Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 06:04
Static task
static1
Behavioral task
behavioral1
Sample
8d991d1b4b3ad29870b0ec8bdb2b2028_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8d991d1b4b3ad29870b0ec8bdb2b2028_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8d991d1b4b3ad29870b0ec8bdb2b2028_JaffaCakes118.html
-
Size
18KB
-
MD5
8d991d1b4b3ad29870b0ec8bdb2b2028
-
SHA1
488951ff5b21de6971ba44056c7f7499799de89a
-
SHA256
9bf637005a61f90872346f5969c6cd25472c9b3b8616e1310e34c113693a4e31
-
SHA512
53562af1d052552e2877d9df70d9454925bcd3528a3eedcebe10d0f1d0a7ae85bb753fa7cf905ed65b22cb0c6e443a399f860d0ba199c02b968196f8d0cb6f98
-
SSDEEP
384:W4lI5NHS0mmm7mmmWZ1eHQD71rnih7j+1eHk1eH71eHs1eHtli1rnc77j7mmm/MU:WLNXmmm7mmmeeGRrihweWexeOeUrc7jQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429604546" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30916b967decda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C1DAA541-5870-11EF-8650-76B5B9884319} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000aeb49cf878dc1577062790fc1e84faa8abd64bc63ff045f6a61edf6ec39805f9000000000e80000000020000200000006371c2b4c9f0492d08908dccbf0944fe405e5d98c829d37f4c674a01f956243b2000000086471157e02730e5fb48a27016be4d934d319388b10aa6117de98211add76f33400000005a9be5a73a4207519b3606fc6f15e4e505b81a2149e723c47d6f10db2f0bb86a4b0cad2fe6f15d7b4a5442170e650496032ac6643ab647162e1248b03f330198 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1344 iexplore.exe 1344 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1344 wrote to memory of 2560 1344 iexplore.exe 30 PID 1344 wrote to memory of 2560 1344 iexplore.exe 30 PID 1344 wrote to memory of 2560 1344 iexplore.exe 30 PID 1344 wrote to memory of 2560 1344 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8d991d1b4b3ad29870b0ec8bdb2b2028_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1344 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545e29f999a4025f0f26b73691824a234
SHA1b74a99a97a19224eb70d56f7f4d9734807176f18
SHA256bce0beb794f73186456bb290874509fe33c701a665f9a5d59a276abb7478e267
SHA512a2a3338412e7952842a482e8f9ab221b11f7021f89e0f6325d466dfce3441a7099542b46a8c962394e8ed09bfcd019905d2b2ffb6812de62d8b1cc23cd488f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5514341bd0fbff06585b1cc9210617b63
SHA17cf6e9368c81055d538dcd4e683635139e07dcce
SHA25672a23077348f4561e46a4ae9d4d887ecf88d9e5be55295ba3334c2642ae50f38
SHA5127c9ca17c56eef02b66aa8683b428b60d14541472ffd6ed29451cac44696ef1c49e53f9aeabe8b3d0553189e644a9c377cb37a3d6c2330dbdcc2ac07a527c10d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5856cf97b1e823e8ce3be6080d983625c
SHA19cef7bcb79833be04fc816fe707071570e937b64
SHA256c4d7efdda5259d825faaa02023bc1c21e4b8e25975eb60e1437044742b435adc
SHA512c7fa805b16dff40d378cdd6961d92ca6fcccf532fb830d751ce97fcae2b604a42adb8463425ecc766f9338e4501d408c23441a184c019154ace7ff90ef5e295b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b770760b675cee8ce3b585e5489c1ce
SHA1200464185a8464c860c2e33e6bac6568c0dda0e6
SHA256f4542257b6df843827dc89bf8b114c7645c6b91c2b346a0dfc5a2d7fb58e6e5a
SHA5122234e56406a87c985a87a9fda1c93da759f4c3180e291aa4b700c64c4e5dc5817124dd6e9b8e8b8f7de895901ce1aff1c90e3053fe8de834bb512c928d26a240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfdf1c92ee2f64d7155fad6a369a1008
SHA125012ec422188d17f76c56322449d7c06290f2b1
SHA256f018fa0c6cb64321e73a9379eb72c49fb1c8d23eb46d81e3e231722e9e43ae77
SHA512f21580647f61e6da375e8ba902464d2c60864026114e454664781a2770df9c267335159ca2cbff9d0dc4a3c5129372b91ff4b74a0665f7db5ee863d1cb91a051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e753629120d321006521d9dc6831cf80
SHA10655c304518b7eddfb7f15682b703d0dc2d1add6
SHA256e48ff13689646f7d1999e23a292dc923d3a83435190e77b7251a201e87b3e5c7
SHA512b4da94f6d1fe1354a0d042c19042a7515e1e2f5d3b6b26bb670e266083ce5716d08455608c523aa66f81c1b2b62a302cf26f5df9f3760b13368e32ef4e15402e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f8d0bd74a65b1fc5c5b955d373cae36
SHA1147de54a7c683f906eb11e6f12e67880d363ea84
SHA256779b158fa9420470742c09e1ea97434a8d54260ba5d8ed931991a3ed0a5a9c28
SHA512d89e14f22b9e1291a721385547c331a124d56f1cd7d276d711262182fd02f2bbf4bcf89dae7976cee91a23e098af530d8252c24b9adbcd5e062e1b1e9965aa4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc73faf98bab068ecd582b418b0ede78
SHA1f33ff897237b894372533e87d319ac9b4f789f5c
SHA256048233d2240de08bdd6006b0b27559b58d63c63271474d7cf534696c3a8fe60b
SHA51250bb351173204d5bc561b3b0e9a272d9d0d84091b9071957dedc8838f55ed206fa5e1103cc476f8ca83802e01d4374736360cfdb723808bbd33ae6c2f29a7236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e48fb8ce0d2a8aee6d33ecc757f4d0e3
SHA19fb62346e3ac17d091c6691555976a6e4546a078
SHA2564633ba72148ac6772e449f57a1cf6bd9cffc5c99313512cfbfe0eb67fca0caab
SHA51273845eb3d5bfa025e67e03d40e93ba4771cdc16af6399bb0ec58601a900690b8bdeed28e5a57606d8f1e7d60e8321940646bb3fac73c2c75998ec09530c32473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ab45ab040915786c0656a9ae2f59b12
SHA15e58d0bfb47d137230f43053762990a6163d49ba
SHA2567e377d318209137896d09369638e4fb3ee232983dc07d91a4f2d0d32cd424f18
SHA512044d7bee82e4d62a2cb8805dd6e23806ee3361cb5b5f32b673d9d6798087d4784e57d359f1efe4b8e31f38ed998ec76dd3fa587ba11f0ab1528f7e6668f6e4e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dff1ece03b078b60daa8ad0be94f4d7
SHA1c0308409542e6b9caa7801cfe0d2c6f1aaae9be7
SHA25634ac4890ff007072e1e2aad7449b27912593cadbaf98f0c2a5f3c9839a765c9e
SHA5128ab41a8a00c55ffb25ad79e4a8a387f32d55a90d4ae416184de77e857b985a7f40fc20535e6674bbf5a1ffbaa993430131fbfd2de0f253e142cc13cced573d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ba5957ab1ebc0a7dca3551d3655a46a
SHA1e21c30ef5c1740cbca399465e812e1a91de6ae8f
SHA256a90fc7996fdfc9c8afb34899ed27dbe48962b24f9e9031ae016afbb398afa900
SHA51218f2b8faea1de3a21a33cf8ff087cb3c90a5c27125199b09d6fa6809244c4ac681e787384b93c8d09c8a73815b1b6b9a4f9341f24d8ebebdec40c67a5c7d6f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fab701b2db928d5796c6ffd88a1bd2f8
SHA1626e69e4f8e57b2202ce6ba8fec4d44b61d00bc5
SHA256c1f925b11357b40b8c4617ee51f7665d5868fe70c3fce79357ad058d44ab85e9
SHA512c556908bad2b2107f43bde6042d384fa264cc3eb2eba6439021376cca0af3172f0d55584aa94dec31ffe9fb7cf51c8c12f9fa1f78a1793566a5d1a60ee837da2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea477dce4acc389d214cde2a9b00a979
SHA188f2221aec05919985f898f04de35dcb56c43ecb
SHA25660cae4a848c919bd37009205798e0141efb2910ef7b9e6242fb3a5501a1214f2
SHA51220f76abacf28a87a055dc9b4608ab3afcd8e19644ee508406e4f9c0c18f6c843bc0bc2cb7293d0c34982ec18663888778ca8a28116ef9976a64d1bd5d24ae426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f09683d5142eca1a761673e9b3ee260
SHA1348825d22a820384f36cd8ea8a3ca9193e52a7ba
SHA2561a33bcbb1d7a8d62a6420524da5d67d999cc031cc13d1ae527df36b9b2f75a35
SHA51266e711bb0defcc4d571b5071cc6c27b291c9e286a8fb08ebf2d284a8434dc9c52fad4d06afd673f3f170f531f8e17744409e1888f746958cbce1c235b91b4573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7f53e322e9bcb8b3c172877746a152a
SHA1ee5d4264f5496efdd175af44e7c2bc500444a023
SHA256b04eeb923d31a1810264c71787c8f0441f339517dfd2461d2c1359c34cfee4b4
SHA512a4de903430b7dd0d645ab3227ad5b0fc3966d96633689c321775351ab1071f45dfd5edb7a0837bbf6a21df237b7e5eadde9090936ef38ba707436a053cd2a374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427634ab384b6369082e6766af4bb25a
SHA15a65da0c7aed5d4736b605587c7efe90f0af45cb
SHA256257890d7cf3327a263f61a22a21b193873b06b1d9cf73dedfbd839717d224fae
SHA512ea7ef4dfa466b7a475da969105eaeb14f590c7da22d00cb076c23ae0a5d8c5125541148ac486606d8efcf0cce138dfc8f83576a615c2dfdc396608fa681006eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5838c30a9e8736e855fad00afc0c375dd
SHA188a80d189882847d887bb464d6abe3fbaecd800a
SHA256be411c94b85d3283506b5bd4a2335d8457deb4877fc65cd00fec36be7461ee57
SHA512a91f08bb3b97652d760606f9050fd267a8f09a41bcdd21249d459c166da2a28bcc6e8cabb29d97fda924c8450949e3ca26822bbb28152fc4b5b68a1b94660f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506aeebf11197d49f5cc90b2b31cabf64
SHA1be3ba84e0e888f8a98b1ffad1d04321f362a5aac
SHA256aad9cd10d52f7e90dbfb5e82039bbb37c0761dce2c7dd6ff754bb59512c73c64
SHA5123107f58aa719f94e32c2b802a74b1f6f8367f31f69e33383b5c4c8b95bd5d3937dd71cb184804df0e6e652716dbffa20aeb9c370e957ca15b02f8c4748df556b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b