Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
8a7dae777e93866c0cbe7381ea9f5569_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8a7dae777e93866c0cbe7381ea9f5569_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8a7dae777e93866c0cbe7381ea9f5569_JaffaCakes118.html
-
Size
3KB
-
MD5
8a7dae777e93866c0cbe7381ea9f5569
-
SHA1
ae5f29626b16a48782b825078a8e3ef593c89121
-
SHA256
99b4ed2064aafc5f3ef4bc0530deb75c50446e614abc08b3856854b46e76c996
-
SHA512
f381ed348211a6e5c5ab37d946443cfd02a0af7375c5b33b0ab496dfd08772b525084cb9ac556c7bad1702f5fbd0b4e3b07b514a9840c2a0a7a6f6e19406ab7b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429544199" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30fa5516f1ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{40E116E1-57E4-11EF-B066-DEBA79BDEBEA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c92000000000200000000001066000000010000200000004cff0996497ac66938cc802e4cff4e5385a02c34cc06dcbb9c5fdd33a9405d60000000000e80000000020000200000000ff541bc32a9bdbb6449fab97919200229d2f212594d99302e4bc526db46bddf20000000a21d5d31bffbf98c6a7e8582b6fef904d5c2489c77bbc7470470a6ce4369c4ba40000000daa03c6f9159442a7b1fe3e61efad9f48999ebaf3558ee268a75cdfc7a6c52f91de99790a74c654311eab8be03060abdc1867a6c68f7e0ee1ba2dc98ac31dc53 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2616 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2616 iexplore.exe 2616 iexplore.exe 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2452 2616 iexplore.exe 29 PID 2616 wrote to memory of 2452 2616 iexplore.exe 29 PID 2616 wrote to memory of 2452 2616 iexplore.exe 29 PID 2616 wrote to memory of 2452 2616 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8a7dae777e93866c0cbe7381ea9f5569_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2616 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5246591ae0fd5012cdd3e0e8253357f22
SHA1037ac9bb30e5442b0746f8376b692b92f70d0e86
SHA256850ce886272483d1275ddc79b899fc9eb502a3d601f6925f47c814e7f507a961
SHA512864e8e272df6fcd7266bb6ee60f1b4fa432eeaaa54fb6dae81887f1d53bdeea0e4cd86021ce4b1b385e25fd0fd004bd5bb09fe3edf19624f3de9fa100b494e8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef6c03a4012ec82a146dc0d7cc610dbd
SHA1d33698f3c3eed26af1a8b881d663351a25b326d2
SHA2564543b2ac577c0f0e118dc086ea2a8ff3889b0fcf8d6e9dff7e6b509eb42ab62a
SHA512b5c7d3b57cf745616eeb0a1c16783b5670df9422c2414259f9dc11625da1baa83ae7305c965d7e748feb95a938d2d158b6b447e05c43c97b4dca2f0d76b4f193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac94ba5fca84a9dbccc7559d38d30ee1
SHA1d47fb1aa3b186c33746aa035a096d0ad2f47e6d6
SHA256b8112bf2e8ea7f4c29c4772cf481e38e13841fce639e8ddd0851b6b9355a3f7b
SHA5129ba3dc3498c037672527fe17ebf1333655000b06ca2456a7db7a7377ef7d7bc73a90f5de816353a3075f51c4db15241bcbb2126a06455fec2b2b8d4c4190a71b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5408de71e9291f314eb086a3e41ff659a
SHA1684969103897547ad194a0960f815d19dbda8eed
SHA256bd67a0e5671165dc4dd1d447a9e7a97c117b5af19309db2009c094e3bc189abf
SHA512c434d92102f2f6c2663965e5b266e0187626cbd2fe400bde16e7addf7924d81c86d4291cb7a16bd03aba8edf1833359d66e391b8e386e53cd0fcb68368d0809d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a03047691f7eabdf1624623d041c0589
SHA1a1023204948ee686c585c96865b8a15dd6e395d0
SHA2564899f65b487b149118e32fb8de64b1d221d4267ccc68cb44cf2f2fefe7210e00
SHA512340cbdc4f542912b2a552296f1df4c0ae0bb4be54ab50de84fa5fe1c475c28cf132ca4724a067a63065f687485bdf3726e365b0fc9f55fdc0e38fac190f4a0c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5264fe13576d0ba107a6b52727310ed6e
SHA1a996d11a668dc45a13dcc227c1da4aa0912b7c62
SHA2565fca8359ae63d5e058aaf1ecb2e72bf79d5262a2cc437a3387f75c0e4f383ca2
SHA5125160dfeecf44d0c810aeddbe19ff9f58ee0f3e495edd663d99ae00725f8d15179bea030321ebedab897758d4629e3a3c35fc5ad8ecc326c9096fb0d094235140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585efcb17f98371fd0b7eef0cf4430f60
SHA1fde8ad2de47c013af8c68c02ddc2098fb1dfb0f1
SHA256b4a458da54ef4e3bd6e5d5eac63f7d36894609d59e4a1f7175976af0c47c121b
SHA512d0e1a2285454bd1bc7edd9d51c3082081c2592243c5433735cacf4e2b768184fd646c45bf2309e82bc1a97198bb4aaaae1d7018d42d3b9836ec1580d1abc2826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557edb6ce3ec05ad104a31eb8b1cfaf0a
SHA161e532df26f685817ebd9709332d952df1b786c0
SHA2566b10f9e744b9d4d688070a67dc319277c8c636d3cddbe1f71214b52bfa9cc094
SHA512ad12d4d96ee5bd57b7475ba6121daa9838792a5299f2e3d40174887e173aa97aab4b5c4cbe5f27ab7079ee1fceb7335a54ff97f97ab9a1b7da905a255f98b2f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5546ba8c049788de736ad59900e324037
SHA16e9c155097eeec046dcb45beafcc5da3ea8bad3c
SHA256105afaae0bfcf7b2951bb1c4d839cb3af61d3c0464d9ea67ea3ab9c6670f9857
SHA5123af9bd735a654c98e03b729e386fe2b1ae00d51ad140a26769cabf93ff562c2722826464ad535cbfc3c2231483440a4769c3c6de602f7307100186efa61a70bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52085b53bcef32ff8297253f797c6c037
SHA1d31de8a6d73b95d03f2e4987eb8da78b234772f6
SHA2568b655f9d31511bbd3e19d819477bece59aec14241df95ac876b8ff4699fdd3e6
SHA512ef374096cfc925b81e645ae54e3d3d32c2dbc49cffff4ac50a6fd1107623a4a9559c6656e9041cb3cb31f825d62ebe931d14798b138a45915d1ef0abbe7217b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8ee92a94b7576741aa9a65d7a640cf4
SHA1730d81d454a356dfc5b62db4b629dc223253d099
SHA2568aebb8b44cbf04d3d14722207589ab98d7bc251bc101a6dca251d598da9c8cec
SHA512954f732efc326a15712fceeae9a5edb373016e065dc4be90efc99b11f2ff67ecfe6121bc615cfe22d24087c11714575df90a190d68bab39d16a2e7c321f71531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1aa8fceafaa10973ae198aee2c9f754
SHA1f0be18fb4dc4bbf42ef91c81431a088c8f0aa714
SHA2562c9dde2b3b7afc2c7f7d11ed264f1dd0129566af673bf0fb6db1c116c4c1f579
SHA512b4be9dd8752ee234c0436c0cc32a68cadc13080273042640625ddde19c43530e931b0539ed94e18db8abd83a9725fec17d798d8460fd3eb1ec540494559ea727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad02fbaf0232231cee9227d03b627986
SHA17efd037afd52f2e1e3deb3c52db73e7016f66f1e
SHA2567722495f19280bc75f65439fa9f5ef080339d2c414a759c10a1db7134ad753e4
SHA51236c385920b4e47cf9cd2fbe31b9446884c507c4030319793655e5e04aab872a6cd39704c96fbd8b45952ffe7cc1899b041a039b8c74a96c8ebc4010b60f89fa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d5dcd16ee07519c8dc24cbd24516c0b
SHA1419ba2ec45fb14ae4b3734424914c8016200d074
SHA256654c6baea3a1d5a173eb48b0f3ac28402cff6cbb2c282b959d29b5025dec6a05
SHA51205a3cd1847317177c834d181675c2047e7b973f6ae972e4d1836e8f5234c3551105da0c3bc0779cea098ebef16e8b5d9dd7452593019129ddf2371e1d7bca2e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50da54410daf5745dd9f3198524c7bec2
SHA10ad58016e593e2e9dddeeac0ae18a28439636b5d
SHA256d9074eb8cec4c88507d783714020d9b1684547a5621ebfc0844a8b496f68ee34
SHA51231fc248481161241f7bfaf44a19803ead8b2a2580f16c1a03daff3d0b17fbabac44d2c36e84798f72c41b86564a655a39b4779e3d1eed2eeac3a5db0fb6c86a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9ebf44febeace9cae034424c5c519dc
SHA11c253704494e7ea08a16c11d9bc7c96529062bc7
SHA256d7200de24395ba3b6e5a079a7a62a44e40d868f0091448aaa45e023d10b1c3c3
SHA51219c80a789b371e32230f172719a6617d11c18ee53c6005b77813a6b204a503bc09b53c5d3e75ee291dd67d1efd8c772b73230b4c6aa481a872209d332eef4393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b109b21d4699a06c7fd772f070bc725
SHA11da3789e68905173ad7ce174f1cd61253f86f41b
SHA256d4a5e298d17d3e2307a0ec6e18215920eab34f4e38bb1e6896fd2ceb8f4251fe
SHA512101064528fcf681a3a3da2c1dfe07ad247aa08c064d28e4fd2e0d1e935706d1f7679648ac2104ee3e3f1bbdac6e9288915a641cdc1a8992df794b8cba0cdaca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f7396ee35c2d9460797638988a09d5f
SHA13bbd8dfdd237a42d7f260c2ed0a56bffd444a890
SHA2567c5760e7d060b87e75fe140c92a49ee761153907231996cfc5a25c53214944cc
SHA512c7d7449b13358f91160c38f6b3f9d3aeb606d84c810289aa7c58dad559bd75de2e1bbfcadfb10c3c713fb81f0459200dde3b24590f0ad514f9a40f096781a09a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53532d75bdea2bef4d8fbc1d8696c123e
SHA10dc217b8372d604e7d7bf31275e0a45f6ee32e50
SHA2562d2970804287bbcb20bdd54fe95e8363a42bc884066fe5d7229dc935c3e0c4b5
SHA512e5a60feaa7a02b2f456ef17b72b62aa06ced7a5261e809f41c7204a69c0e7b87cb2d4c8494612c3291c036816dc83d6b0a50927a0b07578d436e068ce89e6f03
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b