Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 06:20
Static task
static1
Behavioral task
behavioral1
Sample
8da4b6bcabfba131fbb32d8f5cb5a272_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8da4b6bcabfba131fbb32d8f5cb5a272_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8da4b6bcabfba131fbb32d8f5cb5a272_JaffaCakes118.html
-
Size
69KB
-
MD5
8da4b6bcabfba131fbb32d8f5cb5a272
-
SHA1
e193eae20734f8d3b90c0faf7cb03d5ce9fe3b89
-
SHA256
27edfcbeb28e66d142684ed17761262c09b22c07538986b7d20bfdc5a3a9d075
-
SHA512
0d023af093446ebdccac901909d4481062c37a9d31f60a689b729b50d3b21af3a703116b3e4dde2311a6e46bb71e0a24e5c720f8bcc1d2f39ed32f14e096bd6f
-
SSDEEP
768:W7uefeCyrddRmaPXBslajsEqPhbbpdq5+jJ/6ePmpm/m3mZmtmZmxmVmlm7AeMcV:pefe7dRNPXB3IxPJld4eNAeU6TWh0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2132E11-5872-11EF-BCE0-DECC44E0FF92} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429605488" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000004ffdcae6033c14ee89a41c894f954106129a2affc46870406b0f4135d04a3867000000000e800000000200002000000060c170ca07d06750873363eaf339617f8fd8e4764d66374770f7aee8c2fc215a200000004a2cac205dcecc4e5aff7881d818ec09bfcefa3c86ccbe60e8f3e1265951b09240000000b02dc4b27f9f72c8a639a38acffa05c95f813cc5fe775afc381414b2f6cebf2ccf3e4fac89669d13b20879166a0520c27a13e319c093f67257509a2a276f1b07 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 808fe9f47fecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2860 2244 iexplore.exe 30 PID 2244 wrote to memory of 2860 2244 iexplore.exe 30 PID 2244 wrote to memory of 2860 2244 iexplore.exe 30 PID 2244 wrote to memory of 2860 2244 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8da4b6bcabfba131fbb32d8f5cb5a272_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c38cbd3a930fd79d4e127da6c37b22bd
SHA1693055c23af1175c7fe6f565f4b33b2acd9a416e
SHA256bb0713ef8dd4e7a7ced66a24e7034e79af9c6496f6f8da01d34b7757def9f897
SHA512e9258ded526a47cb83554eb2f79fd09464e51cf69696623a62872604e73315cdff79ea02dae900b651e64bcaed93ee945d149af752e992b9cce58082c42eeee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539175d0d1761d247aa8808e996358c0d
SHA1af47a7ed0a34875df4b67588ebe1e2d4ce0f6a90
SHA25692042f24bb6823d6b7f34d332479bb1471655cf814b1cf28af8f61528fe3c90a
SHA512ce5a0eb355c274062fc12ed3fba3282c437f615ca604fdd30aeb254a73977f34233e92f67f6c3b1b3efad3284098a3128bcc78b98ee1135cec6912ca853c31d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feb8ee58d484de06e22214537e3f878c
SHA1feedae50728158b823fdd90239e83ddb9e58bb43
SHA2562a19b1ebace4e9e0dc041e1710c4ab85ef7cb2094e8ef2df9cce2be1b6e1027a
SHA512d16f92befa33400cbb1bcba6ce085d4a091d95466decd2c0fda0cc3a09d35819c04f7ab64e93da28dae668f39f87a2b3a7cb79a1febebe8750872fd57d655f8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566fe3c99eb62423d2e9683d04a38d383
SHA164e41f260ae0e508a170468fd6709ed03558cf27
SHA256843fe7a07f67b93521614cb92fb73c3797bc845ab01df89813fe7f536a88bb9e
SHA512161b95f8348840bc1c0649d65e7693ab3fcf62473330c7629597bd6bc6978f078895f4c55b821aef1389c07b9e0ee5c6d27f6d531bf0aa70ea670b16751535dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541bf8de13efeb9fd9fba0036c3fead24
SHA1a712d8bae3063ea0fd0d339233445bb762c047bf
SHA2568db50a7c679df6431a94ddb22b9f855688069412ecb15f658ec347748bcbe6ca
SHA5124fcb61d8f3541d4ada3d8c0d47b800640bd57c73b34b016090325d80e55c740d1c1aabb3e0188a00250940464fedb8e1a9fdbaaef76813643e9294cfe98fa4b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3a413a5c82fa489701368a3c21fa592
SHA155a32f5ea019260334b6ad182df1f94f340c0764
SHA2564bef3959f824aebc0a462fab57f82f1a154cd761ddc494774b111bbfb0eba487
SHA5125d0ce3dd244a51a0654fdeb50833bf079c5ab2b196e03ac65292e3d065635f2ef776964c527e4e5ed5fec9abca82cca7b14635034b0c1e596e2f38116fa4c12e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54feada2fb3d5f4eaf95a92252ada965f
SHA13f6520fc0572d16fc62cfcff82124118008c9ebb
SHA256e385debe7b0c00db0eeb8525ce0109b1a3bf2a6f6004f72756a78144b065bd2b
SHA512ab34c46d7b209de968e94771c499e2ed6984a63715cd9b114148d9100a39c21d7e318fbc85022dab85acb3b94ac9b1c184fd559c4f8da23450fee5bcd73c6f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52795bdb8f6304622662a075b65c423b5
SHA161f01943178df2d3de8fa1786ca9e4b28e370de9
SHA256e30f05afbe2ee9cf4788a62917cb36816aae52d48e3245149592eee88b524f1d
SHA512bbc587f62e2b833f5348f67a1f115a73834e1469c6bb6ad78a8c7d13f6b845f5da548a25335d8b6a2b64c034ba5aa953f908ff4520cce48ab87b8979d4a2caf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531602741c36dfe5d169463c475f8c416
SHA175588afd2d86113da0de41b029503d9ae32d3176
SHA25627ffde39cf6815d16f56c2d815ccac615de818c0881dfdb824400d92966c8133
SHA5126f9e285e6b831bb413b461d14de1aaf914a6f1efeb2659a564ce240a1e5cdcd1629b8b69e16ce2edb194d0aaefe413a406ae30e6f40ca37c716073b4e6f45627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2b276382468d190ee2eecf35fca4e41
SHA14658555baceabfc3accd6e48067bb6fc16a1b532
SHA2560acad65170a4afba40bd2935500790a1c720e675b82d4d5326be26e43d8f26b3
SHA512bc63ff4059aea0f94e8a22829d8ba9f06450a57b07f07fbc040552bc78955d0ee8b76ba5c66ff1e50fa06714ecc6aac6eca3957b7393e2c4c2b7b75de9760f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5567d2072d865009794dd290e51df3284
SHA1f37a78bbf6d12220f24c3e22c4f65909b9b9da2c
SHA2563497e99fb384a5613ea943501d488d9046be62926409e5c56fe1a5a7716b0415
SHA512a2e27952ca27ba195c636c070879f35a232fa5e6c8ec510711e00512bb380eb5f66f3465b84a2b4ecd939d1dc403161e644979c23ee0d77fea0d06af7122fe33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5864ef078630e0bdbd95fc1d1d82d163c
SHA1a19c6a4923b5f65cd793b86b8d8c4f4081962f24
SHA25605ad83679a9d01849b0426247174c3203afca31f7e6acc2d09be26f33647c3c4
SHA5121d15ac4a8b3260fa6aa4d4bfc29482b38cabe157250ee48969b27ee41f4ac3617b9514711ee8e7a8ddcba6b042b77a45e9da6f2edbbc3f04661622c46c0056da
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b