Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 17:08
Static task
static1
Behavioral task
behavioral1
Sample
a36678f86dc9583d313b6da39ae1410d_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a36678f86dc9583d313b6da39ae1410d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a36678f86dc9583d313b6da39ae1410d_JaffaCakes118.html
-
Size
3KB
-
MD5
a36678f86dc9583d313b6da39ae1410d
-
SHA1
1c4efb1dad0cdb0c4ffac68ef03601436022dacf
-
SHA256
603ad0243d09c9d0d724c447b317688e61b1f196e917b8fae46119ff97efa7d1
-
SHA512
274c04885f3080628424700110f92e536058c98a1d4ed063471b4f7a42432b2c574b8f6ad4d0712ff8ad8176de6bbd54df25c8711e56325108a49a35c48b3280
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b056250cc8f0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000fa14372cca7ba3eabe2c1c340cc5c643cd6f475f9c20c974fc237803a73334ed000000000e8000000002000020000000769a7cbf52f71f124e3b5a9f6665fdcbc328b865f509a3676f0869c0d212cb33200000002dceb0b7d6bec89be5b05441eaaae2a6639483415057d66601ffc003ace8dbc34000000005274f2157166be9b36e4745e9d64e5464be5ceb11e37373c8e5d8ed6b65e166c2cd7e06154ee04a92595bd375a427ccbef99711ed6ae9f6bd2741092959aa83 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4974CD71-5CBB-11EF-A4C8-72E661693B4A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430076360" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2388 2408 iexplore.exe 30 PID 2408 wrote to memory of 2388 2408 iexplore.exe 30 PID 2408 wrote to memory of 2388 2408 iexplore.exe 30 PID 2408 wrote to memory of 2388 2408 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a36678f86dc9583d313b6da39ae1410d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b332cab067c72c536a1d94e99a5e2e47
SHA1e93df08db91b2e84059391734f7070e84ab2c06f
SHA256f7b976c19ef60c0bf330ea60433490c6dfaf6ae35d98ad94ec643ca2b95e3113
SHA512a490e297a8359d3229322135b4563816d47d1132fc82c0990d7f11897044f17aba481771d215533e47f0f6cb538e3a7145aac07e8d255f0bb1bbc04ad2bbe474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565530969e679821109bb71dc2a54629d
SHA126eac52e08ed39346eb84313132fb5e70991327b
SHA256f93cc1ea093ee814bcff380e0dd6dae87a4b67c36d73380384d8d0cdd6ad7934
SHA51286be4c2e60348714db3b4f1d9fb58bb0664ac9b9f5c3ee24c3bfd5e872519598b3abde8ceb98b839c337ba9b7db81b877037a0f2a00ca7db0d65a968f43c83c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b365addf865a27dbb419ecfda3afec3b
SHA135aa6b844b74d47473c409c48d8fe91033b68e0c
SHA256129393b137d36a836407b85fef892f10d5e07d0d5b8b143ef441f111f9c6a383
SHA512794a14c6e981237480405257ec4db81c2d14bd11baaf49dea30a4b3df64dd8b109c60133cf690de35d206051e5eeb92669a901264e580a60447df2bd1775cdcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c634e40f6c834b972c90bb080cb8ae9
SHA1e0d0b997409be2d19842e28cafe06fcff32f46a9
SHA256b5ea0349e2c10fa6c3cb86dd51d4c2b2d7b3ecaf4622eb37efbe0bfdff62f832
SHA512e8576e9f242ecb2593e71d231454884fdb713677697e928853e0707b27b0566f82227c468d308d00a8e2fa40b7ef4ea6e5ca7c7b2eda3501bba4ceb93c83587a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cff57eb7ac1e93cd140b7facc04e5464
SHA18fefb27819faf46feea8beaf2d95c2ea1a7affe5
SHA2567efd99910498dc43a2b9cd130937b114c71e3816f8b5397e0b6201e26e8633d7
SHA512cf19b4127df3b6f19eaad6647adc468cf4e14373641ab97fd9442b565e024cd0b9542379779e8f192cbc7bf316929461c5f1c01626da3c47f1243a00973ac04e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511c2dc7b375bb551dc3c939549f04c53
SHA17389b8c8b0fe592a813618bed23321ece1d5c073
SHA256293be8c0ee2b5cb00395fc489a2aab6d1a81a7aacb3e135d8ac983ee1b313b41
SHA512609b8528ca6f3c8bbd0bdb9b8931f9316e98d2b62eb0db23439be298faf751d1bbfa226680f7d1229335ae3a05857888d024935210e3dc79e8195df166d9de81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e80c4c988ade28af8a81ea9a18fafa7
SHA12209f00c97247448fb780b78a72f10c53a4a7d3d
SHA256d8b19e069853a8fec3fc25d3181d96944bc05548248939abfefdd5c84a1a001e
SHA5127742b00b557360dbfa48612374fd7af1f21d5e63ee5bc96d592d046c704e5d96702097449fde52c990e174603a00a1f1f4c5e9e21741e3e71f2e8bf0cf6248b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538665ec8f192230b9c5322e1e83f080c
SHA1ea0ab872f3075b55759dc7bdc353d733621e11ce
SHA2569ec5065645a4697cfc96bf485cb84167f31927499817aecedb3ee93e32f3315c
SHA5127d0a93155d5c5942235c747749bbeea4821fcb5c5ade157d4d4fc541665e268720cdd7c8647870b6c14ee8962033566ce270792aa74cb90b6bf9402d89462317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573741b43f8551b6223e6207f8dfd3347
SHA14ed7e73a1287a16d03f9e1c9c8ab366e3208a2fd
SHA256a16e1162636addc227ad5be8e6cafed2c4d24883028d87f1b84c55f81f3d55fc
SHA5124e7f88d15bfdfde9729412d5885a85de2e3b09472ad2faa96d24fbc2223ab3bf862e1f4dab0f948b8e764296a54cc086578d9049d404aa51819d1b9f79e1a403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5327ed78f4b5e161ce974019972b2bc05
SHA1d81d6eaab1e0f414c4de9ae4812d3dc568bbaee7
SHA256225646b408578fe4fd2fd18b987a85e212f671523ec2ae46a5b81840eddaec27
SHA512ed71b3e0850ce6d74c0b595225672649b27539e594759908d6f667c395edb83601d9f6a6fb8f277aca773eaf6087021347cb8d38e4bdae1f50b44434c5881de0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0d6254d85ecb4aa0694b74f66e2deeb
SHA1e82074dae3f5670d64db000b41a824aff27fc6ce
SHA256d604d9f588b5fee2fbaec9caefd9f58afa66aa9c777ff6ba85957d553abbf89e
SHA51213d397eb42f99d46ef162329b5c17e7f7f0acfce25520bde4c23fd7b8a1a86c029c7824f2a1a04421bbb326095807f3c28cc8eafc61c5fa36ab7a2f8b729c9a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fc79b138ca7a49d0984b8d014367889
SHA1526d0096e3184b859e14167a708080643cf61d32
SHA256460ebfe8b2ae72f83995d21fd62157ea10d91de51a7c68964e698502297e37aa
SHA51272c74a825993374dafd6a974a61a52b3097e8fce4e3c811e7b48cd6d39b5595426ac6e0a5ab1478829c5f5ccb871ba873c1845a9352d852e5bb95085fb9bdf33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528a07ec79aa25d32ecbb322436dfc79b
SHA18047ffc4850f5cdb8e187de96150619fbb342514
SHA2564d3958b83860d869b83e1154b44435cb9eeac1e5b2b659cbb2c31690d0ef278a
SHA5129501f8f62e08f162bb8501a8c31841dca4719d653ab9e1bb873474fa5b207435e71975cea00e306c5aa914f6e6b7cae14071a24b7b40ce06f42a032647a1216d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb7cc08e1c4e40bf47aa24b085e9c276
SHA1f482143ef73cd936933558ad933f50ecb7e6af1f
SHA256cdd02554d8d3506ebea6c92184dfa584e8ba2225855cd386180d258b5af1d1cc
SHA512d3ecb7d8a967dccd52482b4b20de0e92b74d4f7e48fe4afdec06c526bf427aca256022e72fa18e1802bd5af82b646f69d8b21024f6b9eeec346b5e2ff054ed74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51751a016a14fc5073c9a809fde624d3a
SHA118df28eb4ac009ceae803673894c48fcc54c5e4a
SHA2561dba748320a7f295f36d9c1e44f54b207786117b373ea48d2731ce06453f49fe
SHA5125d2701a241dca6d3675f2360f01e01005c60a5ad027378b82cbc174bd72903c8056cafa8f92c4cdb21b41413019aa83659c717576e112420a81f2e970395ddb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5505e46bec8c8d3fd648232424af615bb
SHA1bb0a1e7ad2a804964ca019eb9c33ea4372317536
SHA256230f98d10b09f47a414f3f4998d1b1a3e6bb5840850dee62c5788d1a3b07d734
SHA5129402d798516bf26a04b509ad2bc5338de3c1668f07b0fe67cc94886264fe6aed1d9eb0cb300fe8f69a876ab1e5d74cffff4a029607d9f7c55bbbbcfd97b89111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa9d090973ea5af9ef3844ee4aaa1930
SHA14aaaf90194020d98a3505eeda0ea5f55fb7c3d93
SHA25610a50bc107c9fda86b4a0f85e4b8e2bb5155be85d09aecf4b47fedb2359e68af
SHA512e6cd373332d04af2a1d5b5cbecf6d59cc79787283960f3ff4626c6c749d159e969cb98684b270e746b5cc48d824c70500c3e413b7a96d4b4c6f8db38df511858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3dc41183769198c04d2d594554a18af
SHA19b0691537a9f60e9248050dc916fc42d12ab3ece
SHA25694a669e87654a013a1faebdaca8194403da27a9f757bea90530c717dcd599a05
SHA51272e08e626576fc40fabf723a3c8c463c54595ed0b774c2f3e04b0eac95cbf2b5fb24e59e11dc0d5bd93acd1644e9787860fc792d7f539091824aa1cfaf7e0ab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ad50474b270647f0905a4f1b231ede3
SHA1af248dddc6598101e4d50d5e9fcd877953777111
SHA256b762c65a9ca88f59fe5947dc5e9b09900e31c949fb57c5e095af256b33886e7c
SHA512d0f06919d05399748262f59f24a78c7418e4ecce5654faafcb21ddbdcd3384fbe9b8047149fddff00da84c5cb636c227fe08c89d4c1b108ce652a6717ddfda27
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b