Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 21:28
Static task
static1
Behavioral task
behavioral1
Sample
aca759ce4e6dbab482ea20e544afeee9_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
aca759ce4e6dbab482ea20e544afeee9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aca759ce4e6dbab482ea20e544afeee9_JaffaCakes118.html
-
Size
37KB
-
MD5
aca759ce4e6dbab482ea20e544afeee9
-
SHA1
557a5152ccef80094ef0c81b8b1675a5f6746441
-
SHA256
1b8d5ce63d131bd95cb27f3037b39962c3f73d28b861ccb8bdb109e69541703d
-
SHA512
cd8258958a7208dec5fc8bdeb30be3b521bafffdac0bf044e27aabed041fa5de33f400e91af5fc09c82e75c522d119328f0f1a1d6131e1003d599c82890842ba
-
SSDEEP
768:zI+vbG2+0MGi+vZGIikHhGRGXiOgOeGBGlGM1ewV72EwcU/wOendEIfO:E+vt+0U+v5ikH/iOgOVUUYOH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD2A6C51-5E71-11EF-9628-7EC7239491A4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000010fbe9ca91d4af98b242891c8ef93ecfcfeb0949a6a58ae443197708b0b25a2e000000000e80000000020000200000008ac025ef06c45ef8ab625f50eea0152378b9a8fd64d0e4d43a312412348d91292000000003868732ccb3a8186ef7a8a3c1704d75d8ff804a84cf7d9a399ba248f69d5ae940000000e1513b7cc9474538b919ee046f3e01be5c5ccd357cdf623765e95d71b3f89db2a00d9b4a7b6c208f099613c3ddb1d30e098eceb4c495a2ada413bbe2cade6147 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3008add17ef2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430264782" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2760 3028 iexplore.exe 30 PID 3028 wrote to memory of 2760 3028 iexplore.exe 30 PID 3028 wrote to memory of 2760 3028 iexplore.exe 30 PID 3028 wrote to memory of 2760 3028 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aca759ce4e6dbab482ea20e544afeee9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529715800b42307a7b9bc89b979de2e74
SHA12fbbac4de54e09f48c33f54787f8c529cc7c0e9f
SHA2562b5022b98e2ca5d81e52629c0e9e9513d2ef0584da411164dd1aded638740ea5
SHA512e2ec6360c81e31edbcbd6a18b4767d4f783a00dfd39c68b80e4e0058491100362bc0721f3e3f8b84e103229c804c246ebebd9c4d948bcb738269b021956cb490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a919a8b530f8e29971b413dbdd4852ce
SHA194b65080be4f5b48ee2df7dcbd2cc17b08fb26fb
SHA2560cd571cc873f83d01187262159a3c2eac04894c4fb92ede868cb0bf448983a1f
SHA5122783a7ac45b115bf9149492aa1bbcdaa4a117dd6e24c5b6f8e8e50bf665ec20714f6406d84d15f2ac102ce872d52ea617b8cca9213971f3ee635ab09a68a8f7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aac3c4432c08d6c5e05f26a2806bd44d
SHA18c330a7aeac590d0bc67825361aa5922eda1edbe
SHA256c503d3577df7f9cb1aa08b892d2720a5dc85ae13a397a68af652d0e80ac6ccbf
SHA512ca5454b3cd93c7c9855446b7b2fdfb6b2b32b1e8f0c8b6fffa216a0ea59721af4c3d6c78c383675f86170e7c8dcc4a64b6dbe006b8638593596fc784c66ef932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5a0d1add03a405af8909a7ea4bcae08
SHA1197ff3a0df1475f03f380320d0726b58077dd614
SHA256f4ada83ffcb2a06f752d42dddeb5fb2dee145b0e016d8c4c353756ec69b418fc
SHA512a5378717134ad93b485a09168051529b4b33d89a91c44882fee20da18769e3f9349d420ff83a3532ff162d620a08d51174d987e961ab2680be1b919435c86be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a63a2509b4d00bdb75e422fefcb1c8b
SHA17a5a59900dc19516d8cd30aef146e685af88348d
SHA2563bf73deed1748f73609317d912590a76cbf8507eb3f4996bd5199bc7eba7a50b
SHA512e349ea7b1157568d4dd3f8fd6dc0065342934a19f5ee2e700d1ee0ccf841fe995dcedb833bae9b37ec713fd4884b87cb0cd7a4f78a0172495fc9f1900b2ada91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e50c36f1f54ba71eaf0da69f7b6ca2c
SHA180c60ff53c72069bea6cfaf4a5c4fbdd09ae8adc
SHA25644f2457da6186d6aa55274ac1428a82ca8e9f6913277039021dfeae374d916c8
SHA512737562e2f9755b60881acfaa3ef55c69200dc4b26d7119d436838d9e8a67bec10666cdf7ac8ab68160ce9d8393594f4da8deb5586fbe07aaf90f0fb8359f3aeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b718c8cf8ca1d2001916aa40f8c93ccf
SHA1c5bf078e4255a8b8627546b71e32e642784c02f2
SHA2568f2cdcd8dd01f1bc3103725e8352f9f32c3c80151ef7006b01a585aa6f205aaf
SHA512ab2ccced4e3e3078b616ba0d4c47235ce2950d808216882d4dba02c52fb17e5fbd93e1add8599dfe420786a2e581059da4dd0ff853e30049fd260783912bd8a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5d734b57905283d5fdf632e29d3158b
SHA1e0087f06ea7f27d3be86b0aad65bd9aa5816afd1
SHA256cd27653a8aa913175217f6344bdb09f2f42af0a86d22df2016b37d58d130603c
SHA512a7f3fdede2a89f02e4ecc7056779785f4984445a891d1c4bfee05875a0d9a00bc101f8ba280443bf304db2ee3e8a1d1710dbbb1adea3bc7b1c2ac2fd1e688abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5433cafd515b7cc02be7a8cef74033771
SHA112ca562300b1d37bb5346c50c45ae7b32abc53ec
SHA256b21ee8ae1c5fb1361586dbd74b0fbaa5179c5dac116f9b399f6d3a5ae949fb9d
SHA512f4b171a602b7d71ffeb40265cdb34540053ef46dd6bb764fd80c3d9e7af21a5702c837ed1746b81065956377038c7d271d8ab29321e3839e43a44463109c6ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e72157bc688ccffabc0b2dbd4f88903
SHA163f3931711f2cfe3f3feb21f51b99287a1785db0
SHA2565af43833e6633b584bb54413bbdff0041fe19fb8fe28ce71c6f3c526bdb06ee2
SHA5121cc177ced66454c7dcb3d1c7b7d7fe88e9035f71452aef149ae3a78589cfd4b3eeb7b3e3b23b420a65ab354f423fa8dbe2add649f0a76f5fc0fae9ea8feb7dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f757c3eb4f8615f27add31da827810d
SHA1ebc105b546c4336243578e950c72ee8579b1082d
SHA256437fc2f80145fe7aa3c664ac563c536b8dbe0588cc6d82ee1c6a9f4b9a7bef52
SHA512ebd5d26f0ef7513717d8edeb31d4ac6d7187d6ff44715f01c90bc68d8db81f49aecd30607d634489b00fb61d508c111c82c68f428cf1df3edebaab002d0ca089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc36f5eafd2acf7a49dc397bfd233d62
SHA10aaca2883d097c00c766208da926b96548ca0e25
SHA256052c5a548019fa3c3d9778291f62ecbffcb1d01f8fbc338af780f6f671480675
SHA5125c6b317819b50c986b24a079ab594fdb6cc818143b37fc51985e38d2e4e7b35dcab1551853d8fda2b50bd9b23ada393185f05535d0fecf1c11cc12d13d613936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5eeca1ac0cd62589ed838050e60ddff
SHA1179a004d3627d43b4d34259b436465fab39764b3
SHA256954f55a3a78b6fb63cafe4061175d1f40edf6307e8735782e7e5f053b0394ca9
SHA51208f60362ff88d585736d67c222e346b0fb2581925006758e86420b38e2f81b241656548923aa4e96b5cfa166e395517d5a83c75b15272d37a2ed311444988e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57032260992fc81e4ce7ef5ac8a5ec447
SHA165a8a3219231643ebe35bba8a07e214cb2f31c41
SHA256b5c6e07d9bebd4d654161392ca975718a4730b174e86be99bf1c2e20c80e2e67
SHA512283f2b4ab50b1b91b41ec96163ed4eb4136f89f2a6e6f4bc8f45f182913fdbd86732c6a246776753219426b293a654b462177fcabbf5e2162b2503c77fa47e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555926e5f0f99e99c1745d65c25f499fc
SHA17a89f772cc0a655ba27aec695d9bb3c39ff85a0a
SHA2563056ad337ba0a3c4fe39785beea178f88e5d2aa5a3091fabffc5043ec1997219
SHA51246075f6095aedfbb5beefed548ea7e8b699fbe1e91594394b6deea0b5e1fef8310dcc6cda72591f9cbbc280cbff7648ab0bf1e3ddf064fa1cc82d816f2b63e64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f396c14bda2a809e6ce4cf8340a16f79
SHA12cbd4b8696f61468df373d15e96d41a3a266562e
SHA256b22dd7d444c61c3b5f0b2389f27188daa58f4be41f85744bfe0a16ae99c1bd36
SHA512591c8c8568d52da24cc4ae2ca1ed0bf3624ba9e74414dcfd01cf53aac1c0e0470a15edae8a94468522dc48ef33520df1d4ed0fc073ac08f5878c85512de55db3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b00001c331159aceba66eb2311a62d14
SHA19f138c2d11977676e83953336c1f596244b3ea82
SHA256f42d875b5f5bd961272928ed891958cb1a02168543aa880f135d42fc35f35bc2
SHA5120f0153f767f6c2d37a8af2cb5fd7c50c763e4a6d8c862188c89c149f8cda0e6eb1c3f1a000b190c35af2cd705f73c11e6f0b9f6da46ec7a795b081224a6a1a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53488e25e79986e34ff784e10fe3bedeb
SHA1f113766de5f060436a12b4df8e0a60d2852e247d
SHA256221976db8a6f20e2a81d72eaaf1d0e67d28a317e8419b88d23c1e76c6ddbc5f9
SHA51290a82869deb68981e17db75355700a5ebc55b87eb0d5ede3637dc4ef7bac40dcbedd47faad9ad22a634682616a934db776b0a211903c842fb97b88d0f6280dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce2fe97b5afaf242e9d0ec6b5e80c32d
SHA140260d28e57ecb8f47d2bf36d718236800d7e26c
SHA2560cb616ba2636ee7ef8e5885b2bf43d479f9702cb3207f1307efffa84eb990e7f
SHA5127ff42836b545ead9b9da3c2afe653a1276299019403448754bbd02808e4ac0b8d2e73901e33a2a97715a8f41f9e70a5a7a8c451182d5c0abd52f733cf02bbff7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b