Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
aa71c212b093ec9b262e0ca814e36f5e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aa71c212b093ec9b262e0ca814e36f5e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aa71c212b093ec9b262e0ca814e36f5e_JaffaCakes118.html
-
Size
1KB
-
MD5
aa71c212b093ec9b262e0ca814e36f5e
-
SHA1
4314f4599722985d2172d8dcf6b13de6aae292f3
-
SHA256
5073fc01844ae3e96e12585c030b14d90fdca5c6f45f20e9ff8988e188092f51
-
SHA512
cf7b359f97468fea140dddf5f27c9d8dce25ebab6ccf255cad73a851f06c8ae760090ba62d7d586738f5adb5c921c90374afbaa8b578022544575b19546692d4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3067ef2219f2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4C3244A1-5E0C-11EF-90B1-C20DC8CB8E9E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000b53313e29a0bd63f12f4d6b4e5dabf96dcf8e7b6f55bb840c9beecfa350af5b9000000000e80000000020000200000001d4b38ff2eb8923eb11f7df7df81d7286490dce5003e0b5ce6071bed82c4d34820000000d4ed002aaf585b79cd85724912eeb81a82afc9be1c23dfbf9281ade767cd214640000000487f08cd7317d2ced21420847a330cd74a5dac8c200cceeafa241987a0f68c4eae0f8f36c2adf60516e42f327b76643e9648e4064c7c9f4687b39da435dbcee0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430221105" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2632 iexplore.exe 2632 iexplore.exe 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2296 2632 iexplore.exe 31 PID 2632 wrote to memory of 2296 2632 iexplore.exe 31 PID 2632 wrote to memory of 2296 2632 iexplore.exe 31 PID 2632 wrote to memory of 2296 2632 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aa71c212b093ec9b262e0ca814e36f5e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52240951298f7aa0e4dada457a55c2726
SHA159f60414e2fef42845acd173419b9449b9c8278e
SHA256856ad67c9884cbb201445a42ece97e8733558621b17de76307c76d095f457a3b
SHA5122d21377e62ea94fee65290ab764749bc8c3a5d242c76206bc17852f0f21367367bc780bf26dd73d74d0f7c72ddb0a231589d0acf43a9823ac18f4209a019b979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5452fd6285e4b0d667815c2149e92ff59
SHA16a6b7781a9f3f031908e0dc3631b19a6f00fed57
SHA256dd306e5acd7b24dd12269eca9c376379242f3dc154371ff51aee9f34f7723a62
SHA512c3e32a01c84633b2a3250e25603543199454cc886b77a37fadb5b9d580e1a4a8edad1d48046d65daa391d2f83ce816609d18d4d7f4af4bc05ab2d956ac237c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5618ecef48aca3d6dab0b78d7029801e6
SHA1ac9f3e1a180ec08058a796e809f737e065118930
SHA256dacd4102c888baec29cb3a5068e622eea5940e4a72c95324c8ce897b2e3d12b5
SHA5120a74a9566b38a9334c3e68a26d04c68ce663f3cf44931c2881ea6cd5f1bcea717e5382d2470cf42dbfe59cf7d3f63c23863e32279623a33ab1b6b95c0718b000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1d0f33d4236822ac851fc0e20d6ecb4
SHA1b97129279a5ad21f9270e3ec73711f7838a1a42d
SHA256325c8b92ffda95f3329b976697373739279d61cf04ffa84012928ac764bc29ce
SHA51279abe3c938062a71e457a19568c0a0091197a21e865581e37c69f92870b25e7e0919be5a728d3f0ad1812af2a4edc5740d21b0c4f18edc6cc26feabd7c346ca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f18627f4b571f1c71978da260c017a1b
SHA112f17aa6209dd051c9acf1f30aa40023eb672ab4
SHA256ec835bb090046d3d172bfa90044443bcc5a7bb940b2410d4745fdc8975e2f913
SHA512fbdcd926dd276a54c97d2a1a6484c010a250e4d4fa1c999a616d14a80b5e0e216511e91c9c381dbe04d65afefe564c7e9ea13d7d4a3ea6e67c42f66610e5ca5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59386a6b97d115fbe42c531a73d341fd5
SHA1fefc5f0a2c6dbd46d3ca2549a66ee116e9748ac4
SHA256b19b69366e9022d172a8aa69005247904e83fadbfd50c11d509a16a28256fb36
SHA512b81ec4475a9560eca9ed4ed9b84eaeebf3558a17782f534b01a3492284cded18399ef7e0b050a72f028203f311164156613d2375974225f2679f2d7083cdb72f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8c37f7fa33b807a41c0734c93bda668
SHA184e587c5847d42d73bb034eb1883558f960d573c
SHA256ad7b8be2463c4f685ef384f1c3b728b7889620095825924e91288469c7b594b7
SHA5126ee8dd3f19514d9a67ce5ff8ae6f5ab46b9434ebbb6ec54333009ef8bf84b8b024b314993d1ce55307d3ba7a8ee3ec16b054defb5c43bafce84400b366322bc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509fea84e20913a9749c26ac601a174dc
SHA1ccca06a00a1694deccf94a487343663d86dd84ae
SHA2564f7619d9daba93aa597efec26eb8bb4eb4c5b8d5305a85ad21a28afd6e99aa94
SHA512a8aaf7b4d8dbca8ee71308f7f7486f23c694c1909e350a26bd95333b0429c47e04eae7a1616fa65d146d8a889a6acb127e8b087969fcfc87663c16a5ed421ca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538aaf1b19f434fa2dde0fc4a259dbaec
SHA1c3d82c33ba1e8d222ff6220bd2954610624b4068
SHA256c4596fa5457fcbecb32e6de180d5f17add0b480a27208d8be5aea1f9a786948b
SHA512a51d818732ddf613c9f93bd03d038d06b6e440d6e87ac58a1511a9fb82f8c53c72945952a11a64965e4b0f7d636f5041f2b1a46ad8d50b4de310a2b7234b63dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e6f52e63db4b2fffe4bb0c889797a23
SHA1aba0a9be9bf42dd7b57f3dd2fa4cb1a180be0c79
SHA256c0d35bc4adf9a39d7719e5fafb0b1c255f5df812496dde282fe096da74179021
SHA51280462bfd032f745f8e14a61c74db5b26a6ab806d8a0951f84bcf1722c6f4c38b5f08984c0d204ac269b2a7a3ee2244d25e48b88469515bf0667a8f172322261a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdc8e6348e0c244a026d15269971c688
SHA1428da57390ba4af8245ced79cba59a3e726bfcac
SHA2561eb0aeace0f27edab46721eee09142d067e8ec708fbebf82f2778eb8bd537266
SHA5124795b8e2d5f9b17aff81603bbbeff52cace2f43cce46e07718757ad0b4928b61e2c423fb5c3fb894c86f887186ea091e0ba5c01a99eb2ded0db5aafeafcbb445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b3121a41cda1a46c6f64f66c29ed554
SHA17349e163d0915f14eb0be4cc3188eec9e06a26a4
SHA256cefbda055e8a358a834dc6324a3f03498337e2fc0890f2fd4682d2084e51b589
SHA512b301c9e0d7fa211b7026a3b26bbb86d0907c3b45f3e13ff7440a4620fd7b86c545ba7eee286aedf4cc1945abe45fe1c57702d4b8b3d50255794331f8698a58d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a48c9dadcd3d6ea35ba0eb93359c3dc
SHA1eb336edc04da1dea50f747d2f082a28ddb98de5a
SHA256bc7ddbe70d52d0f186ebfa32300306bf00cfbbbdca70c1cb68163caad23d7b0c
SHA512fb7f68c79da6c25ac88afc88372ccbe7855d974b6231eb11774011ddd38282a2ef1b6fdf0767a98f9e3218aca4789b219b80b6b733256330c12e6c72bbe638ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1b2d8cbc09dbf645a5ae474892b23a5
SHA15debaf68176786360302d9ad2a4befad145c0651
SHA25653a517c0d28d8683e1425693ecafcf83828d5e0cddc7e81d64146ac92786b3e9
SHA51299a87a97049b7c7180f82524ab05a4f2a605744a1320f68ec490cc5809e88f2619d72ecbd0214fa999c67697568b878cc8640cce693d23a87b2406c2db95296b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b74bac5dc606e9655d0eb324a3eb611
SHA1a172ad82711b1835fa4496f4f098cacdbb2f09fa
SHA256b4f747e796db56eb259ddb2f8859db3195366a94eac1f072aa40afa6be33b61c
SHA512f19f4866886585c14f7af8d9c359f08eb98f9d16da23b7e401702e670301887d1de1cde5fa34fff685ff9bc977d2ab0538cb9c818375c8b3ba09747801b6a05f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8e4526c63e7bb286d5e918003bcf263
SHA1bcaf46231f05b267ffeff7d7c286158e46f279cc
SHA25657a96214fe0fffb290f17beefd8999a29173bc940498887bce95c501c9474440
SHA51206cfb7f322652fd853bf4cb4a59501ff268bd7d34696b074ed3cefb614b33dfa7e58a5e2b66ef94496146d3255ce9268e4665e99daed21f2169b55c97bb44b73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5086962a83d1cd190e2dd548d33b6e22b
SHA173419a27dec622fd38e2988e8b70df213b894856
SHA256ddb7d894673ac23c38b8be975003c505b9f3ccde1fcec485f43bd13a74cbed26
SHA5121b8826aafbc469b748932e757550d7af6ca65c6b235c581676f32ea5031e063ff377be217e9b2ce8d94b2df18c0c9ad994dd6c0a335fb3ef2e92875149506d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504f37a2d1572dcea0423f98d0c29972f
SHA1e4f30da194838ab5ea80abf917565989ed1daaa2
SHA256e5d0703a0bf99f3e58c9141a9f25327d232f8e8da209879751daf0a091d453b2
SHA512d90bf1ac727e8ef12b59d250686c7c3cdb0ec25b2171d4988fe748a033450c4b8db4e89aea0f7d03d7a9740579b6ccbc32975aae622c44de5fbaa3d4a029684a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e32e088f965d59bb3f562b4044d2cdff
SHA11aec5b36c0d9219cb3b565d7819ad0e7ed713a42
SHA25615e4bb35bd08b06a312c0aacef19cfe03170ac0dfba04fb43adb77eead083825
SHA512a272d9a6ae4010fd833fc6a9dd55126f35d7e2475300447fc24cd1c5f9a933010da57aaf13b3c707421a6cc4f8e8db913a28e5d05de748d2e973d3dfba35a97f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b