Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 20:11
Static task
static1
Behavioral task
behavioral1
Sample
948fcdbefa4a1aa00d74bfcb36efe561_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
948fcdbefa4a1aa00d74bfcb36efe561_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
948fcdbefa4a1aa00d74bfcb36efe561_JaffaCakes118.html
-
Size
20KB
-
MD5
948fcdbefa4a1aa00d74bfcb36efe561
-
SHA1
bdd34a81dc92e86f61ae6c0d7a7d2e80ff05dd55
-
SHA256
5ba8acf86b4d5000f549b6701442bf477428e5f71c4813f3058446da5065602e
-
SHA512
62c1412b7e72b79f1e7300bc1690a89b5d6068c82cbb12e3fecf90791eced02d5c410fd11e3dcff575a7f55548c94ed0f71916df5cdbab774c5a65a7645c5d79
-
SSDEEP
192:PVaQT8qFB/pdeB+qrW7txaqzZ/qLcaKuECjDvrQObtTajuS05eFYPrei87FLm2:Jxpd7X6WwfS05A0r3St
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000d90220a341df41555ed343341d7fb5a51c7224f87b85e2d64b45939ad4f24105000000000e8000000002000020000000d8994283e4595165fe034a0bc3b5e78345a792c3a4b2d7b61007cd8d0a9fe5e020000000a18d988f811af5fba3058dcb350b365235fa6ceb7b141d01358dd2a58977dd3b40000000cfb97f4902d962e6c6c5ba7a4683a80d66ca2b8d4db9890059e621be101ac37ef30ca3a699eb651e4c035ecd5ebf05a3c7aacce01a2bd4df0e7a8821bb5f3d33 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429741775" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4543F361-59B0-11EF-A669-4E18907FF899} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10bad519bdedda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2808 iexplore.exe 2808 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2728 2808 iexplore.exe 30 PID 2808 wrote to memory of 2728 2808 iexplore.exe 30 PID 2808 wrote to memory of 2728 2808 iexplore.exe 30 PID 2808 wrote to memory of 2728 2808 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\948fcdbefa4a1aa00d74bfcb36efe561_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2808 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598e84f9c111eeb49f015db1554eed5bf
SHA10739b4ffde0d0c41515ebdd63a21fd7d6b1f213f
SHA2561e8e34fd16756f83be3defb20cc3d18d30e155b55918b994cd697df666fbb55f
SHA512df8111d071e8227408c5ce03db951f9db87ce6c19b55a87fb10a0ba669c74b7e45c94196752185330c393d6e8747ea6fa8c661d557b3d06e5bb62a82bd904b79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c014a6ae5087f657b58aa6b2c86fee5a
SHA10d41a909e03485f02b1909b2c5a576571d94d465
SHA256415e2fbf7d5ce5227fc5135e745ec66015dae7ead11e996fe50506c57ccbaf0e
SHA512a757bf0356206df351e6e8509ec6ac877a20a1c4ef0813311d15dae62247a10486b459ad984b3b78615f6728abc31b5bbe1f5ec5088480ecb8e91865c837458a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50637479c49db89f6e214ab0c36e05db9
SHA17ce4c143653dca2f55b4134dc25df69824cb1857
SHA2561ea23d0ef9f58f11ed817bf48fc1cd34d81ad0d6a1c219fd9eac35e46d4db1da
SHA512b9e07c8b4c7921920def74e1dba0a6c4d2af555b56e617ec4d52bd1c81ca6e0a955e4df313ebb91f10def9d13a6cce8bbce4e0c26acead69f239d5520012d22a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c37d6804fc0ca2721a959b1903128b01
SHA16c14920a33ac4ecad5c4d835d84fcaf66d991ed5
SHA256b2e6c3d2f5b0d1eeed351e83162ae3b57cd24169518e28ef3852fcafe1a2636c
SHA512651036034a8b8d4f6baab59f412c46c15c7f5cfe08b3200a4472099bf1df2a3d369611a3b2f2559f4ace931d51f560188a07619c4e547049381b1f3b9e84301a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5120ba771e2b26949bb485231867229bc
SHA183aa86db2e707eca851a6ecfb13b14e9a14b6279
SHA2569b503f531b427437c63663ec250697de5f2d5f97c375c3f09858829e7606bcfd
SHA512a3ca08dc7bde70a2af1c47dd3a217db13add9ac74fb61f7ecf47032046346bfec2019e323a7752828979214b35f09ef4949492c99f36e2dee53f15d4a98c43e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5076dde19af0a8ad08577e467df42440d
SHA1df21dafd8dc14c32e911fbada5fced42290653af
SHA2562163c0f099776f00fe2699f216820b48152e77962ca2867b2e68e933a39fa081
SHA512ac987f3d92dc48ab99e54db76fde6880592807890d30752f899080fb3e2713bb71af4d4307762156738ed472c92b47b1f99f4a175dfc5ff07b65d3d2e28e17d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c489fdba1173f1d53c2fcff438a3ced1
SHA1cc5ecfe17d59ac4b41f23e137772195195f40c2b
SHA2560cc40728b655f4f53a47a608f05a7784d9df36f6d0db20a138459e780acbc84c
SHA512c9829a8bd6c05637630dcd199c27cb3593a8361779034f81fef6086a1bfb4a4c5c36b37bf5cb21d3836ce32040b9b550b859492e10d9a63ce6269a7658eb14ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c619ca84e85f283ea098200a3c5ffb0
SHA1d59ac1514ed279d741c930d00a9cf8845c6e28ef
SHA256164197a87c2fae65b7e34bf3e6fd854e3268f2d75dbd0473519bc7c5f3c5add3
SHA5122b968ee2b15f7f571737417bdb8449d1c66a6ad352c377af0fbe254510a7afeb88e98b1ca49456fec710cfbf4459046b0d0c300348aacca89dcdc6e912aebbed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57865936f4b4a78c04ae6ecb8b7272858
SHA11d9aa9a3da4e965662df0268989e5060db0816dc
SHA256d8e17496400a44e72430ca8a49e55ca84342bf43aebcd8dcf6f7682847a6b6d0
SHA512d277b77e9dabdc7a534a6d5067fdd8769d68f21acbb35f6c6ce26f79e1b3e221cb58a81353273490c182cf562b1cb3a136372e03289917738eb4341357381128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb7d8cb6c06e64ad8bfef22ef777f6ff
SHA15c435e93c26904ff591a3e2a31f49c22ec521240
SHA256ec7815401711f79f5e9e5bc675506ae873aede76044152baccc81a22b020c19d
SHA51296f901638f3b9b5142bce2a8382e8117d15284c1e359b5c218f7f6abcb3cea2c5e888fea1985772b4690398ad87a2c34791091eb28cc4d7512eabc560d127f87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f62dba91706d31dab0aea53375de5d2c
SHA14b8a9482cb1ab9a019468bc65d9b3103c0a23416
SHA2566e4a356d3015bca279c56bad553b1edd76e69a1569c9f3cfdc8acfe996c00eff
SHA5127e7767e3524c17ebaf2c406babb0d53c46ec213e2f68fc3d92e8450f888aaa065e5ba8db210d8bef35e94084182d5f25b9eca4865d82c76d2e3669c2b5157e9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cba5083a09b97aea1d9c20aa9057a4a3
SHA1474e1746d1115745ee5c5d0e336c759612200d86
SHA25642c779790e3d9a176694b9c54d2c30c64749c917c7b6655b1a8bd1f08b73eef4
SHA512a403c7bcd41c400bf8988f27d58431cd48f9fe382d53ddd49c274a529b0cc984e1672f462f14545f2d31c936e7318185b0921fa2fab071684242436359c4d1e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566d141b83ffafbd8dd5d3fa4d913fce7
SHA1a132a8d66b83a6236b81e62d40fa325500e38305
SHA2562fec9ae30b1469f276ae4634c3ab767f2a84815bc771c3e190f3d601a9ba8cdd
SHA51257ed1bac806448945d48e9341f377ea321777d13b2822d2c89d82053abfb4e75a069e53bd76c2e40fce6b60a1d657661959aa0f60cd514c782bf96728bb290d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0b43ec7c7c9b53f42b26c31fafa7a3e
SHA18fb368d5a862c237aa7de5ccc96ae12abf8022fb
SHA2562d9054fec76c0cd40a52155f66b3e6a416a3b78ea92c29db4178c8e38445fb12
SHA512453cba39a2f4d25125091ddfaceae95a697a130c746b36ce906455583ec6839d7cb03886c00736e93a19cf616c984e1c2488596fcb74a9c582234e56689c32ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c11697363a80ca356b6fa67101f25f90
SHA140e8ea15258bdc7638def3625557e7579a1f5e20
SHA256f2a80a1a2a5168f38c2abd28b92afee693e7fe3d4b646fef0ca5b6cbb386ae9f
SHA512d03cf2f9036f8375ea4b0c0a9687de93f5fb5013fdf126b66e10e5d5bdf61283a805ed10829f8091f2152a5c6b60862636cbc72a178aa6c107e3eff6bd9f90e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a7c2ac5da7a2e1ed8e424f6939ef964
SHA1a63df7acdd187829a2a47567fd76314321df93ae
SHA25648abe8e44f726b3ac7ed23ff9e6827fe8bd0473274dc83a21f60acf8349e5553
SHA5124dc722c30f997ca26e630d17f2eb8e35c4f379609e5c87e5ae188eaf70d91d24cd8a8287fc46fba7a7ae4901dd39a9fb4f7d90b143fe150a915d0278e224b06a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef8f3f56c0678b10c7f93a138bf733d8
SHA133812a771180e918da514b64c112494e1a8c7bbd
SHA256be3ad1b83918d7aa9b997ed89833ab5c6a3b1d9bfc44807e84764745bf20a433
SHA5126691b73504ad69c57d15cb6df47fe868a4adc888aa43c89aaae5b02b7d3f41ae14b48ac4027cad8cc2b2d2dbd3a4edb2b6469d9a827e0aa42740843962745b3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a666fc7e998e9ade0120743d24af272
SHA15341d4ee23ccd0f742148fcc54f5984e73379c66
SHA256bf7c15782aee6d027bf10f90008fda9da9da4d39d7b93cff6dff5110c361124a
SHA5129d981a7384cb1281842c9d1320358a8b48bbb94f89bac0c575f1aea71e30b5375c2ef225a5cb0dfc5f8966d2769676906623e1f136e8007168704ef626491ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c87fd95179a707f86bd7858f99657b7
SHA1f699083be57e942ba711882a3ddd863ccaa58b7b
SHA256bbcd0b905eea57d837d3401a0d13b05a6ffa3917ce5cb0afe36b5f417e0a8643
SHA512cd4b261fe134755bea78ac87b663f7c1b066a0acffc59cac35b1c1f0963be407e2230b81355a33c705301bde9e20ff445bef19a8a80613b27ac5383b17a9750c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b