Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 02:56
Static task
static1
Behavioral task
behavioral1
Sample
88b8481e8cae609a94fb70bfccd93c69_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
88b8481e8cae609a94fb70bfccd93c69_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
88b8481e8cae609a94fb70bfccd93c69_JaffaCakes118.html
-
Size
6KB
-
MD5
88b8481e8cae609a94fb70bfccd93c69
-
SHA1
8a55631478a0271496561b8aa925687e57dd2b21
-
SHA256
199552319646432a9ce43ff87cc86518d79d63e6a3172dbf2a86144702f5d4cc
-
SHA512
7517b8ce24e5e6ad594632d69ed0f800d0dbde2da1bd2dbbd45da6947f2630bc22cc7ea725bfcf573b56fd8b4522ca0aed3e370c60de2326708407f7d0e2720d
-
SSDEEP
96:uzVs+ux7zqLLY1k9o84d12ef7CSTUpLcEZ7ru7f:csz7zqAYS/ab76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E2A7001-578D-11EF-A74E-76B5B9884319} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000d5a9e4a6347ae5698612608864a1dabd013b73d20030bc45c173aa01670906ff000000000e800000000200002000000010ee852b9ce34e361271f76fecc48fab40644ea2eea83a588b771e5da3f240c020000000476d0f719bcc1ff113f91cd34212fe3991c2e00722d9d7eb604d06c75e8c887d40000000a2b8bd0faa75b3d53b153edf238f3eec6c73916e6c72149a42e386601e75cb46c72dfa36d2fdcc689cac4b5ac58cac4ac705e0bc49b4e55b2d85c81f56f0b909 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429506859" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07ab9239aebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2432 iexplore.exe 2432 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2832 2432 iexplore.exe 29 PID 2432 wrote to memory of 2832 2432 iexplore.exe 29 PID 2432 wrote to memory of 2832 2432 iexplore.exe 29 PID 2432 wrote to memory of 2832 2432 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\88b8481e8cae609a94fb70bfccd93c69_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d49a36d78c07e8beda6dd709e78673e
SHA1f56e745c66ab5245d29a99d8801d4e71a740b0b8
SHA256227a7fe4b865d52ab00e96965191efba5fb8bd02c4a15ab051fb07c2796f5da4
SHA512357af03edfd75aa5fcef4611a4fa7a3b51079177dd0feef7ddcf21fb128dd72a5a633ffb6809cfcb48a14a4209b8be1431621f4e6b745c410d6648f5333facc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55717fafc57aef52b8778e5283754bbcd
SHA19e17dcbdabb3d430d87660f06ff9692edac29d24
SHA256902d63222a74620c4807c86456f88300b353f429f03b9fbaa1eda6cbf7868e54
SHA5121eb9741c15a1eff5c91cd590fcd3ccab0477d78e8900e4e52f41fe23485d66c93a493de331fe7e3ab3b99482a3d1140a907fa70b7f252cdd38df5e5ab28f4abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c60ef9eeec80babbad1746cf7942645
SHA15a1eb36c3641fe16984bcb492ad1fe244697857c
SHA256c122a062f4d02212666c8e5ba0c71a1842cb7d039e4f34560495bc049957a2fb
SHA512f225db60ab12c899103d7b329229682992fc199d19fe9f6935bf42762b717f2a0b8b08e83d5517dd5e67470c2bba973de8fc523ec58a847dc8fbfd24904ccbbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f877c977ab43d02be4c6a9774b9dfcd
SHA16c80915dbffb02268ae4fb8693ef66378cf15884
SHA256fc94a4c97a15925430b16fd9af223f609a827939a3e96059b2743054fce4a688
SHA5128e0eb611ed4d7a49c1f58a6f5a749d020cd805eb56f0fd37718ac24c984f0ac11bff3c99a2d978cd7cdae07bc5462c4cf935c800d2e8d9c55f5ab722750dc743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5410cf31f0d28e798ea09cad25d5290ae
SHA1c8f2e718d2ae0015cd23c30d5802d1227f842bd0
SHA25675c573638f3a3cf1daa810ed07f13777146a3943c8c3874931071c4e22623f66
SHA5123dfaff1fea7222d4fe64b28f76fa772563ef325d366fa83717084eb436874e41a26c91053d96dbd8ce8b9d47378ba7fb118f9ceb3b79be24d2ebd72c9679c20e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577fd1c99ec912b156ed35742ec337e22
SHA12cc8536140bd46e14fd9c279c2060ac61c3255a3
SHA25610d64ec68be0df5566b530da646dec9965720cf3a3652660b988575c152aaf5d
SHA512db16b5625706299ec06f0b127327d14609f5c584dfa8a41aab6d26b0af9ad53352376b126bf00713780a13a0b4375384dc0e2322b44bc17f8ebdfae85dadd647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b95a12e9ec2f1105e33cb2a72731a909
SHA10a397049e84f4a00de570434235a63721119bdfc
SHA256d14da5e2705ed0d3a5155d43dd2f34250f5f977dabc695ef3033b2fe8d8f6268
SHA51230c98836caf61b229fb368042c93734302a0fd863f7c38f36a0b8836e0c64069bfa138026676d779224ebf40c1766577be492751eba75c25b9c2ac5f6d9246fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddf8e5f06e3477df2c3fd345ece71164
SHA1c36569db29bd398d7bd9a005c5259c83be7ceaa3
SHA25654ca3eaaa5de364c3d133ab84bce60dcdcc4afc6fdf23cf2cd40e0de09fe0491
SHA512b77a916e74535f6e050dbc07280506869e061a1f5f78c6d272437b8fd59cc8e8bec10de117a58637a27a5b804b1007b2e5f0035207671cfd4042ccd40dd4fdbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dba8a532bc6c5f7f968cdf6e8fb1e41
SHA161c790a92d9d80adff6dca91509134b56c395056
SHA25666b9a7eec92253b10bfc1dca5de4fb448464fb4c795ff8897d11f52dc4010968
SHA5125e971bb86a6020f928c2ac380b1b8abdef039195023766995e1aacf9ce498b4758fcade69c066af90d0e4b8ae58a4852da7e21f0c81b742dbf776a5ceee5f6ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f7d7b5fcb85e86cec3d8282ef2063ab
SHA1027c7045b1ae5e63d180483e977883746d7423c1
SHA2569428a5d30a4a99b4577d39d539db92a64b646db957977c6e55bb937d1af58478
SHA51295e4c3a0a98ea925573e018450c40da092ccfdfe7ece073a992536ef3241cbc96bd6932cef6ac3c8a53f6abdfca591e07796835c9007ca08e2a05028efc2c9ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a970f10ed0ab5f6da5b66a97111c191
SHA166267cb557ca0dee390e49e3b113a68affd6ea92
SHA256b05e68573ab6f987c2a612544e1ffb4a72400465816ad6bc734e3f2d45458d34
SHA5124122964f14e80dbb763e2ebbbd012952090a58229bafcb78240c65db13c829655074b86b9d0c402263928431872a1aa3756d03031c54c61fda6b66ee90c9e858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50230864cf092db0fe2c843f1eefeaf43
SHA1f0fb4aedf2643480661e521509c310749ce4679d
SHA256c8628f5239ff263ecb0231c49d87fcadc05d5d9297fdf8ed041b0adac7e4d96a
SHA5121336f11286ddeb9ae5899aefb3a26594101873dc84ad18eb265b11f32e617743e9f3095931b028f8d45be3e79c2737e326b6d99c6ba14ae2ea44629be17078cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b94cd352cf1f16227ca5d725ad99a5c
SHA16a7ed8689041860b0ab3ea3d27850a9d6e6cea97
SHA2562dda2e786abe394c84b5ebdc2acc6c83b304b6591bf0e1fab570067b2e627cd2
SHA512f3534787e200d86eaf8b7fe5e4b7076a109ffea6f50c112c78c9c64f1e46269bda432a0a8e12b8073bf420fe9113b112cb25104b7d062d7349faafac9671e475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5351e9480251dd2206243e4294bb7cef1
SHA1bc6ff3cb716ec74d832df8ae8a0768cd4d5a6f95
SHA256da985c88eab15a3d54e35dffe0e0ceff61fd24569722114c240554cd46b7c887
SHA5127335fcda743f632a0e75f44dfbf27a89ff4f54f807f4a3d0611b3db18ac3f89fde2d322f5cd9140006f92b58303798094242a6302dd7259b02b16d87761b3a51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ce7d2459a3d774e51a765222d5829e8
SHA153439ca9f52a083a280c2befde17d948101f6676
SHA256a80cbc7c888ea549332bbf21e84509dc1b72c74da019075e7287a91489960ccf
SHA51224d1d2541ea4350471d187d3584b0d30c2a9316124debb3693fc79fe4544c4be434de4b0d0d76c011b8392d1e26efbafdde7be6c7a8b6845040a1aee7f0c401c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f04fa8b154bf8e4bf595ec52d208a6d
SHA1de07c5a96ccbb0a05c4320862b96a2b6ecba33d9
SHA25626831ec34e9603187240a5a48404b7181fedc992e4b2b66c11fb09a4548e20dc
SHA5120b65cfe9562a158639392bb8254d72b8d0c7eca23309f1c0ed2b80fc0077a180032b04d8dbaa9587a9cd90b24211d1d0e512a3f2d958d0853b43cf54dd371bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580f48e9fad20d19393f06f763f7ebf23
SHA14e6ddee01a6ee5ae5e428a47e00424fde7cb787d
SHA2561f6c2b7e6e89b2ecfc8c6b050c992d497301f92c9360f071c4770caa5673b702
SHA5128ee9e044c4d0ccb904568cee32f633bb9275ae3398117078d94cb2e4dd2d1f6de436a21bfa721f7c4fa5fc7f761ad48a0df93758f8c7a91285f83363438d7993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5734cf982670a21885337fbe2a2345349
SHA16c3fe66b3f47cfabc9b3df02cd1e170821277496
SHA256cb0079f0c3c63804a6e6bde2bd0788df2d325e667d9f902ea4d372e0ef457846
SHA512a1755b51589e93e1c6c1a11e32734da8357ec28a8a525aeaa7d3e498952905bcc8ec989d5c476be393ccd94c685e3d6303938856c145c495b8d8a16b55ea43f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5277ec67b933eb51f1ba8dc14e730aff7
SHA149612df25f645e8f0497a583944f360ed43d3608
SHA2560963bf44c8ba56abf0e1801cef0d0a7ec986e8890331b6cf322c685d33c3eab8
SHA5120bbd940b22243cc61b26b1dc60294a3ecc044116eb42a32369c1dc91b733734f1a33e95e22aa47a38b2056ee5a505927d9b70578844c0a12da70169e00fe1df7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b