Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 09:43
Static task
static1
Behavioral task
behavioral1
Sample
aa84ca52f663d653f4b96c1a3bd5b927_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aa84ca52f663d653f4b96c1a3bd5b927_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aa84ca52f663d653f4b96c1a3bd5b927_JaffaCakes118.html
-
Size
98KB
-
MD5
aa84ca52f663d653f4b96c1a3bd5b927
-
SHA1
fcb8886e9183c94608e98e9f1832e3ac728089d1
-
SHA256
5231f1958b5cbfc6e2a8db0fd2a718a9d00a96f9b2c6b6a8bc508d6f5e0eeb77
-
SHA512
0583acddba9981a740f1c5c85206f70b05761dbe09c298c7589cb5f2bfd81c0b009305e9c33f16685d945381a4dbe9f48699e5a53e6b1ab0935a56f7bbdc58c8
-
SSDEEP
384:W9Z4kBdhxJTM+z88+4YH8B9HDw6OeMQh76mn9T+mnIXnZ8fqypKyUrVz/EHiRLnH:GHR/k5OgOc4g2x4OsaOa2/tQnAGBc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000c738b1cf387f99c585958152f5d726c76ccd4a00c57fc7dc2f0b703a04c195de000000000e800000000200002000000081515cf6258a2e1e64d4fd8dae9b75fbf7c4a856922d455325fc8f170a6f67b72000000007b03478acc5e2c49e05ebcb63fe4807bc4954ab11ab1e66c4337918afff123540000000abf304b6e19b42976e3e6deda9a07ce6d3f40279268295a7579ce7f387df622f8ab55f826231ecd0b6230972c411c7b9a31b4f3dded42e80d1e3d1b9dd60a0ee iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 405de0411cf2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78002311-5E0F-11EF-90B1-C20DC8CB8E9E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430222477" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 816 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 816 iexplore.exe 816 iexplore.exe 1240 IEXPLORE.EXE 1240 IEXPLORE.EXE 1240 IEXPLORE.EXE 1240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 816 wrote to memory of 1240 816 iexplore.exe 31 PID 816 wrote to memory of 1240 816 iexplore.exe 31 PID 816 wrote to memory of 1240 816 iexplore.exe 31 PID 816 wrote to memory of 1240 816 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aa84ca52f663d653f4b96c1a3bd5b927_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:816 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5782b2e34934e7af50aff3b7524e642ac
SHA11fbf5ff142a28fe1c2779e0b9b3b189f5e1cdeb8
SHA256d83f592e10ecccde88b087ccca5b9613cf0731688979e2d29ee747c820dc6159
SHA5122f82df1542bf93019f2a75992fb881cac009e1c11beac3bef21c79c3f89a17c9d431043fcf84d33d8c5538d5a697911b997976489c1b63541094c75aee59fe82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547c28db565b66f2aa283136434796706
SHA16ca7eda3e8408aea64a48545b6f20087e7687a15
SHA2563c613d6e44658fdc614b320282e5bdcacf08dfc929f613c49d68bef23256b8e8
SHA512a3492da1de5e41308c5263a00f8a6a5f92095954dfede5f306307c72b52f60ad47b15661fe008c36094ce3a1bd42dc2c6e066c575861a93aed754004cde5f66b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaadda86e1a85093412277f471f34474
SHA1e9a3cdb1fefd6842b22952aa80026ca1d2ceaa0f
SHA256c70f25abc48124b09b7b97930424991e762d66e00a1744c93b0e7c7bab541fd7
SHA5124460435334311899deb615ea2a43243f986444b8f9fe61324af0bbd46ee447b59ae59f44f11204fd0b025c89e1c61d72a2327f73725bef8402eb6d2c8b8bf4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e668313083637f4d631229789c46f52
SHA12a3641f7324052aebeab21167061f2bd76bcd66c
SHA256f75763ae5f3b6d4952453d6853d5b286a8404c3aa0fea2006b4f461570448a3c
SHA512974db6668b2c30549b33e01254dde537940f95c544c74ae1e993397b3ff6cea3c71c4617d1ccae1dc79f6892cff71a7be62ee8e85a5548f233ecd433f02e57aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569b3ac80de8169d2d72c73add0193e66
SHA1aebdff9c4e9f3201cb0004863420599eb6525004
SHA256d801afd7e5994e7eabd0d61c3510b6c68af723294871b66ecce2337e6f0f9dfc
SHA51238a858ca0f0b8ffd19e0d838812281a7eaf1067e2a21803f8f620a98068d3db4ed7da34765472319a98872b433b4b5bbc9d921055995979be189c9447b3e4632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5af1bbffff018551c67ec878c67312d
SHA1d3016933b985345d3564466bce4a79f686492bea
SHA2569cec77f0b2e3213e2e4a110f5e263c280bd680af909221d0763de805200e4ad2
SHA5122276bbf6a03f2d2c28cb4a7c75d641f8280755537862fdb2705a0c5c6fbca289d91833d4557afc3f531f63678c0c78094627ceac87171574f85902536b28def4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b028508a8a57a0e5fcbb8d9680fe81c
SHA14b66cfb1cde68325316fc1f1da272756896dac2e
SHA256831415a8966b35b23ddc13314cfaf8a70cf7a6bba739dbaa8f0e7de553d2c2a7
SHA5129ec1097eb96c9e56c9943e2e8a1517ce99e7b1af4b372ee5f01a8635fc0d55b7ca584052c4e363c75b3f0badb6dadd832e0c689f497ef6f6259ed86389d38ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5432c1f3454cd1f064a05ce3df12962cd
SHA15b4b3de44326332155a1635ebd5a6e035a135a9a
SHA25643f327aa06d0fea94396a86ce4248b660354e1ae24b47ed620560619ee75cd51
SHA512c11ac2aeec69fc86eaf065ef704ca68f679a3d3f7bb47dd3ead1e72e5798b6888c71d78c1f55fba0e90cc275cd66b681ca83612dd3f76cf043046c4a55024dca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff9df948ae66c49e450c7aa61f357dc4
SHA119c9fa444af86257fa597e4c2dff5940a79867d9
SHA2568886bf4b908ddc773b7141d0bfbc887c646020038cd7a41485e4c9936895980f
SHA512d1f3507bebb237115853afac39318ab4144ef86c824a58d7eb7082a2a1143e251fa4bd8ef3655d260d519bbc9618d5155dd0e339c3498f5525a73d376f9263c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e16302cbd1fa080f10da6fb52d850d3c
SHA1a23f05e2a63d1192d90a3431e7d9e641e07f6467
SHA25666e0d22c05f999c6934fb6bc89f64cc57406d9fe9aa49192541bc456326e98f6
SHA5120454ec06b3bfdb61cc830f60ac373dc022565b965738d61a7b02d20ec6fbec23266111eebde08e460270a54e95921525cdad934c6ecebeb6f31d85ce5768479f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daf2f26f57f3df786e1500bcb19b34eb
SHA164e8680a2f64ac646a6db4437ab266ef5bf06e4d
SHA256f8f2adc769aad0984458d970d5cc271a7f28f45d997212cc1d7893ed722f5b2c
SHA512355001f6a71534262a5df6de0de2f0b0079822cdbd7b27b0c8fdd61bf998ffc36a4485a6f098633cd454620c872adb9b511443ac5c05aa42ba46f6bb645d402a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eade9f85796c066409af9b6112c03e4a
SHA1e47546114608c1ce919269de02c34bf1335f3e45
SHA256a6b1559b3aad2d5305c87bb571c310c75861152cb86ef1336f756fd453097872
SHA5123a1331a435eec61a951843f72c7d3c17911c481c4b32661990e388abd12469f24fd991d25f489f8ca458951fb32b00a43c97cafb4304231c22812eef61b611fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD595a7bada21b9540aa483004e41134052
SHA15ae0e1035320aea5e72fbb4980180c9582d099d8
SHA25611d8145a758fd0f14be6fca934aff4058d198d3e71002fb5bd84cf6417a159a1
SHA5123a0556f89792e6ed16b14bb1768ff51fdb7d7d5a19087a7772b2267d9753ebf453110f3d83451f70612a125a61b39a6fa0505f61d6a8985b74aafb2e41218910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f0947b0b76c2dea953d3edab75cfd0e0
SHA10aba57c2034064c2535630cd01f9d9486b3ff160
SHA2564b615a05609a9dd7d59af2ce0520152a74c7701808cc04a13916e67e0e929aab
SHA512fc51a73d4bd14cd6f6a693cb986317f7b89c63f8e93ed9c49317768bf4aa8712e8eb507774714b0ea9088211be511631752d074fce991104611db4ff4a4bc71a
-
Filesize
1KB
MD5800d3a1bab8310796a7e3774673362b4
SHA14ae9e5cc4cd5a189d757f6e7e91cb417e974dea4
SHA256a54ab32f9056651b375eb8b47b528dd20f830a8f8d33e318637979513401b5df
SHA5124ef5f1a3099cb908958da4c9b88ddb6391eee9d958db1d305200ee271c3e12fff036d0fb4a4e019781589b8d9df559ea226377c4d5ca4a9e02bf719643a0894f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT8UAXPK\favicon[1].ico
Filesize1KB
MD5f2a495d85735b9a0ac65deb19c129985
SHA1f2e22853e5da3e1017d5e1e319eeefe4f622e8c8
SHA2568bb1d0fa43a17436d59dd546f6f74c76dc44735def7522c22d8031166db8911d
SHA5126ca6a89de3fa98ca1efcf0b19b8a80420e023f38ed00f4496dc0f821cea23d24fb0992cee58c6d089f093fdefca42b60bb3a0a0b16c97b9862d75b269ae8463b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b