Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
88f784406875555f28fedf3f6dba01fa_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
88f784406875555f28fedf3f6dba01fa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
88f784406875555f28fedf3f6dba01fa_JaffaCakes118.html
-
Size
8KB
-
MD5
88f784406875555f28fedf3f6dba01fa
-
SHA1
d5df3d46edb6691ce61396f84ef81567635a3006
-
SHA256
1a873470a3efe15902574e05020e3090f592719df61369bc1b0c7e1156c12670
-
SHA512
4c2cb83956a6d82d05b574730379e3ade8db3885fdbaf96390a692004af5768e64c473b496d115c1453074bc2de10147942d8200fbc22f166d17d2dd8755accb
-
SSDEEP
96:uzVs+ux7C2fLLY1k9o84d12ef7CSTUIzfIneX8qH9ai+uNseijNi3ScEZ7ru7f:csz7CWAYS//vHSb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a03e83bca5ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429511836" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000e73f2bcace6ce8fe4535b935a7dbadcaeec8e9ad6764dc967475529b81996305000000000e80000000020000200000003af806c0997a8321bb681a56239c09378c3b0bdee286a68e419bacb78a5a0b83200000009806ec02ba7aeabe00c21fbdd2695552709042c085e372dc5ba06a3c630df74840000000e039f524093a3ea9fbf3ca7e9b07ca0f83407cf05935031408c6b0faddf5e628bee2dc0853c711f56a17dcf8a604aa57af3ae84d52d1de6fa96f4cc7a184964a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E6FADB21-5798-11EF-969F-66E045FF78A1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 1072 IEXPLORE.EXE 1072 IEXPLORE.EXE 1072 IEXPLORE.EXE 1072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1072 1680 iexplore.exe 30 PID 1680 wrote to memory of 1072 1680 iexplore.exe 30 PID 1680 wrote to memory of 1072 1680 iexplore.exe 30 PID 1680 wrote to memory of 1072 1680 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\88f784406875555f28fedf3f6dba01fa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e537232744ca03c556a811b4d506190a
SHA1819be9827d4e42f47fa2ef20d1c37591584baa3b
SHA25628e24ff7169565e1b39f08482f957f44ec8d5795d6ef9b4ef0479954ee9ab2f6
SHA512526cd8566701ffc0eea3e2ae1fc20c9874bb6be3569c8863585a8bc614005579a08760a4745e9179cfc0fa617b41bbe33169ffede61e7fd1a16220a3429d1ac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599ee29000833ebbae401925854cb5819
SHA1f5d4d3abf5355e2b1846958dc541a93458205075
SHA256376c202d67ebe28b5aa3da51b759313851bb85bf7cc2a0694d3d07120305e390
SHA5120f765b6730b7d71a57c22c712d9fbb5f0959e7f41c49588f04aeb01ec87d59572a3395dd6b78de502cc5b0f6751cf79d2051dfffbb88409e8293d4753815c724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55decada9468eb2e7fca9be85feef1019
SHA1beed78ce5db4f1cf309a19d03f3c504bbc25fc42
SHA256fbc01a2a8c4cb1d31bd5f3f5fb6d8546bc15f7657a0cb426c20ee8615ddbca87
SHA512fabb1c01f8d7bfd41b509b175184d1df9a4188a1664cead964ab41273777b70196c212a7a09b4067d37dfe7d26a7126e5b240cb148cca32793a22a2bf2f62828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5279ccc2d5372353720ac4982d339e332
SHA15bc58a278e0c631110aa9c6dc311f683df3013c9
SHA256957d701d136a2845b6b9a71dda17109ba81d9bad08e5ca1a7334bcb8e590972a
SHA512ef362475962c06de51e93fe55152f76fb44aba10107ba9088d44b1333862aca40b4ad6ba8db807292fd055e80d95c87bd192440ba52cdec035e4947f35888f40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5288b33a2388596bce08482b624998dae
SHA1c235202c72a59ddf2932cadc2a03aae7b460e24f
SHA25608fa6dc46befc9da823251d7c564e339020736a9dd8569c4d5f69f9b26088922
SHA512c3d182a8ff67f502e3f865959e0f39f55f4c5eeca021d2c738fc1ba2d64f3d0cb8229f7185547d632777d3ebb81c4fde5d780a76ec956132a30cd091753c4f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517164d1668daec63a5231aad55d43291
SHA1e816d6f79daced6e207c4ebd2e703a86bb1f62a5
SHA256b3c7f5d49bd586c48bb4d7ebcd4aa02ba49f712bb44953ac906dd5685dc7431c
SHA5123bec96878230492b8bb30dd61735ad612563d1a30ba60e8a4bb730dfda882b8f9e5ce745495d7bc572aeab26f7fa05cd27de77ee9db34ec6e9e77c1cffb093ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f52b450986e8c13863eea671515d21d
SHA1ae9795ffc0e2904086dac28be80eaf7510368640
SHA256be4edb754de927505f80e70cf982dd7214f629a35d17a4c32b5a0a7cb3f3df17
SHA51236f46eff9e1025cdc46f2419ce89690bf5667724e5866c6ab32d4e48c2d523bb3d7ccef249fa896e0e42ae15253c6fbc3b26458d49835543ffc72c65e4344988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5727edb99c01ce3476cfc08a15f75eadb
SHA1ed7c30c897604ab3c3730a2c76ce0960271e2b5e
SHA256138dad813be673e294caadab5f60a81ab1818ecbc66509d6d9eecbddc5a33b3d
SHA512ff3b042b26c98ac43b11f7f7b532abbd72e5022598470e42b18b85d6e43b417c0486838f28a500297b946635e762961da6da3744c4349b5476a4dcd9c3a9919b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d252cbc029f7836f7a9cd8f62fd5701
SHA164f3c27c5b51d3bb5671b73faf27ba92251dcc78
SHA25688324c93220368b99d8bb00a7b559cc224e073de8f18f8a0783d36ffceb0e9ee
SHA512089dede4c7767f1ec0a0fad52e80065ad86ca3ece2219731f7d12e0b4041bcf08396928c6f8f9a9cf3ce5eb8c0bc08c3143715494291d118bdd41c8c4527ee62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592d0d1e06c93f8e197f2f1a26d670a55
SHA1e445afdc0475515271a7ebbcb92809393f830a75
SHA256cde88c78510c03b21801853411ccf09119e52c5ae281bdc3547a32fdb475d74a
SHA512856c44a91253018937bdf63358c95ad9b4c9f03f03fe8a361ca062609fa7d3dbaefbbb42ad4dd75c7795acc8802023cc706063911759978c57ba6b1aeee5c2cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aa09d15a2d76e900b0498c9592a1454
SHA1d91554dc03ab6a3d89085d5f978ac88cab8c79a3
SHA25630fe0ba06783c898738b0ef2b61fab3a3e6a9cb2fa00dde99c3d6f405ebbb34b
SHA5122b45d3e0bf26ad808d0ac1edf544f7f2361b54d8335f9ae6e8e81bc6b54486f93fd0c5ed14f19a56ffb40ec9e7887f311c4dc9e53098f408158a3f43c9a8ed38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e426afe911809a6a2dbd588f17eee50
SHA1eea8e79fc1fb253e07339ddcd2156211261da03b
SHA2569859d1908613ade75e58d1b1550823bf19d145ca17810be70727fddd19148dfa
SHA512c1d5ce90049acae48757767c910efc8f8af1dd43678919db0149689a014b1d33e775abf0d44bad06a50ec1db9fdf67e3d13f2dabd121e141e448f9d1a56b5b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce97c039a47c50d317a160d1af88c587
SHA171641a41d6d34fca10c3d6312f34a44ef8577836
SHA256595c50f3adcf36da00d9451ad7dce05154d893675480b9fdfdd8a68e4e6ed706
SHA5120ed7482c3e0b1c0aec68ee251726deec9426b71d3356b305924467d3e421b08de86268aae3fcbdf2ae2d61f644690bc8097f8b7242d2e511627e76059b1f60c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50705e2e55b8fdafb036a4c48f1366644
SHA107e8afb3141e11c4c6b441edabe430f4a858ec76
SHA256c3676a2b85bdf7d7ff854915f8d6f3a8467f8c7a1c2a78c52231a9716087ca8d
SHA5123832dceec9ce9056ee6fb6d66b71107ac2dcb456bf341f55843b0dfd716a6806b3de0b9d2f46cd57a77953a73ebef569e726ebe7f36af4a79da2102d3c2dd9ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a060d2e688f594d092640287ba128ea9
SHA1cf1659d5775d6b67102a11e676d44d127d8fc2b2
SHA2566c781feb7931da0bb01c52f9ceef55925e8c0e209f17a946b7da33c958ecc35c
SHA512a2da8e673b6729661d1b00951139da121a7472dca9612b1369da6307ad0cba33dfba3b695ec159e7f097c421f37598413caa0719288f65440614d19dded45e1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e33d4ebd24951b640298c48a119e2670
SHA1ebbc1409595ebbd25df4141e9a93e7d7cffc4ce7
SHA256ef822678bcdba6d604e2bdb03699d742fac2bb04dbf5755e1e91c51afb355153
SHA512bc4d8d4ab91fd8d8e7a6d5a0b22a16c83e9f6e90951814a8b7ed80a795b7da46ea9682b5d23a0ba69074afd8ea7648a0b6c438d8e836e8251e9ec2abf7b62863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57caa8732c871a6dda758cacff89af42a
SHA1dadecafdac235aa68e997ace8fee531d75a5a23e
SHA2567b4fff7d31b8f0858621a99b9419ccf68394f8cf2ddd55e8b23305ed4dc77579
SHA512e04edb9d96c1ff93f4132054f5bee1e7d291b6b92c76e5053660b3b54db669831902952237a99b58a5707b611458baa7fbebd657b73298f8237873e2e37ba884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531a1374ca25c2e5951f08c2ecefeae29
SHA1371310d1b8fa63b26a1a623356a724ad8169a255
SHA2567c95e7c6b025e07bc7ef465137ffdcb53b5edd2acbc6dcbe23f1404ed33e72c9
SHA5126fac5689d02c5ade5dd5a342ab4736e6a67d61854ce32b0e9d9e601c7eeee5c8bb53ac94b26bca8dc07b0c05c705f5f1b9ccabebd66e17eac46a7a5831e48972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53405ce9614be624cb011f1cbc9a702b8
SHA18598640bcc969932de395eb052bc8baedb98955f
SHA256c0161e89cb451417f436bff825b467c9e66049a9106a3f6070bcf607505a6161
SHA512d25cf00e2b2f1658a2bb6bdf46578441fac7c800237706198eb4d4317b5c9d205669273b8a3a20dad5009410e095c11bed9ff1a41e4b011a35ea120169ba248e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b