Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
a2ca1a5ffe85298c601d22ec7bc2455d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a2ca1a5ffe85298c601d22ec7bc2455d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a2ca1a5ffe85298c601d22ec7bc2455d_JaffaCakes118.html
-
Size
90KB
-
MD5
a2ca1a5ffe85298c601d22ec7bc2455d
-
SHA1
3fc7ab7d9f5c4696e0e4637b670bd1dab85d22cb
-
SHA256
b232bd9ac1a687a336d4fce7688516d5eea4b20c94e82b360d16cedd94087e95
-
SHA512
bfedf4649479ded59ad3aa763bd10b65beadbb10c62f6b717b1ecb839b5b6490f4ce19057710de0c623de2cb58b2f891a0eed7a43a9cd2945c222a0156dc264d
-
SSDEEP
1536:Z/y5iDGAzKyFOdNvj0SxEaukVN+O7fjet9ABuJtz3gYrs8clcR90FfeyGEOg:FOUSF+V3AEP3G9S0b7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000274c917f04a0b24a3d7022fe58b329a4e3633f40f6f5b3062e67cf976f4e3cfc000000000e8000000002000020000000f46ce81e27ce5a44a5f9026b2537a213b9295a2829a8b21e400a32abb0cd506520000000df9c2b6a1f6d4fe2bcccfde34a02c380cb8f8bc00cf2572297948789f24b58d940000000e969343c16e842e3a20f506dbb3b632357d330fecbf626d5690f871cfcfa2f338f9d33570e9d2c231bb1d43e5af68bf7a205cf3cf43de16bf353b3f441902687 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0a06cb4acf0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF9DE0A1-5C9F-11EF-97BF-72D30ED4C808} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430064587" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2960 2904 iexplore.exe 30 PID 2904 wrote to memory of 2960 2904 iexplore.exe 30 PID 2904 wrote to memory of 2960 2904 iexplore.exe 30 PID 2904 wrote to memory of 2960 2904 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a2ca1a5ffe85298c601d22ec7bc2455d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5319f4ce57925f734f4feba685b463c33
SHA1c2d83de690e0c0b497a58f5ec095682786dc3a9b
SHA256dd6afc54cda176678007eef0dad2e7cbcd0a3357fcb4d1e2cc28dd2f91c6e4da
SHA512e2f38862fa3bc78f08fad3086de742c64128d19915970e065d900d8ea4023de159cb3550625e1757993fa5006be08d8f9bb305451f9cbf725d94085ccc76b59e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544f17109d0ed0a225ac2f22616934712
SHA107ba102d6e7d2d5408cafaa13e389550bd2b65ab
SHA256e307d8196ef653ab601ee004cd9443b9663c7e79d155a7ae92c5678061a8655c
SHA51243b6718ea51d4d50de4ca27032615cfa6683e8647f2e2d052e7f83ed7a9ab0160105d315348dc186161a4c2af128b099fcc60e4eaf7908f00faf482cebe611ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529cff2b711be5ec34ccb85333629ac4d
SHA108f1129c330b871ebc0fec4a18dba390beb04552
SHA256846f41fd4458e72a374b50eba44f01dc05c4f2605bf403407d1cfebb578fe861
SHA5129d41537ba8aa9fa98a48b56bcdad3b68cfabce29d0e402bb329dfc0a8cf48c6c6fd6c6979e292e532ac49c88eee663fbefe2a121305a3d3fb5e99d0e36405b56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5318dd2df742d5d00ea94b70912045f82
SHA13d989498e6d2175df4bc7d722ec570a4397c95a1
SHA2568f137fe79d5fd1b8396d6ddf110b4985ae16c2efd9ebabdfbfbeec5dcfaf7469
SHA512bc3a20852f24fdc3300d9e21b631f6a32c4e63c6f6e8d775bb62aae4d81bb299e1b9ba3bb89f46e0dd9c9dc3969ac2fb1a2bad98b15479e63797a9665635b020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c05079ae0c74c7f370e7274c00dae1ef
SHA10294dcad53efc1a5a3b2b1b2afa5646d9b2c5c00
SHA256f8fa55d289c2bd05322eb53be328d7de6169391c7cb79397e5470417685c4457
SHA5129967c3bf21f92adf0b0122a6121d4a504d4c384213999c470788ba39ec2f8c4952c1df22d3422eebc718bcc9d6a11c8679caae3e96b8e8b82e165bc1972886f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581af720b1077f7e33c0f1907dc82392c
SHA18059ad78f44102a468ea5d32fd65b3d55880405c
SHA2563ccfa5f2d2d64cddb2ec4b07fd16db49d9af079e54b445ddd9d2428230bc2b9f
SHA5126e7d70504323fa1cdc1c3f63a71eb788244b654e70ce8a5a3e97278c1d81e1d5e9ad1d231e10c87e435a0c658ec3f81e096dd9cc6357b689179e6a0a5fbbc7c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ecece4b428c26533aa3e33c0b33fdd1
SHA1b6b2c65610c65b3869f49cde3105cae22765f483
SHA256498a5388398a5d494cf09f8e603b14986f6ade2c0c9278bcbb4ad1953c77df8e
SHA512b23d7dbf8f7d67fe064dff1cdef4efc9a5b56b0fd882e521d9494a202913e96128023abe4f86a9209a03433286e72ed25dc48c8a6cd1295d08f85dcc4749303f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f1526747311173730f68a39621e023
SHA15c78e1741d999f59036c22fc9bdd600ef14ba7e0
SHA2564e950fc8ca15105f1442dad448a345d8d7714c657ca39a47b0bee36358583158
SHA5128366561762d500227d716d1f174e519f2570c655af7f3eb947aa3c704b476b65fa1d23cd87449f6e04dcd8a6e5e3dec6b93b7eaaaa3a4247c194931315e298b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520c4c6d6def0b8eafe1df4eaf9fd3641
SHA191448120c7061703b07ac6209ee64371deb44131
SHA2562ae8b8e1021e799062c3e82c1877011bb34e74b7eb921bff5ce6a5a291d61678
SHA512dddbe100ae3fcce925c123376c39f2fb59a0bf84b04458fb7dedd7b254e15a3ab09ac6c1df914727fd61572a3a172c99caef7047a0ff27e03456d42fa43857bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572c6ed5affb9e680f063ecee6243c4c2
SHA1f8cea13e69262809edd664dad0c959fc1fa653f3
SHA256f347485658d87419776216a34c54f31ce0509f2f03ab7e94687b396ae70accd2
SHA5124f9c9a57f3d33f51ca0059f22181437f1a7e0e9478c86edb057f5f9cd3e54b58d11ac1d47f5d588dcfaf390bf612997c275c3100c6fe6e7dd22f96cf43e6df22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf1c87d583724daf3d73c4c9ee3e9d71
SHA1b23523664490ef6aeba42fee62b4a9412cc7afa9
SHA256d082b8442c330693359926a53a39d0e48b860520560df36a711960ef41d0e001
SHA5127b6c13b813e4d9e5fb47758b074144ff567d26643d3206b9577443adad652581eced42bf8704d08847488e4d9ed628ac795aeea57cf2051622e4a8632d56627d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecbd43d66ff09d6245d01b256c8a87ec
SHA190090fc74617ef481e68d9e9382ea6b425c04f38
SHA256f03cf7a98fed02f0c91a29bfdccaf94a724a13d1a6ab620bf81b6fb7593c809d
SHA512308b9e41e6e01f90ee930e9721ce306262588fb5978ddd734232a91b20f6ce8e9baca4019e33a6947c25cb35ecaee9c800d66ea486ae0f250b0358aa5ab6b834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e44efcbe0a5d9ef53b663f52b9591ac
SHA1a95a53fed96fa4ca1dbc427787bf4c4e95de3d6a
SHA256cb19ae1a3476c863d3d652871d25525ae6e7d0f78bc3f4df5370e18cdd833be4
SHA51243d9f93f888bf31d8d594ed62311b8681f352f1458d91d02a9d859d3505fa9ddf8e082600afd775c6b18627a4e61e4c3c2e23153ce1d2403cb79b7bd9113a1ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bfd9a8152092f491663ef27bd5f68a3
SHA16e154d6d52a7517a6f05bee11ef87bc1ef68de3f
SHA25637197f62100c8124bf83bfd009463de803203c312b207bf8d1100752f4a7062d
SHA5128a610277c39c2a907b608008f2d77c5217c3f652b1dcd7a288e1b91f0f238badab8386f2decb4d22f815cb2e3e632e6f119d7c86d63af7d2c96978e6e2818fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51653ae3f8032ba301ef131b00694a640
SHA1269e8758b8cade655254f58a8ddfa98f0d3a08a0
SHA256ce31dcf65bff19addfb78a57933d69b9be62ad0754357ca013e7ac61fc944384
SHA5120b74abbf20dc2047ded4fef1cc85aa60809189b389cd8778a784de1e5f3039b550a7870b5373890ffe39065516e9ffd6623f10bdd298b34643074fa312c27a39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5608b9b17700c6a462788b8c38a70a2db
SHA18c2a8f7a0d199fb05899650110245c8d772ce7a3
SHA256bb276015fa1380956f89e7319fed380f20c84f280130816e2ef973a3af3f78b2
SHA51201eb03c93cea6a93bc52a1e35eed20d42c80167cb27e048bee9c72ab2ceb839edd6088c703ea164ce1d39ad2909b96eb436df2c51dfc3f7984756be5dedfc3fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e8bcf19babcfde4f44ca436f8787c4a
SHA1d78406454fb7c6e6de52d9da3dbee7bbd0f402b2
SHA2562a851cc290ed2575a7471b83f4c28baed66ca12b43587fde05ba8720085f2b49
SHA512b93e877c1a31631d858122015944399dfe50ce3ff9b3ac03820be2ba71589b31df1120355e4853b079cbf25c0024b21283a8a34dd906c8f3216012762b7cb3e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0a08fddf618b7930ad6d400d2b09c79
SHA1281fb721c7355c430e9a4bd40254735ebad76196
SHA256477bc7a7f02f2ffb0f6c410148fede0953500fcddace22001f0e583726c4dcd1
SHA5128b0653a3d671200e8def83a8adfb9764b8e0d522c490b435641fa659ed67e58ef3857f66ca426d397aea855f4056ce547a43b5f806791a90ab679009a6a64b39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592b4a0f2ac1ba3b6a2494bf98ab08d35
SHA1f7bf1be42f7a3f072a7097e170b0b7fb80535059
SHA256a314490f0bd6d4ce75a90a5f58bb524acf2f1fff21394630d051745a6f519438
SHA5122bdde26e77f02883400e9648b9a29d850570ca456032f34cecb556e92979d669a077b265cfe0790554fddc1d1b78d886752465eb652088ea12d524ede9f1a1dc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b