Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
9399396fa9e0f654d31b87872114596b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9399396fa9e0f654d31b87872114596b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
9399396fa9e0f654d31b87872114596b_JaffaCakes118.html
-
Size
6KB
-
MD5
9399396fa9e0f654d31b87872114596b
-
SHA1
e153f745a07f68851f849c5e1015f20cb97f7452
-
SHA256
e1aab91d2efa1c424f46ead80ce25b92cc05631e22a64975d8d924333f0c0812
-
SHA512
6b494bd92c14b6d0983738503fe5f23c710c47bc16366b931a90b4bed7cde4102439bbac98cecf27eb475ff4da92aa39e6de0eeca2b3a7a075bcd9e1e07768f8
-
SSDEEP
96:uzVs+ux7l/LLY1k9o84d12ef7CSTU3wZcEZ7ru7f:csz7l/AYS/u0b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000085a6d554fd5fc52572c2154478e58dbe601af29d3826268d43e8a81165c02b58000000000e8000000002000020000000756e180e98fc5d883df1cfa4ebace08e05188dfa5a36f1ad6ec194aa262f9ae920000000f591c2f768c63341e8a0b6ec2e004bd9ce93883db6e34bf20ac58a86fcaf44d240000000ea4d01e548d8f67944cb02fce4d08ad0e53348823bdb1f61a2e4651c3e1a1fbb3930fc66b2be19d56b6a4380676682d92ee25ad7a3a6e35c61e94fef2901ad30 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429723496" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B4582261-5985-11EF-987A-EE88FE214989} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80134f8992edda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2136 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2136 iexplore.exe 2136 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2704 2136 iexplore.exe 30 PID 2136 wrote to memory of 2704 2136 iexplore.exe 30 PID 2136 wrote to memory of 2704 2136 iexplore.exe 30 PID 2136 wrote to memory of 2704 2136 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9399396fa9e0f654d31b87872114596b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521193f485fee9f5e8ab07e67d05c1130
SHA1cf2b1046d2b65747724b572fae0ff88ff8545930
SHA2563943d203009bb4db4266aa65b5ff31c68d7d69fb7006f261ae95fb83c948a17e
SHA512d05f626eb8a7cdec1abbf2e181c24fa355d22f7f11ff9f7404709e4ce683ed9c4b9887d62db47b592cef86509a07f39ba46d32ec8aaedd49edbaf26041e687a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a534294da79314caf008b4870a78724
SHA134801962cdc93790aac4f16f49f74c8fc2e93eba
SHA2565d4d82f55b22adcfe7225614a91ca8c16b7da7667b4ba058d2e3e1991eccc842
SHA51253cf1ef937fd80a626dbba59848165c7273548f2c7e885dc9e74bf2e15599e8b19dc38abf23370061d4d8c92526e973197de49b3bae1a69128b77b3f1bc92e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f42b32400f7cd8c676c6fdd7a46c03b
SHA10f5bf5dbdb6764e816802c35a4604abba65fa2c9
SHA256cc685ec2fe919b977769d598ebf82aa00d0a76473783c97181eb3651d4a03fac
SHA512da6de2ff12cc524a1cd000059712a6d662ecc4ab10ed12c9c024640c85bfd315f1d6d464667551c1b639677f7606a4ad2cf0874d13f553e2ceb5f3445030d07e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f72cc5fd4c23305b465cd341510c1e8
SHA17ac9008ea22285f393fd94d97ec8dacbc05937ba
SHA256df007d88519d0623c1aa8017f9722703aee00a22d7779367ceb4bee86c123210
SHA512d11bc01acc8acc39ce0f866d05b69e6727e2f73825a31b5e53b0ba4656c4c5d70442886d6593055b6b337e4f8611a167475770a4350ec486d11506db2f32d384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568b458f2cc7579e0e91ce75da0b7fca1
SHA114acee45a91cb65c4ebee909b54adfc3a6339e28
SHA25669b81d891678a32ca8997f67595135f90eeb97bc65c244a03825192e5168b53b
SHA512839c4acd26e6e3fa49c1b2c7079509aec6fa716c58b1e438a26cf70dfbf870e4da15f2c7d4afe103a65ee4c811401b09104565df7b43c2063ef8a8db1ea642d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540855938fcd2b2c266dc044f5c8657ae
SHA1db31042efbbf9b919d5e18efc91f41c01282dcb2
SHA256b12e22d0127cebb54a8ad2d24c1d8c33a852837820c7ad83e9cc9f3ed632c995
SHA512b21e0108defd2fa5e2e544f80c990543609b5d3429f8c9eadbccb69a75637313af4d717d50c6060407d2ec3dafb628e02eda7f6ddc7d6f7d7285cadecfc2c9ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544587bf9568e8517d81ebbda9d1bdb21
SHA14fd143a613b69119bf5643cef4420f7d1b08ec06
SHA256b8bec7f1477f564919dc91fc35daed7df9ed06e0c57b4e86aeb8c74db1e595c1
SHA512d4f40660154f0fc5b78464fe8930316e7001c567d23eb944caa49c0b30bb2bb4670aa168e975dfa733679db43f3062837465d5cdae186f78c17e94626c6e6891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558b6aa114c32dc464ff36656cca453f2
SHA15432a6a039daa13802092c4a80f5ea576b7ad90b
SHA256705e18347e8df383df5d1993281589bfd17aa479836c87de2e02032d3457edfd
SHA51220771a50bc56c99a4809bc860eddfca44e16329e74ae7125ccaac5ebe38be50351c32878754991b91d9377e5f909e1abedc52a67a497b0b815d6e2d7ada3fffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e3072017d3afed455d05b3a5612d923
SHA1e3913d2b8b2d02133a0ea9e5b81dc55b45fb5a16
SHA256875bf4b594a796831058ed4efe7d2d829852c3413d5bab2ef2898b0449f4e4ba
SHA512c177bb0019372e0258c3ce3acbfe57836fc65f21ffed32dad8a8e6e52e8c1568b7537d7580ffc0ea452966b1c96075083d8bb31fc3d961451f9a02cc3a5e4e84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f1d244e7cab823866ae6ee0fa89e02
SHA1a20f4721ac260dec145ad6c35fd9b27863b8aeca
SHA2563b4a661717f81af9a76d88bf5e180764143530f3ba9bdf9016c678bb538f3fae
SHA512060dd773c6c1aa3e31fe396d4c28b4ecc2e776210c84d8bf267da9ca62eb163cecf572242a95de4f8712d8c0b322d3c9972225de332ec2bba9ffabc9585263de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5251a3f4fa6eea090d341b8c0e409b6ba
SHA1d91d602b14487088940be5d31cd0f9db5037d1d8
SHA2568374836343ec2457d9f0462e7e1a69727deb3d6979139bfd5d80b1ff92f8d4bf
SHA512c84e7c89f5f20ef00444074bd6403c3636033a7e2117fa410238a650f6bf3f348f93ad8fcdcbe4ccfa0903586f5271c1fb1f48bccb103b9ea7560ca72d004d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d34439516b86d34cbbc602c4c492fbc
SHA1f634531bff6c3d9618cafa55143d057e07b3d40a
SHA256f9731f6a2b5ed787ad979d164d73fb3316cc00b8c3b1f25dbe40c13100bd1673
SHA512ae2122a4a2c1e2aee0dcd987def484af04964dd4471fa0c08d5f66175cba37b8439e31fbd51e6d01d26dfd4e880a48d72d6872a81ca6fbce63a575a50b6c8396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538fd11082d6ddca82a50424315a56266
SHA1923db6e8c75494a10b0c7766a79e0ff59122e429
SHA256c7b00232b038117f295f0ae1d4117abb21767f8585ff5562754332ef993ae7d8
SHA5128d2d3c37bc576f83f8c86b3e6586543b6a8e850678588593b918796d84f0d3f975f19695b9f5b3ce65ca026b6dfd348090e670590542f34b2b35fcfa79307630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cb7c50c2f8dd5f39340f7907ceb8647
SHA1ac17039da695313277e5ed96691882ce8335c7cb
SHA2569cfb3e5782f9fe73b026feeb142983d65fa2fa7ef03ef90c349848722059ad80
SHA51297cc605f5c3b24303e78ed5b1a78ff83e6b8e1eba4804b05b70f9d22c93c12e6cadf93e56c3445ad4facadee41c7d463a24140542adf717acdd0d7ce511485f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7637583acd03ac4b06c1d3cb7ab554e
SHA118ffe1173aa45d9b8a06664d0e6812a77f3cb6a0
SHA2563d9cd1a4afc2294a03e2920a2646e634ce1cabde8f99c610bffd030d9652eba4
SHA51214ee2085182230d337ab170173e67fc3df0149bb71e0f79692ed919e3f042895794908522a7e1fc542709ade855a27825f33ccd64282d5dc45b4bd9795734b9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ed2b1bf16e6e0fa50db2432538e3e6b
SHA11703f3ca80cc42da74fb9bad55244adc4c7cb9ac
SHA256b30c1b4e962860bc74dac28137e31db55cfc92c4270e16253cd4851ec959bfeb
SHA512da9eea59223eac113e0618475c77f95b61b9f1b5b1a1ff592efa3652c3cd57427e023d25281d1df3fb78c672438eb8e0399cbbed39211b52f4783536c943f859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f53c0697d92c637326193be6a9cd08fd
SHA152ef6722bb76ccfd632932a07cdbdb7d16eeb07b
SHA256dcb67828f585b4acd9a27e64683fa640e8ede098d9f118980e28bbae4b0c0d0d
SHA5125501890d2f51fad9212ac4f39869772e00294e747aaf4b5a70d3a7cbb318c2b7c84ca2b51c4f62f02368926d4399fb528a778732ccb96dc56a4ded5c15afd3d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8296af3bc45d7cb540c2b6f5fb5b2c1
SHA1edb16907874219eb0150c8372d9de90d2297de01
SHA25680aa96460dcc2d375c4939beef01053bd9c5324735318ee7608408e9490f576c
SHA51287ff014552eaf25522bc25219d5c063f9c449c0983fbb92afe44c7f413476835e90b4ab8c4c3b1f467553eaf2bd68e27cace282aa05cae27d7da135a9e5e3bbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522c53d1577c77822a68ab39d2f679997
SHA173399f8f4dd4e06795f5569fe03790179d0b562c
SHA2562c6fb4ea8df07d16ce826a977c15407897d8bbeec8df020f098313ad5c03c508
SHA512c522a5ebf8b24f0c3c9e3785222105c96946bbca3f87280f991ae65da96c71abd6107be767636a946277ce97d8dc4228cb8e48db98bdab7c321e5879406655a5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b