Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
a92f043509b77ceb5fc0b55f275a57bd_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a92f043509b77ceb5fc0b55f275a57bd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a92f043509b77ceb5fc0b55f275a57bd_JaffaCakes118.html
-
Size
12KB
-
MD5
a92f043509b77ceb5fc0b55f275a57bd
-
SHA1
86864db6ad9e9017b5e8a35867da42ea9d418ddd
-
SHA256
18581a0104547d79db31efa479d5c53b760b44c127c11e92edcfb69374e8ce53
-
SHA512
f136fc43702be3cdfca5cd115402c7730064e7e13c9bec284f11412afb98597fbe188ad8deaa052bb0af53f49dcb47327abefa862c3ae734449fabee22c72e67
-
SSDEEP
384:pozqAFoJwC+HgXE3CzxfnyrjjfpVgNjjjDAZAc0ji5wllHvpvT:p+XoiC+HgXE3Cz5nyrjjfpVgNjjjsu22
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C6DE2251-5DD0-11EF-ACB8-4605CC5911A3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000ab5c2433fa3e6827d004304efb42b75deda4db864fd46565c737f05b087296d3000000000e8000000002000020000000d39518553ee8c44cd2446e1a7dfbbc6abd71db2b87d929a8e0a933eb8c48e4db20000000bc12a5b144be50f1abbdf8f59fe9192ee14f02442ffb621c2fb1871d86ba3d3b40000000b24012913706629b8c232676d9c57696426b0506ebe9657b610467b231ab483296ccfb67c0362418e88eb02f1df9f38192b80ea471ad64c6753e17915a58f144 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a05f4a9bddf1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430195542" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2856 2196 iexplore.exe 30 PID 2196 wrote to memory of 2856 2196 iexplore.exe 30 PID 2196 wrote to memory of 2856 2196 iexplore.exe 30 PID 2196 wrote to memory of 2856 2196 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a92f043509b77ceb5fc0b55f275a57bd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52a6dd45ad1f4187171f673a64fdeb01d
SHA1f5dc61da95192258678a5f0fe92565159fbe6a2d
SHA256906f60f976dac1ba428f5f26598edcdcea5e57cd907d50c091791e79f7150735
SHA512775b7956fb2476cd914dbf2551526ffd7ce60c0dc81d0462576b037b2775666c0c0f4024673c1259e525985aa0dd097ceaf1af2a9159467a6de03b6d7f085cce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57f69faa433c36aa5cf4014343817cddb
SHA1dc60ceb71ab3a9d13fe97678d56c61a9e6ab817b
SHA256c236dcf61405e611261854c5577f5670f6503331002bce3815897c4c83e4bd44
SHA512aeebd4bbab4091875df45eba606d2271d9162683fd9e9932b8a198c72ac763143dae974d7590d78fe10d005f21d7ea2acd742eb05f637008ec3da76a87f7eec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f39c951853a671ecd0b0a861b6138e91
SHA12b9efa46647c3bd4a108f12c5533e9cd68f926c7
SHA2562008cb3679676a75660612af84de69fac81a893d14ffa6720d1ae1a7b2b5b276
SHA512c351b79b438cea5d247d198cde59711c67d46d5821056d09df4ebe678dc79cccd6c6bcb5cf5717ffac9220196912e732ea386f53a8a31ba393aab4494cbb2928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5da5e44810f942d472a3d9f7608d2912f
SHA1618ce5d38267d75cee346cd30f191bd46552f0ae
SHA256345c9bd26d1746d17517d23d2aa235324ad893b66f13c7643dfe90787006d50b
SHA5129a527554f4dabbe56b5dcfad5c32137e72507025912348a3139adcf40b3c9ab4619e74eeabf75a3678084d72f2205e2695c601db94175efb4eed73ad18720479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b2530e494a2828059f5df0d4253eae05
SHA1e6ca8027ce2ab294515644619c7871b6bc80f81b
SHA256ca270cd62e212a67d61fb6b201083c71ac55deddd0b51d2a10be9b8213e44482
SHA512b7d63534c294c4514cef1457ed1a409eba5de262640d518363a7c008f225e7039c417eb5589b8d80330b5c583126bf688d7aab3f1ae2fec646671f401c305d44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59487661d4cca2698dd6365e4ce0453c5
SHA163f309703062370640106d9ed7eb47753422b131
SHA256281da5f4e2bb97300040f28cb544feeea09746d261cc4cd6233969f5a1d12666
SHA5124ef22c2b8285a2dbd98de0b134c3513a361f9adb3fcbaf813158b95658febaff6b620031977d23dcb5098f65fbf75c81e4b5e086db6246c975f49979b09096ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56e3fd223bc562d9689ea1df7c75d06f0
SHA11e7eb86c6868cdcfe7c1b5e4a95e05583b3c02df
SHA2564d9c2f2159c155d6baeb6b435c163f533d114b9050e8d2abb494c9c0d7058a80
SHA512c3857da67eb7863afab75b645d3332874dc2ef7782bbb1c62d61e5781f769a3e2834f8077fde686d39c8cdf4de08f21610001a162863f29494b1c12c06574231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d080e0d1dabde72a08129ab64d4b215f
SHA10203ab322c984fad1f707634a433e9f58ce6a0ac
SHA256f0008a5bdf7690a2a371d92a08e7e7c9d5a3b16d52f32bc9fa807c83d6246b27
SHA51283b0846b9ee92c338aad1ca84c229ab11bfa5295c3f4ccec108072ab16f5ba22a3aca16767d707398f478394e6fbe882925ade7181346a8982814b7f927f9f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51fc257601ed08809166c382acb269e64
SHA180e92d1237acdc41f3c5baec7082d6139d60689e
SHA256651b15480bec2955b729d53d1ec568e7d3bde6d250bd7d8df3025a83ce8d7d2a
SHA512a1deedc8a6f2e251c425d8a3da5f023e4f14e30b67ce26c6dea53ad4cb2c989850320d9cfdce1278ce99d1f1c3e0ecdd5cf6c001e8955a1ffff4fabca235fc43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD583c6ed4e22415420d872868c9ad81eab
SHA1bf8522002026296b139707fd64de6e4b7045e7b5
SHA2567ac492c53453c9732440f8a7b81a0f94244f44c7125c074c1f3871950011ef50
SHA5127dcb1288247d6f7813ff54671f2afec81d6be106f981951d12b3b5dba0cfbd4fd5db00361e8c4cb2e921d97ae3af642b423d8d81798602822c51a207b6f9be80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ca0269b10c0fe9bd196487ad6922661a
SHA161be9a1ca7fa8e663deb46dd0af8a3164ab80221
SHA256d8c1ec59af0c3c839f876c8545c203799e0d57b8ee8adfe909886c04c4bb1f4b
SHA5124c68e47c10fcded57dc3d3850e08d3fe4f3cfbc1727b794f448269d75651dd1aab2e224bd66236df4eaa9c374805ccc2abf0933a09678c30280db05923cb80a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5faba5f71351785a001d31a6a9a7025b4
SHA19bb9997463c7e865a6cd564549b96643fd771dbd
SHA256d6dc379a33472338808ab8da3b1db12f4133b4b1c7ff2139d2bca94072648362
SHA512dc164bd8ed97eda5bac59e6aa342a0c98401b755bece29549d6b5dabf176784d181dcf6e7865a8282b2e34806569622ecba5debe18665149eb3728a26bf356aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c55c2bcc0f39dd74cbf8ad710512469d
SHA10e59ae9e2c2f0655a2c1d55ba6fb62727ed16029
SHA2567112ae85a76c34cd46410a76d1a2fe1e4b6bb5c55f7cb95788fd4afdefe92006
SHA512c43be99be1b9654e82baab138794b6454c6c41f1839a227c8f034d17b5494a11117d1dec9bcb1e2b70a4ed8df6612e45f8445059f300abf48718a7c63d951d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cdef25fc55d88be23e3a5b9f82d19c5b
SHA11f7445a749c5aad4110f71aa32bc246784eb88a3
SHA256cd273fe555ecf26ec75c85ddb4db105d69f45ef507b341754c0517af31aeb30e
SHA512ff9220d830381237bdf9a9dfcda5a78ca848056c3114470c774ed03308f86d5741efc1782236450c162e9581198765ba7533eb25eedbd29cb8ba594e1ce57c96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56c527fd1c6563138f551f49c8bf08489
SHA14f4b06b28726705c1a19f84e42dd9ef77f7b6b48
SHA25611e6affcaffc68fb7414ef5bfd12efcae624cda7196dd3b341fcb260168501c2
SHA5121c69b1185e7040ee2919accb36c52bc0e4bdb1b9839464ec147c62be41c204efa1487b0c24c739a1d1d4984e4fb91be6975f6267b8f6dee5f067e0a2609fbd1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD577514ce26c25cf1025ba44ddf16039cf
SHA1c12ad78ceb3849c03368418463cc94e1b82ba262
SHA256f280ef26da47ae1245e49e04fbe04a98c198a5a7c671113db0a3e4f74d775e45
SHA51213633269b8c77aa99167fa59e6f65207b865ea5262d98b8e6f8f62067e4665a9075d3334ade680b68d5a88af8149550dee9a478eb8aa2f5960ec5b815f6251e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58771e392a7c4c53322bcf41eaacf938b
SHA104691a5a409a8a298d2c3ac7d9f44f436f92618d
SHA256e7458649b6e2f5d391d308b3ada66975e8fb0bb1232a9224a3711a0ec386319f
SHA51259fbaf30a50b0e20139c43b4d64da8681580a9f9f9007327b989919dc41a78677a7dc6c070b6e27f2041de38634f33586123229152046a93c30b810cc3c81a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59e25bae418150990dc9621968d6d0ffe
SHA17a833b61fada4466bc82a9c6e5173e7388abf8bb
SHA256d1c518a1a6a41361db850424bdb768894f41a7ec0b3fc2cd48e23074f5c0e7c8
SHA512915cc3bf1785d8e35c80f4e7160bdfbe860463e83f77b80733b0f2c716901f62aa44acb7a8b0fe24d87b6f0d269a5db88545b33590092c2f7226f982fefc9266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e55144982cef954c3e228c169e1cd18e
SHA1f894a9daa33de7613588d8fb5e22b1ad99457121
SHA256c719aa03afdbf59fe4b978d578ac09ead2ae209e7803eebfe6607d8eb094d108
SHA512d586756bf6a0f8c488177650766cca7bf25031d5d06819e6acb9c6417eb7435b411c245b34dc228e5f74995135f4b5b05736c02d10f1b9dc7120d153cc61abeb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b