Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 10:25
Static task
static1
Behavioral task
behavioral1
Sample
a22c91070a6c2ae716d7c6f19337b914_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a22c91070a6c2ae716d7c6f19337b914_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a22c91070a6c2ae716d7c6f19337b914_JaffaCakes118.html
-
Size
9KB
-
MD5
a22c91070a6c2ae716d7c6f19337b914
-
SHA1
d3b347729acb76f8b267e80dd4b6dec587e576d1
-
SHA256
15ed8cf51c5423c507f37d88b9a51676dcf5476f2c0e7b5c27254282df09511b
-
SHA512
b25769a90ff1ac4982bc5a18ac75532137fe83f854e82d4cdd54c02512ae537176c1de5abacfa773fdcf8645f79049b0589ef7ea9ce837e6e1fcbe7dbdb5c4d8
-
SSDEEP
96:uzVs+ux7wSLLY1k9o84d12ef7CSTUeGT/kENpHFb6dalVHcEZ7ru7f:csz7wSAYS//aHFPPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430052199" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000ac99d6df015a048a696ba8f1359a0ea346d4d012d548a1909eedc7f7a5943927000000000e8000000002000020000000a19c63060f5af68620fb7d33ce543df692e021c68235b4ee528681dcf559c033200000007e8ea462029dad084333ca108d1de24ac25307406d84acdd195008fb9807901440000000a825950f9d70834150bc6a75ebfd9da8958e687ec76c09a57075da2d78a3ddab0be0f572088baf0be65824f7660dac8536ef5dfa006e5a5c33d5193962665175 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8086efde8ff0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{08680281-5C83-11EF-A6D9-6ED7993C8D5B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2204 2068 iexplore.exe 30 PID 2068 wrote to memory of 2204 2068 iexplore.exe 30 PID 2068 wrote to memory of 2204 2068 iexplore.exe 30 PID 2068 wrote to memory of 2204 2068 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a22c91070a6c2ae716d7c6f19337b914_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c3c36458f26c8c4e601192721f53977
SHA17a3d2e2054b0b056b0e905e00d3702466ad431ff
SHA25699643fc4cfcdcd115ec75113bee3bcfa138a54c7ceb0df4fab6e37b6be985895
SHA512bf9d4012d1116f808c8fc3b2c9b048ab210793370858f1813166cf913c211c09aff91de691321315f08dd118b7bf3b0a2fd517c1f4addbcf957ac4b820f6a987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58093540eda05b5374fe39056766c2b2f
SHA124d2a77cf98eeba90865d4656313514dd1c26b09
SHA2560113dabfa52b5e6833bcf858eeb4c17726cf8db1c4242364621162f7b291dbf0
SHA51269be1ca0dc3bfecd6d391bc8d5dd772720454cdb678fbb0bfd06f1e755afa45476fae7aef9134e919c75475f5a378b12970b0900a39201fcc48b463709a0efc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6bbf2ca51ec3b250384ca186245c2ed
SHA1e04367c51d099ac6316fb1446cbc78cbd7e22e34
SHA25619413985c324b4ca77c8f71fac4ce4d7fb34245184fdedd6b9bbbffb40b34860
SHA5124cb7364ce962b6679e3dfa01752904ccea9f7808a2c4d51b808ae249074de1cab405344e4d995943a6dcfaaebec7d3d7f4b9908eb9c6bdeecf5b3173a7cc3584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0e24ef5e9dc7c46d9a80460b00c1486
SHA18f490fb75eb5e304b65af0ed0e2f15f55bcb58d6
SHA256e19fbf65f16ae6f886712de1ff95eda095f9541418f2a1b43d9010592eff6464
SHA51237fe112d01c4cb3255e7951b1c8abe8016af22200c4b7aa9d94bb75337ef2851d15d521e560d7ab1c7cbd953bfdd6d0dd48d7d64644f40f1db31b3204fd2391c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2d895a53b60f763f8ce5af351573b1c
SHA17f4bd0d5dbc7b828cefbdff2bb40185f9a5d17b5
SHA2565d9b491c3c36ffb7386302957bf4b64e63e3c98ec079d824574e4619ed19ad58
SHA51288b096c8ab5894a060d421f667c1f47d27b594be816f48a93af2dd94ddc3dd62794c6d11a24a4b8be14f2c415ca73923bbb541b09a686c3d68188c0536c4be7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b029f8cb8d7451dca008eb3419498b56
SHA177712364b3fc84ed38d421240c8a578775f96fe7
SHA256808d37757bfc06c2e3259dad8ed380a2235366cdc830b86dbbf80dac163b0d7d
SHA512708bd4284b90cb38e8d17ef5c46774daac9ff2f20a1e3af383b5197d3c897991bd2822879ea78194c4a516034b8a4fc2b437f7172a9b0765bd33cc343ed144a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f279202a025a7195fc6f3ab6c7616bde
SHA1dccfcc9377ccbb5b4cd3ca634d91408b443f36f9
SHA25641e9655e3e3d39acc1d93284b034bc4b7185a911f6a8dee6226400ed4b333644
SHA5124c7102378116ac3b2673e9bfa04399f0cc33f6c29f9d77445d60be89f1e387d22ae660cf938dc2a1fe2b6deca19d99133a543e940177b7cbd0e70ab8cae58938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577f7ed0ce61628374fab983d717ac2cd
SHA14ca87f40a3c1ee6fe5bc7a5d790392e2b110382f
SHA2568acfcce16d86db35e48ad3d4593a1aa279ba80b6e5443abdeb1f1364dc6a20a8
SHA51267469e468a61579753f1d96613b2e23a6fa67b22da3f2dcfd7bfe3e4401ab962332aceccd36e8f41237902fcadd2226f3a1364a71ecca17e02a36063633d2d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ce1b2b580dc206b59057f2a7e31b088
SHA1798cfcebd51afe5b8ea0f4d53c57747a1a3dd243
SHA2563f653968ecdfe1ad55811738b8a1a7e00b204235734c56c64606028ed3328064
SHA512afbd3f890ab0ff698ea4ddc27a650d80b2db9ece12096f7c9479d1507f9fd71e03f9351244424662cbe73c83b6354b80b47dd2b4538f6044ea36b8927464c404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5843d42e640cbcba030f9053ca392a47a
SHA1b4f318862f9605ff1a19aabdd0513ec60a09bc7f
SHA256c0a95898fec38a196efc48ce5db55bd9b527508212a7dcc26c82635d8045f580
SHA51272ccec245b8c80d8cf5e38087aed38bf8b74d7d75240c4c00d21829dee772b508e82a5823896776fde08c6c6a20e28c404b7e80a8695d2dc890e50de0b4c19f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceaf6052c5a4a5fa6314117dfd7563c1
SHA1ed58ffc502995bfe857c1d47cb46c81fcd65030e
SHA2566a4ca068ebd04fb2134355da9e8ff93544132d1c804caee662b2cc7681832bfd
SHA512cd1dd99afc34e9c55545a57369bb556f89d976ba45dbabe7a9807f8627ce81fafde2af6e61c88cfeec104b39bf839f2f55fc2337061ae44c11b8114e71728d2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bad1b2f8ef55af7801b0ee51e579215
SHA1365449973ef4a56debc9b15bbcc37cc68d6066ed
SHA256ba3d0448c7fd8289d5714f512f9bbff8abaa3d951ec0482c4fed1f1b67f57312
SHA512567ca5128487ac4c55e02a3d15a4ea1613d66dd3b88bad15d4dd997345952d397bd47cba3fee9b8ac0e0f86ad55c1fdb052d6ef5363cc932d9ac15b174c42a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed6ded56707ec3f8a7e9c4eea736bd11
SHA1c68a2ea0fc3dbe0bafe98de036e2aabca2cb772a
SHA2564633b026142f225ba55e370b3e9caaf12b45d3b3fbd3606672cc01004df393f9
SHA512f8dfbbdeb700ef3e19a11ab6339543bf7360e3811a7f641ef7f204945ef10099f712fcf89f9496ae95dc7bbd28a336b855757e56ff239ffbf9b2a05e3fc0b25e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5390954797fdfa69a4c631d2866791227
SHA1bb6565ff5883d06e227e66959f22073b52cb2b1d
SHA2568aed6aa8ccd632f862102601d24c995a627b29c236f430d3b084a56275836542
SHA512164245a0f761dde8a4462e953ebed58563236d6ce9ec761c01a4e86737a7ea884d5a4333d3d083191ff20d62c42eb34a0762bb53406cef402023a9a0a3b5a6e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce7179d98f1a2bfb7ffa9dd75ec7d1f7
SHA199a589762e86b5828344c96fa923210cafcbd1ba
SHA256d906c966baf43a86fb4203e3ce5dc3a5a061906752dcb3fea5f45a42e5fb4c27
SHA512122ba853883654d9e82d6fc986c7f812bf1f95ab98c1d3631fe9e3cf01b61d1d9db8aa50c2fccc8fb33486ad0b28d8bcbd72120633bef07dec9decbdc1ddb01e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdcd9b8b43882dc99f4a50afae20558a
SHA14986540f4e483574557b6f9cb886fefdbfe4ab96
SHA256620dc778f11a4919f8c024f1367fc8ea1d33964d95e28fe34f4e3b88be1cad6d
SHA5123b98e245e55d2e8ed3e6fd47c9f105ef5f4a47cd709a7223ae51db946cefba039d401c5cc9441d83491ffde05a7d4f1b28e732c01005b2254e083874be2fd810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e7c4d51ff4a13bdd90bd94bb6bb741
SHA1d33f245c14dc1d62453a055e630c2e431e2398c3
SHA2568687bb16b87664e36d7258781d12f258538f7bec51f0adcfbb0f75a3a95c8939
SHA5127c446dc398ab93cf1def0adc35d01835970098481d4be4a6b2756e38ac2b08738a483783bb8e2af35da3e4ccd36816aee6eedac068813ce5608ebdd75c9a3482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efc797fea50c7eb61d09599f5c5a9f11
SHA1ae186130ab464180d79e1545a2e9c106f9341ddd
SHA2562975ecd2f09b8c3c1d7ade5c1898afd9c092e24bdac2ace92a9118c40a0677b5
SHA5127d2e4c70d441834db3c681c172f23d1f8469856a5d2703c65fc90fcb6e602b47902adb775abe8dc2cf9ebe45b1c00938ee37741b3c888f48347cf01261e86362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51277dc175a1d483539c57a344f37b428
SHA1b3b64439f22670825c5d32c5447864dcc242f504
SHA2569005c79fbff1b83db1a27e9a9e0aae571a558e30c09f0229c218b6f5d42d246c
SHA512b80e7f60628e7517450f84f827947de774741db5c0ae83e5ea4c5a775c26eda33ff01eedf06097b8e67f3414491082ad3f836d7e35715f5312f2c3edf307d5a8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b