Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
93b266a094660b4ed7ad59129f6ada94_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
93b266a094660b4ed7ad59129f6ada94_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
93b266a094660b4ed7ad59129f6ada94_JaffaCakes118.html
-
Size
90KB
-
MD5
93b266a094660b4ed7ad59129f6ada94
-
SHA1
6e89888882cfe4e7b7916160dd90a75e8c25d275
-
SHA256
47c4146dba91d4c79db4c5aaa128cd8fea2d981b2bf2eb2d8b40748f218a58ff
-
SHA512
39aca25d0b5b869236e3be3ea6b8297a4a0a8cf948bdac7347b77eab4fab7469156e776fb143868b129afeb2ca833a531a0e2491e39715b5b9355277fa28b3d6
-
SSDEEP
1536:gQZBCCOdb0IxCYueDXBUO+wEC6wn0zkVngUF6tpZMvHY7PwvAfUBzRwJw8XtKzM4:gk2N0IxD9Pd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429725288" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E1A548C1-5989-11EF-BF62-DA960850E1DF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000009bd227f53862020d4dd2bdb483386fa0d6cce821cb4a17192a5961beaf6b8dee000000000e80000000020000200000001e3a6b94683da40e5bd477e5e7522540306cf3c49bbf01ea06c78533545f475c2000000069baa6639fc8b491532943061d154633f581eb248a9375071e0b17d4cb5624d840000000ae73abb907aff72e37f11af25803c06ed4c1eaeed2fbcd4494abd0b51e7b19fef0613b498232de89d61d6865ea7950575324b3ec74af2be78a05186fb46d0264 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f00f59b996edda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2064 2992 iexplore.exe 30 PID 2992 wrote to memory of 2064 2992 iexplore.exe 30 PID 2992 wrote to memory of 2064 2992 iexplore.exe 30 PID 2992 wrote to memory of 2064 2992 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\93b266a094660b4ed7ad59129f6ada94_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaafa2ba654fc443a726028ece9ef89d
SHA15901e1c33cbebdd307bc5b9ffc2a051ec96c3938
SHA256294fc491b1000803948da961d461a3e2ec18f5bfd6c89addf9d24fa350c270d5
SHA51276cb54120aaa4f553fb65adcd9069e2209a54ef96fb565f5365060f06788c2ca556fed0bbc961bdcc5d9646a83e5eff0347f1b6f932076960990b6712fdb08ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b64e873d313779cbef10ef9475a33b9f
SHA1d5dd934455f7b3a67e8d45f25cb283b361768ea1
SHA256284a227335fc3b1c8f788d00fcd15ce023b2727b00be57e58580dadf2e561618
SHA512e4e54355eea0709d302dbe4eeda40657a9cd2ae5c9a6b67266e00ef6323c74588e1d32a7e3e73b07082325af84746069922fde33ae357586467f05adca0eee00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3aaa4ae98fb5b9996672e0ba30375b3
SHA1415d206c015caba6a1dba56f4eed6b34dddaf773
SHA256eedbdfacc6d5a942b7b8893351f5ab4781044f3acf0d12a52b6121fee941f8d0
SHA5125147ba653447b3df66ce8be7a37491025826e9e2e8af937723ab687b77005e4ba93e15c97da52ca0f4ec0d7272f8208b9121158cd8cdb3f3a449de9adaf86f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6da5478d04bec2d82b11590a627503d
SHA15093f37393f5ad17d111ec48909187b4797c04ef
SHA256f874e16e26a6895fe4e86346cba909f826e8737a7a9e6693722e725c485ef3b1
SHA5127f89486002abd206af9446bd6f0f7dfb94a62a6d85dc767172f11e0c638481397db82704eec00611c4c9b00a4059dd337ce9bfee1891b486fc116134608e3ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e25c25fbe195e4b831d223849074f3e1
SHA1495eda0d78c13468647076c52049e8a7e896ecf7
SHA256752ec95b82adda51166480bc9d166260721902250ca1c6966056e24c1987f3b7
SHA512afc831430ae5472557e190bc21039b51e292935318362616fe2b14f2e38a571383520f16da0548458ec565e04c79c8a67954b48c79f19d2cd00ba888dca578fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7cd551bdbbafc2ed29cb21665b42503
SHA19305a21efe42d51f9710be6354e7862d13c7e479
SHA256cae8ddcc5841afab534d99ad5fa47a49069eca139c6837225e21c54e7dcd622b
SHA512821ba228b4356319ad9730139551f045b29b9aa7f69f6dbec3d6ed5bd3a095d5782bc544f78d79f1f8d67492a85ba5176bfe622a6663416083cddb0618bac150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57241f352d7d6a10e59bd9b6a7335dcf5
SHA1a2f039ea439255014d079f8db17cd5054de7c7e3
SHA256fe3ca96c11c2833e73d213f67903135e50398d70c168cbd30830edda75aec81b
SHA5123b942da57fb133febd4fcf434b03523a28efb683674715ade92acffd1b556cbde1496d2e4d2f5a5c3cc1940b49a1411d3b89cd542c08bb9aa1a620acea72ef8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a14e776af659ace01e8f6a91b6fb0a60
SHA1973f55d934c94708403001a652fb2e899c46f353
SHA25623243393bd9b4b8c4f5402f59729bf7fd107052f5029d5f823085d1dc55c825a
SHA512bcbb3ce637ecc3b1e1a6a4e33b27d81d450f27ef9b51aea01df38086abd216f183099dbbc7a971bdc69cdb01b4da472875473cf98956d7724c7d994432fdea26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd73a79e7ea03b504a3c3b9cd7d8dae4
SHA19b03e3430b9efa89070377039a2dd62d8198bb2a
SHA2562b3c9473927fa62433875d382f1c5fe068b957c9aec17dc2840479a487d814e6
SHA51242ffdfbb8b4d5cbb006e20b3fea7f102524da4124adf4b163394d9220b3d4d2b2dec2aa8a7da85871d31fbf447eac97fd91ce83293cfbd8ce36d4519b48ebce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eeae481ea8c1eb8b6779731c7b3fb7d
SHA18e946e075c6ce0b6a4b597e154ce406e7e923c11
SHA25642056a984a8ed4f0e9780cfe9d24fc0e48e88c42b556622199288379616bc120
SHA512004223ec1c0915fd9f250129be01c23e6702db2df92391020d75e86bbf8d9d2e2135a2d2054b46d747f64973f75650bd0aeca3c812072d81c6ef445595809e20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a6621177b3b7744d87e80670ad3ca48
SHA174c226d70ca8a0a577c84412f26ccd7a88aa32d7
SHA256f365efc36a79c821e9594a6bf586d14c007b371e725d50a3b5e6296ce71881b8
SHA512420703eff93ef7a16e04c07867191f79286652cba85d181caf2681e4abd8b9184e2f8f97bb7a9295797486a75a7628f4d575072b2f2ddc2ea6069d1c8e3cb4f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574a5a509111f7307b37d690156b5f1f8
SHA109efc6b0d16897b0d30d3b35df9ac4267173e523
SHA2566dc33ef2e2cd51229ece60e7ddb84a18315967f618a7b1b02bfb17b6a526450c
SHA512b41628fdb18ce830c5ecb726a707a2cd8dc387193fee265f8ec5b332fcade55e0ddb335b7df885f497f6876167350e6d06d3eb0c44c30bf0bf4452845752f3ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dd29e20955ed1e5b48043cef9185703
SHA12a3b3a283a64b70cddc78139dede3fc8e9268b8f
SHA256885313140c5f544ca2419279c9e3d6102413c7caea59b618f9068617eeb3230f
SHA512b43882bdfcbe299e6653da4adf3c0b0fd2df3c69934ba6d3c6e3d988adb8d933f4966835c42af08fec39ef30881db50b20abb40a2c50079c90f86fc294468975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c3127af4c99b6cc823faaacb8fb9d9e
SHA1be67d20eaaf8a3a5bf85a0f7b7d86dd9e7dc78a6
SHA2565299b6c3857b490f3d3aae35bebfe992d5396666f56a4d76d35ea19671120f64
SHA512afdf164e97a525014d201c5989895b9385bc2eaccaae6e0348ecd89be959716b084bd11422997570c846c54c14344169d2c5c8a38c89d310b2d5bd47f6af665e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5512c942e4210d349a97de2a30f1b095a
SHA1ce2ac028c9d289e6b07f574ec969c22fa0a7254d
SHA25689129fc0db8dff273dca88c1b718506017a4de39301ed5ae97e2c28803712a30
SHA512b7f1aec595c20c38484ef6aba8f49420b9387e7b5117d7817c40b61a788a1ccba4df7f04802900f80ca44d7e7e36511342a9a269a7bb52105482c46c4dbe6dc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faafe18115f3ab3eafc145ef77a9945c
SHA10de9caddc2be5e3f88bb625802ddbb1448b19bfb
SHA2561cea39183e538cca49b26b2474e4462445792fc2f44964828755ced45b2b21c6
SHA51289b563054bacf6cfcd580c6cba356fb411fa2d6f519446c6bee3ed9319b7746a308f9ae1c693c9e63d615a2641be2024c8e1e22ed3ee1301a4f7035bf34c7be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b8a56575c42454ed122d041d02e017a
SHA14201d484422db8a62fccbdd5cde4b05d9a7f50d0
SHA256dbe23cf21657d0e894dfbe54afb22caa64cd1b4b8dc5dc8debd40418408d5f7b
SHA512951ea549d70c97d4feacd490bc06eca863b0e3dd06015b1a1a4559e43f460c93bcab5594b536982e28d0ab850052f4efb0412c51a89b30e37983dccce07085dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54338f9de96b855b6218e2dbe3b6ba69b
SHA104c0761e8827ab24b8fb59886881c45465280bd0
SHA2563e2b625ff01f71b8881d5feae1584a63845c18ad9fb6a1524a59cad01c1d8dd8
SHA512f3ffc4d2906c9cbcc56c6015cfd3c4cf22531d4d34b8becb324fc624475f3204d68d57e7a3edf1408a1102551ac6468135b59569a0d093cc29af238d6b4e43fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5424e331a6ae882bc524eba8e2faca66d
SHA187a055f6ef491cb0d08f06dc1b9a34370f7fb4fe
SHA256bcb6a530f20143e4097304654d4a09290438cd303e4be84882856dd1abf8a283
SHA512dce782bc08c47003dea5ee8bb436b2bb8ef9b5d4cb1f9f8b3770641720b281105820311a42b380d94458a598e60cfcaec852aae9c9437d0bdac8736948bd04aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b