Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 23:00
Static task
static1
Behavioral task
behavioral1
Sample
8c5386a7b6f750e28e694047296aeb86_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c5386a7b6f750e28e694047296aeb86_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8c5386a7b6f750e28e694047296aeb86_JaffaCakes118.html
-
Size
28KB
-
MD5
8c5386a7b6f750e28e694047296aeb86
-
SHA1
c9dba716a8c5924ea0da7aa210070622f7fdb31c
-
SHA256
995b2d97638c4be6fd9f02251a32617bad6ef1741ef90bcac8d1eb500ccb0df5
-
SHA512
2a5d816e011f75652957db003b4a15a30a368bc258d68d55fc8df92bf29c97fb23abdba49c336e7a4451dc4ea59c1c7d28d415ce1bb2a9dcffb0512abc4f12db
-
SSDEEP
768:Y1hBwks4x4CGhB8hMUPVcPa0+9rxb2ksoNUPBUPVSGn6v28saNNUPOjNUPEshB1c:YRZW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000278a292dc5af4bcb98abe6a4c967056aaef20c2855eba9c18d683ce32e1c724a000000000e80000000020000200000009023ad8d13eb481289d0e51c6b2bcf981099841c236391dbceaa4cc221c47bad200000002738282f2f948635f604e62f87e7de3a6dd2cb1aaa326ba6cd5b96cdf3df43de40000000626bf60203e1b43f2ccbed548395d7251d4637f2b2e6fa7dac16c1516e03f79b3d4fde431d4c5ad080e1fb3e8345441067763edbaa4d35d6d55d70bc52f75466 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429579096" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7024c39242ecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8107BE31-5835-11EF-B903-D22B03723C32} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2748 2844 iexplore.exe 31 PID 2844 wrote to memory of 2748 2844 iexplore.exe 31 PID 2844 wrote to memory of 2748 2844 iexplore.exe 31 PID 2844 wrote to memory of 2748 2844 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8c5386a7b6f750e28e694047296aeb86_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572fd1405be015a02399efc8487b6344c
SHA166dd05018edc47e8ce292a42a15fff5b0c4aac91
SHA256e559aa6e28c0e7829d00bc2171124043a68628fb41345e1820eb3553f9a127b6
SHA512869754f94c24645b8b3db4266caacf817fa21686a3c22ee0bac56fbf44c10c38e9f4ad9763847855e46e6d4f88bad713c37afe729ecc55536303401f42e964e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfa5710b5780c5297dab0a113b3ab354
SHA1b679a29ab3b93a1b492f1d35ffb623ce1c949925
SHA256be9a76401d54f1acc81b8a3043053d4b98b1ae374746832be183fab1df889d22
SHA5120b0b251eeaebcc81a38156e58602d84f8817dd7c5161bc3567ca14b8e22152ac2019305bd6036f472c27b0308619cad9864f6db3e982fcc5907740a96ef56732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f298d4254269758cbe3af8d90ffa3633
SHA140788003dfa3f29cfacea0ded203a5f92c63bf90
SHA256dbebb8235935106bb984de3654f15464d5f090a9c8b1ce9ae9ad3178c734b100
SHA512c529b9002e2f34fe57b7880dfd541da52fe00f2e50ec406a56aa9ab5778f2c482e91bc654b5ff946e3770765e5d9a644dfe5a650c7e1a078d6393a110f1f9111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598e8a903575b4d1ed42a2262c6eeca3f
SHA1e7c40a8055973c8299246a85fec724bca1f0291d
SHA256514c13b01ed0757af68c464cb49bc92daf2071f34eedeef3c4ae9602458a5e68
SHA5123b5ad84fe346e33bfd4a2c446896f6b37c2271be20a307670e0d91dbd9d33d94e31adce0f4948198de65201161722dd1d39abb5d33f25e781a6443a7de950091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8bfc034549bd9793428bf49212a7223
SHA185d4d8a76bacfe183586f4caa6f2c627f8becb7d
SHA256872d11d100f5936579c67e1207060e7d8148714cb27aed2ce79324132bf30bdf
SHA51203d16c561a78883953896e322dafe14d8f775e3c37ad82dad64db5f508d8e6d16fdde6019f16596f2840871184825a4184eb2d253d035280f51b64e83a381610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fa5221fce5835feac6a320f803f43ce
SHA1005eed4a05fc67f2801ccfb9f640f22a53f3d6bb
SHA25639318ab20585c4760f19b48fd0073ee895a3506c70e293af44f35e080e8d89ec
SHA512e0766fbd57a56c79246b46ed3c24dcbf4ba60e17434aa325542b849c3d58e05913e5c09834422bb1b80455ee81d08fd2a24a9e3775d5e6d6ce40062b75cdc34c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f74a3898f902b3904d60e9bdc21d8f9
SHA1c1e217249774044b2553c2e5e48303e552cb5682
SHA256e33849fdf8ee76f45d0a6869589c72898b8b5c31335094556551bad56e99c4de
SHA5129bf11f9c56b21ccf929c8eb74eaa081cbd41e9a5be9cb235452d8e5f6e797dc0cde38fc6f8b5df15afc7b37ea4de0e848f1b7cc267a054ff2cef74c4bf97a4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e0955df69820f4cc6e336fdda7f54ce
SHA170449a095b8a8dbd397469ba457157075703e04e
SHA256d00a81bc72724ef79e121b6c291019f5db8501bd6d7672d4ba5e9f2bc9e336f4
SHA5121216cb7ba49ef800cc4ed67023577ea4979ff6757cc0dd94d6cdfbd832463c9f49da0b813ff27027731e04d42cdcecd40ed6cb3c9e31af83811bd224c2453470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56880b3427f3ec3d4a8ed06baba6d7a5d
SHA169671baa22262f175ecc4e0e0cff48d4243ead3c
SHA256a01276be07886c1de32b06bd54ef89ee72692a270d265513b3a3080047b4d652
SHA5127b02fe63601e4981632131c79648b543a8fefbfeea5f3e21b405cdf57a40cf36e8e85c53a711d9bc286d0c614cc2c19bc2546fe44eb3190a98c3f4f643e246a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540267e27f3febb9c261c36a8504460ad
SHA1e875cde14f798a7b6db5107be14842ef681601cb
SHA25630d09922f5fa21277b430d11cea501e9fb3b4bacd5934477c3adc5961a7a6e20
SHA5120eab68ed28823b4bb75fc47953b8c8eb7f871b04ae19122f0c38c0eadab19eeea5cd7139b755386f9a9042b0bbab8d99d9f0b751c20f18fd5af6bdde7a190a96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5876a23075ecdc0672026dc2857001e3a
SHA1bd3dea619209015175c77e85be9c13811ca03235
SHA2561280e5d5ca2898e2440dd2d5bb8987cae4990675bb16d6339d8b9133a3ba5cd8
SHA51216a857e5e21fa63f65ab27891b4dfea583613f1f0f3a500e0b86648c40d74ac1c6e97a1852daea2b7c94c582ade76961874c40e65fc0a68eadb47ea702270496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583e8208a3a286dfc14f82ffc06aa01ea
SHA16a49368917954762d886131a1ffdece7ae06167e
SHA25685c407a160bc114f5903ffd63635b95820c36cae228f193d09b5d1b3f121e28a
SHA512858585e27f746cabe6b775e04305b87b1d6a2e0c6a0575b0b504bfabf9d30038b8ac37dbac971d50d5096be890e3b4c37cc17540f42202f39d97844081aba877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf258753bce6c4f86ee17738bc4eefda
SHA1483c1efaed18810469032efe0f677c688365db2b
SHA2564cec7bd6b9398ca42cdd96f40da5c1344d89a5f396887f696ab99544fc0fb4fe
SHA51299c1abe583b0b73a4ce311c69257d429f7d09deb11b1b0d797214147c12b9d0c64853d774c14a113bfc828dd05f9b4abd1d80b4c8afbfcece5df53bd7e5b5098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce9f4c279996322da7ac4a75463c201c
SHA162b8bc655b67ac570c1f00ac7b87cbad70838c75
SHA256167594d364d39ce8f96a0b111afff11e5f2f34537a6f8f551ebda4bbe9b1ce87
SHA51200a21e58ffde65798f2357e822596816a6a605317c84bc6e142f0ec87456badfedabaedb9fc61fc3f4f15bcacea1f0400422fa074243962a778870b921785511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f86982e85e4a521b6ac8d851e635105
SHA1766dc72b697fbc4804b5ececa1916c07fec1d769
SHA25633e336126ce579cbbb2db22a28099cac24fa8b0a25b240f157172be249be20b9
SHA512271ef49a35e858dc9d60776bd75945081c6299f5f7315e5cc229ffcc7b85639098adedac2a5b9b92b653126c1032378ea8e3d233bdec344ce60641204656d93e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c55b4519f854412755470fab93e2c1b
SHA1e278654a4a49921bf24b459317efbb9335c47867
SHA256db17f95135c12e00137b7e1c9ad38a420e4099afdb11f6a68ff92cecb0566dee
SHA5124391d722254459c0152c29b1bff5830535e1a6a9b43af671bef6b33340b392855273aa75865021778aaeb752641ae6589be20c3f17cd44726a13391d60829272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc35ec0044f2904fb5ac12c7eac3b5a0
SHA16696dfc3a9f94279ccc7eb9a446ab495f1ba3ebe
SHA2564021f90b25cd563457f4a2ac0de24e7bc1bf3162c2bf7b440296d1477c40eb51
SHA512c015217aa86c412c7c05e51c76a5fa726563c1510c818951b25a290b8b27bf60e5805e73667b51d175f2daab3f5aae1e35a2c1af6949b3dd46f12482acf78bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539e4690715be866762c6bfc868ab857e
SHA1a7d2ec8f57609eb0833f0faafd97dc6b22c9207e
SHA256f3211a5baebef43115289396e3f1bec7f3c46c3fd176e996c28b6d0cd0c64cb1
SHA5123dd7143e7d0032a22402c0a4df8e7d4aea9d2ee6274aca5b0441d13b2bbc19676009d757a29e0c798b215afe9eb123d07df5c19eff173972eda078c5d5ddcab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548cadb8e8280bd9fdd74f94faa8370ca
SHA1d6559c755611e15d241dc3a4df0f0190922e905b
SHA256f51bf757f64237aaff934166e5093cbd9baafe4701625feed620547f3f2709e8
SHA5123146df03d67afaa8f9fc0fc716f24c321b45b889b9849c291da1e9995527cf655b43830d815cd8fbfdbeb7bc26ae2807c7ecb8b613c21067db105c9b638f2727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad179cdfb607468820b289bde6946143
SHA112ab31ed4b0db3557546e01d4f33ec9398ff2eda
SHA256a7ed4bce16f728cfd43cc570daac7c9cdabacc65952447a86fdeabdc686227bf
SHA5122900f958784f5c418c50ca40c0d26fdb14465672dafb53198be60853624900330242d2e198cb8bb65dc65645f212b5fe50123920ff9f44ca9f63341f94eb3cec
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b