ca9f8e6a8bc70d9f6b0f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b207905d91d3c84252d71c3ed747b26f
SHA165b92669170e3c16600f9632933ac2bbe12ec815
SHA2564f79cf04c64107e02a43a6506418d609b2fe64b5b2f5989cbca5f0498504e76c
SHA5122a7e7edfc47a8cf5d638226aadff941c13ef67f85fd7b27e2ed12d2f26f8dc1cd56cd80cf7580f2b36ae1dfbe5619569df3e4fa1335a3dbef8b24f292aeba2d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2933a85bd2ea71bb57093df0ee1d14d
SHA1c6d3fd89b17e27130d4e68b7bd2b30273e5ef894
SHA2569d25b3b03ce1f28baeb7eb850db98934deaed4da9e17cae230f87bca37611d61
SHA512a45b24e09adb18bb36e14484ea0129e312ef386c5d8fbc9666e67cac80ae243b040ba8f747be6279a090efda31bc8d0845390defa2f6ca951c049c763619459a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512ae6cf6ab88c794778bbc53e824ea1c
SHA1d361076e7e97620e76266012b68df9edd71038bc
SHA256a36ad6c5fb26ba4cf95715546d1cf5909e1a528dbb07dfc9087b6cbeac3f445c
SHA512cb5c8dfcf892f0d66e104e3f904c87dfd0fd581b49f2fce6cbdabf30fe938d9485f0891fe502eb056c3b36e8fe8a3ecf61d06db3d48bd2d584b56f30aaf805e2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b