Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 18:02
Static task
static1
Behavioral task
behavioral1
Sample
8b67805d1a484133ae4bbf94803e7474_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8b67805d1a484133ae4bbf94803e7474_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8b67805d1a484133ae4bbf94803e7474_JaffaCakes118.html
-
Size
6KB
-
MD5
8b67805d1a484133ae4bbf94803e7474
-
SHA1
75557374d6ffc471f9a93b1651c68c92a887a0c5
-
SHA256
e3a60d7ee439d1b4ddfcebdbb40af16303418d7ee9322b10825e0b48f26b0998
-
SHA512
3c7d1c19aff590a7f32efcc3d76d73f25f857b5441899a62d6584562f3b50d78404fad60133c122e6a8a9045da2433b3976671c79d040d4da5accbe11c2836e2
-
SSDEEP
96:uzVs+ux7D/LLY1k9o84d12ef7CSTU3wZcEZ7ru7f:csz7D/AYS/u0b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000c376277f996831881ba11317ae4308c66d24f47e1f6ee247e2eaab629475051d000000000e8000000002000020000000fae6b4b64205ac3f07dc974540471a6faf249bf78c2783606ad0eb7380e2a06420000000ef1c04b1f7ce58b349f9184ff31d6ccde24ef532c9b756952ebbed995a98304d40000000c85fdd8ca9046afad62764ca3554fc76fe765675f0ad267d411246874040322018a0a676cd172391538b44b0e402009d5306e12d435c74ef7a25213789013b8a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0b550bb18ecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429561224" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E479D951-580B-11EF-AB0C-4605CC5911A3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2176 2388 iexplore.exe 30 PID 2388 wrote to memory of 2176 2388 iexplore.exe 30 PID 2388 wrote to memory of 2176 2388 iexplore.exe 30 PID 2388 wrote to memory of 2176 2388 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8b67805d1a484133ae4bbf94803e7474_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590360aad9c05d228ddaa83695cd30626
SHA1cce405b0bae338d345aca93355b59c1e15303888
SHA2568c092e8d08941d14b9a60dff2e5b34a4bf7d7449734cdc5243657827967cd8ee
SHA512ec0c773190776e71fbc53e6efa864f6493882c644e0056396bbc3a2837934947c2d1f5767e65770fe418551edac09d1a43f5579477000740d3530e9574029ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56024b672b6b343e7ca7996378a970f56
SHA14f89d76ea1f3d754cc209dad1fdc80fa8a3f540d
SHA256033aefe89aa2f8bf079dd0cd6ea9fed0e3bc146b040a6bd33965bc2db2575bcc
SHA5127128114e8a156f875ed4b1b22500984f055c355f4d1d949f5f4497cd0540c86a382372613c8f95e00c9c65dfb88c32536ee9213e6a9a9ae25f560a46405f0d74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b879528418fc763b997a1682e5b8aea6
SHA1dac0888a91acce83ddc4d573de82f6dd7f7de7ea
SHA256c24757c90b34dae9e086f511e42b9feba2713f0486222ffe63d537c1673cbc44
SHA51257a46316a7a788e01df40098eea559aa140bbd2820c7e98d86bfbb0656cf2ce5c5ea0468c2a3660804e2b3620cab91bc3622e1c6de2d050e20382df25b82f4bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b99307a451e0cbd52df439844b237e5c
SHA1beabb044b5d733651213e5724567d35226817473
SHA256924f062118cf7dc5af0facf93abaffbc3b9140e8da59429425a735ea57b867ac
SHA51285c0ccd1dfe53e2ff4689dd87e429cf34a6877f0ed1d13bac57ee1ecff69a1bdfcccdf284670bf77ed8617a9516e6ed989c335845aac5d0c9bf699b5a1c94ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c446611ac251894fd05665b575de83e7
SHA15244d4022af1df7b1651454ac66a4099b561f665
SHA256ff8345033144ad7923694bf8e828871ef81356913170fd66a16ed3c3408763ac
SHA512c4ba944b65c35a8a2f5ec5e74704d80816d2faac8902aae99b4601603248121a5bf81de7472bff5db77f607497ddd4032c9af7f1dd1555480034f3a074c82273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dd4bb8fe291c92a718b90b4e0093f10
SHA190a86ff3ab3e7a5485e276ac3b8e64402065c53a
SHA2564f9ce8f192029e361725b66290319efd751e86d5702477645831f865315aaac5
SHA5121d137ef14eec9e4c8fb8ba70edcc79239eb36e9d3ffb6e67a7606b5ef043be306df7f31856025bc2c32082575c57b33420d3e0b3074f05b272eb22c682732102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54760c5bd11630be87ade23ea06a40fe8
SHA1f781bf984bd898271858adb48a15f8d4e5a670ad
SHA256cb5b80bf18276ed257d981aeffb8ca2655f565b77ec37eecf7cf433d493182bd
SHA512e007d56da5d070255a1f1ea97c6c1a7f9efdd33e17c312e0a8654238d0e1e3f20b77438683a8a41576e633296e95642f2aba4b6c2d655fb32af9d7647faa58ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56498fff3b56333ecc79cfc9666977b4d
SHA1356c13e449f0fb808b21cceafbed3475f50bf6a1
SHA256972dfe7960f5788203a097a8339bc3a453a5998136dc0256b7ab1c22efda22ea
SHA512115f2f675d1e066bf27bdc5d59d28433990ba781b06f025de9115166a69940403b1ec6f2525804d2264fddb2117819e8a8c546fdd970c24b44a2c8b979718107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de1cf60e5289b805c5ec761f8e9c1844
SHA16f73928e466b90194144946cf919903d6c4b9996
SHA256bab32d3d9ea29622e03046aa1dddf063167dab53e51be0bfc080b6617823cd94
SHA5127b8d6e6c53d2311434a68237ef66158351b39855128ad50056c368da1d34ec489d3260a81f51ea9432f7b521905142d074fb7723873676ee61b714ad8507a4b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5757b10a524f5deb0c9652a27acfe7a8a
SHA19b8455a00eb432588e2a58185a65b9f2a01cc690
SHA25602a8a1993f6d04fbaa7660cacf5de2d505036bca4e82a8e2167015df52d88ec6
SHA512dd6c1afd011a12c463a507723473711584b7fdadade107f64ab42bc43c2f27b161b5f296b4683e65fe7e8185249beca382be9918482bc02a26e5d9f00f8e8b1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a256f588ee906c0f498375133e7caef
SHA12ecc0b2cc9955c9d37e1b558757ff43fa5c28241
SHA256bde88a6e8a58bedb6b02f69bd4792976474386d5c9bb60852dd918c328d2407d
SHA512bb3a2243ab78bbc0feb8d1ba03baf3c5a7745b7ec30eb37858f703ef064036a59db3f2af0ef6eccffc7b9ca688ac874e9653e7c8970f30fb076f6abfdae3ce3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508ce15b9f8d90e14aae2b442e197f371
SHA19eb769fd3f6d439cf2bcf7d1f81962e26488b902
SHA25692affed59fe8e47e89c46113b20aaeefae2a657f3a48e7904101870ce1675ddb
SHA5128cb555040660cf243318dee1c82cf15a90cdac00585825dac12924f717890d82bf4e0776565ee23c4389155c41d022a903d26483061490c9231e61e8bcc7b479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531ae4e3788b95316341d2e3174db6b2a
SHA1392f81ae875777b6c13c9f71f7467b0f8e8031a2
SHA2565ed0c86777a1f11405745fa8719430a6cbf8303a2272413390810efed3a1da91
SHA51285589592e2d2faa7de5338971a92e8546aafcdbfefe9c7a7d57602198b43dff4975a047f59bc809d1574955b71d43783d24f4471d72b6e6fcebe7346dbd0f968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b05b9be7e6c061e35378bc64d7dc3037
SHA11851af37c4679319d1c21e802f5fdc65a3bc9a58
SHA256cfb71b838cc319e83f58d4579196cce1558475e3a05ac4f75c6e3f6f7cb5b179
SHA5127d052d26fcbf9b6e40c6944d33c223592611e4f902bcc7a7b3cb815b59c8c0815a31bd47d6a9fc4f19af06fbc2b04df2b052484a7aab5c0eb31208ce6a171285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515aa538c157caf556dc81087a67293e1
SHA1abe0dde9eb2d0bf35e23d3e05f6c61794e45b201
SHA256fe6d142e8c73a4424b29bd736c8a1f08e8c9029ac08aad006cd0d39788e4cf2d
SHA512576918ba031934f83a6b8cee3f928b8cfae47b23d0c743a7b0fec81273e46227b66aa5211a704206a098be81bcb5d8e90d35161872b8c3d1d372fa48b15bfebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5771ea9c4fc2731177350058e3c5ac89c
SHA177334ad9fcd5181b8f81c248a1306d2e970721c9
SHA256468e4d2ba8f9967398537de07f80aeaa34e4adf78cd1616a05629b1f91364157
SHA5126607ea4ad51cc0243aabace2fd8a5810606ae5d09f92b3cbe306c93a20f3ece121b22b21d0ee9517b95f37bd61db8982a9af7b56de4e495886ffba585fc7dfdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca8517128649a608f6a49e21536ac179
SHA1a4c8456d70a06a786b4cbe33185e3d7b3276f57c
SHA256835acf99c740ad0c82e47e77bc82d2f07489950b07be12e249d8e7067b35f83d
SHA5125020b05348befe92f2ee979f8039ccec1d4242be112b1329c53badaabd7630a7a8d4c04bb37b14bf87eba740009209da1d5272af051ac44d3eecb6774bc8f2bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510b2baf5082ba090b0da728754c45d82
SHA10b9c3f0d8da7433413f5cef83ae0dbb10466e490
SHA256fc5aef1e948f260772cea62a29beb13606df2cbdbcef7ae4713da4d864570157
SHA512dbcc091272aa3ae1486c8685eb538223c526aa1f1eabeb9eb24306463c830d70f73382fa75736f90e92ef2ac71d253816f288ae3213b63e3aa55629153b86db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57139afa3758d911e3443dfe26952f3c3
SHA185c5ec3fcd264bd7f49414efc004822fbacc6d1d
SHA256c53e390fc8615d86dc69003cf40d54653cbfbc2110668082dd8865a33be1d3a7
SHA512e384bd9aeb81524abd8a9a83c68562d1d3e42502ad17aaf96fd09d26c5c8a724065e7d75f89990ffffc85430b62e3c57025ddfede5047356f103d133e6f2e76a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b