Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 09:10
Static task
static1
Behavioral task
behavioral1
Sample
8588bd026bb0e5328b508908dd70c25b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8588bd026bb0e5328b508908dd70c25b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8588bd026bb0e5328b508908dd70c25b_JaffaCakes118.html
-
Size
2KB
-
MD5
8588bd026bb0e5328b508908dd70c25b
-
SHA1
d3dfc6c6549f05d67ff1ac4ee8ba4bcce8a6f2af
-
SHA256
832b1109f7bc337d4bffacc2978c00ef755bd9cc9304b2b32c7d4cef5e9ae462
-
SHA512
da282e9a8d6a67b7e7b20f15f8956491cbbf4bf352b86d5e324841a52678fa5c05f85cc657c4e7ad0a47dd2db026e2b5db6ffd639430f14a22eadba6b608f077
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000005c8175bfd55939a05ed3a2517102707439bb151c8197073c83c3f372552eb0b2000000000e8000000002000020000000657ac6f7826eafdf0684779a42f3ea62d30d070955971067d966de9777468cde20000000f848cc458755a61f1faa5f0d7e76e6a6c3cf8cd6ead093a5f2b5dc5005ac2a2d4000000076b4ed1e5b9c30fef9280ebabc0cbaa20d201eefa26bc6ca36473ba429bdc92574eb429270a73c18bd83867ffd94099d6fe8a954bbf8eaf76b659da4045ee26f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429442890" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5FEEB3E1-56F8-11EF-914F-526E148F5AD5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60f4d83705ebda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2672 2692 iexplore.exe 30 PID 2692 wrote to memory of 2672 2692 iexplore.exe 30 PID 2692 wrote to memory of 2672 2692 iexplore.exe 30 PID 2692 wrote to memory of 2672 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8588bd026bb0e5328b508908dd70c25b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58600b6be0dd6879de720e9a624b41d5d
SHA1716154b357ffb6ca72e93b5a9bbb412aa2d63c80
SHA256868b3b43049d44944ad1062f70e1c577e277235f1fb5246ab36f8390fe22216d
SHA5121a4e568307576569d1fdaa516ca5295cfac2219bef35557a420e978bf61e4938d8fb1300a58210e7d4dc41ba721bdc4c9c395fa51f782398927a12b307ba341a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ff22d83e7f0cebc91882e7204f094e6
SHA1328bb60d6b37f8fd3945a2f442b527340af314d5
SHA2568b56aed8229f1f4a800fd44b284483eada05a086e2649a5d09cbd686e3d0dea5
SHA512497b7d5ab8682097e3af7e0b231f8badcbc7477b0bd129bb2ff0263cda0e289231fdade3ac6023fa547a60c4e6080aa538ce538d260f3c8a5da215f502a978f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3cdf05734298e37f4b86cb866d51064
SHA1b9a149b57bdc9c5600842141dbe93c9ab3c47a8f
SHA256b395432455cb0e026427cc535b28149929120245bfb27c529a1743bdcd5133a8
SHA512635ed013c08c47f5ff2712be44053fd42d21bf75595ad6219461f2ff2643394eca85f2ff8ed330b598545da9b0bab1febdff2cedb5a112f98499d9b8d3bc3572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7a593b6eafaa9f4e1e35d86bf9d04e2
SHA1e4c17176fe21a607c85df8fb0baa1034f0eeb03f
SHA256a2c7babe54b5c0cb1ab3e21186374a02d00c4e2e1b10a108358f6b6ac61d34b1
SHA512660ac7d327c6b61651abc335b0a46fbbaaa56b68b5675320b45096e7730cb45f9919c54d8b4e492969aec4c623a2b2b4b8a0ec7611bc78ad655dc0a8a7cf9271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52236546727d3feb2022955ff9ac59f8b
SHA1cdfc7cbfe5d1c737f11d42cfeb35bccbed5e979f
SHA25684f61437c9cc568ff524974674bd6b19e73450e1feb3ac746b773d9aeff775c2
SHA512356b5496d2db7e1fae17d5ad78bf8773e5f02c6f03f918881892e7c38b6f49de63c93c13d5820f2c04f308adc466cded7be263e9196438e7189e333f80031c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a02a781d7d81d297cb20cf34998254a
SHA19b9281c3e568ca5ea393f2edae8ea74e5a128477
SHA256981a7250ae4c4434e72103c77b39b66ff9d8cf02e0f27defce7e3daa8120c23f
SHA51258ac5019472045c1a15f3a50f92552fd9f29f53367e9e82fa5fc38f0f6951e248a67ddeb19f188428afc01e27e3c62f7f9cef5664543a9644e75e9bcd4a32b3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5385a4c71ac8d9ca738bb491ea9cbee9a
SHA130e53c415db5209f582f226302d745172aa98c00
SHA256abddce18cacd03a510da92a50efb9be032feac54c7e3ebf98037f5556af9e4c1
SHA51238f80eaa0084f9931b37848edf68c8ddfdcd377561084be932d14a55c036060b4d546786d8835fc3396dda54211d6d3bc7dfeba833c241ba7ee30ad93facf2d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdb1ce198b0c21ce47c71e35ceb07597
SHA14e8f55c830bc45b833689c18b362fbdc2bcb5ada
SHA256ad2711f86c9b404bbf4573c342f04b7d498f44f22768b1d6bfa3c6300f3bc170
SHA5122b6fae538edf4337fb18a111bbaa3306b62c6f34e771ec3541573749ba48b52c65ddadbc5cac5ed7a9bc16c4c1d4ec3c020c00ad776b0d4fa4e21e3750c73136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f0ad10bfcb61c3933f189a84cedf928
SHA1ca89096fa22cbe4f662cfb3d045b13606e819866
SHA256e25704f550e8a8d15388096a97e9cb7a14b179caaa8a90d14d5579333c489d50
SHA512898ba44d8dd0f9158173a50d7e18bfe15591f61242060725fcbc54a3a31b41dac0be3ec79cda33ca7ae7cf8ddf1c2a4ac4b654f45ac247cf0f5ead6d72749151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e98991220ca988a6c99d85db4926956f
SHA194567055f9de68ad9eb1ae4e3680a89c02a2190c
SHA256c6620ccccf963c97bcc5dfb2d94496610492009a41df38ae58fec3a685938122
SHA51265250f6d7a25fcb90cbe5e9c1d26abbb040c0969498b0bc4d20b7226a9e5b3c44a9a585983769ec0982eae7893031ff75e64551b3a511d9f915ae5f051e358e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5138a3a0cd8344b9fa3a33008c5b88ccd
SHA182fd6b4c9d6f5794ed3f9d6bf4f6ad2fe4722d9c
SHA256984b75f16c9f6995d23e2c162da3b55eb25bc6c5638822146ff3a07d9f74f43a
SHA512b380f94e3d339232d882817500fb9d844c83a819017f2278c2499c907666e890ecbc347fa1ea63ca73fa7f6c2565d287bdd61c2aae2340d40ee4bf76148bd4a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f5249c2f71481fcf9f939fde86dcafd
SHA1cfd93efec0bc8ecbcdc823ae6441d64e1f8cd0cd
SHA256cbda9cd3ba9a653c3c379425f9a3e5234c68000e95d027c05143bfbcf9b44a6f
SHA512c0e7e841eb33d0a6264d80df3fd9ee9768047e1e9bd4357f154086cae98ff651fa52191f465d154d0a293ccb69d6d79e8dfcf9ee2bc580132d482784746a9943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e30ee5c837e011d6e07f0241fa70d1c1
SHA1a11ff1991c3c602eab52149e0aa70b9f817af80c
SHA256589ddbe07a2a996d7bae4f1dfa0a478c9b43ca4b64d4b0ced025d5159c1ce8d5
SHA51297be5456df82e16768e2bf7e1080ffc1a271374a26d9c1cf9d7049cb1f6d6c624b1475bbbb8ddc65682ef0996d5308dede9ce151192080d157306e19e6c43a99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f58f3cbf80f0fef6baeb0763c53a6d6d
SHA13617c85db6c6c053ba11e8783f3748b09349feba
SHA2569f09c9af28c8a233ff5111755ba802026b97c853672a64368c406f5226696e1f
SHA512d53b9dc3911c2ff693302ae2154aae5384e7499d458415562e6e1d78168afe35f811243f3f76b48d70bbab5d295d5eb07c89b27b6db793a0236237509c6282a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4854b608100d457d20dea634e43be68
SHA11587f868ba51b51c5d552d8c32333d43097deca2
SHA25658f72cae9d8fa46fff7c1eb1ba2ca92b40e48c774f481ead5af63f6edda34f94
SHA51229b44ddf39b2173091861ab0e246ddc79bd55ec1594d397b352f7805fa77b5605d179fef15ca6a11a9aa3bd520863701c896c725b2af75614964ea4029d7f962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d926ee8ff370c4109be6dc6a4f9be54
SHA147f6d0b5b1cf26d1d96d551d2ae05ebca5378480
SHA256f92b0f56601ea3db0d46d95b80c424906ebacce1c39b0010fff4c27ca67a20d8
SHA512b7254acaf13dd11a789a7687fd02f6293021e806b0ad2766d4b59b27932440accce0805fd6b7cfca1a898b5534fb64aa23ebc6aa2addd655dddcaebee90ac2d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3c6746fc0a796d560cb2b3bf7dc8931
SHA16c9d5467e8c05bd0243df884ee8541ecead1061f
SHA2564730e999aa6e4acb65eec23f6a841c332af977775e8925fc7af702205f0b2144
SHA512a632d40548e05ae5fbbab1697aa787d82c14fb15c106959e24f78fe0a22be3b4465a1b8f048a5cc6e424efd02f6b901376247246a0e0ecc9af6c4a13f1f9b16c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9fb0893bf56ed2a40741e6d91015223
SHA1c7e62b08ed025ed1625bc5091277bd6debfe14c9
SHA2567133ace6a337cd461d24b2d18fb7cbbb6279df1557b2209c19fc2fc7a49d83ae
SHA51275757fde28749acd10d9f644ed3b9e53e8729b6552f39939121284388cdda28d27af1608a1616805206ba0378d254f99088cabc599c7b67561ee1a73a8491da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5185dc0fb7fbfd6379ed4bf40f9d111a1
SHA1a17b0271a7ca02018399b3e6c8b362bab48322c2
SHA2562c2602fac9b28d9563f2b34e27ea111af93990c1996e5595ad97535481c95895
SHA512d8872b1cf37dae614584828c64cf9360d57029c95fe5537d2de786ab92aaed9fb1ab34fff4abc430e9dcb30611c2d5522f1568da5626d048050a79411e60a49d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b