Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 16:02
Static task
static1
Behavioral task
behavioral1
Sample
aba81dc24841fa650bdb2759317f745b_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
aba81dc24841fa650bdb2759317f745b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aba81dc24841fa650bdb2759317f745b_JaffaCakes118.html
-
Size
1KB
-
MD5
aba81dc24841fa650bdb2759317f745b
-
SHA1
ae96b491da8cb9f0ad2f2424a1eaa8897c9c52c4
-
SHA256
a8e199fbe301219b0f31ed8cfe64133ea1868898c6b14cd00d677d7f7c396d69
-
SHA512
bcce587878dc2cc0228d8e5285166772050e7d75453bd9f0f3e1b4ab1ef3507ad959684a9aa46f32af585e6ae707d3d1c099aaebbfef081a2143dc54f8c41a78
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000930f899e1b9448de515d03d1193f5bb89898e57471cdc4c0d55e29ca39814f26000000000e80000000020000200000000fbf342b91fe61ffa214a5b8f0f121d21b7c98ed140b47a55b6c3dbf05267bb5200000005f3745aa6007f6b9d0960d5338cfeb8e231ca3ad857f581708e4d2ac737b7e8240000000868747c4fb88b6047f741c0bd465a6d13105c38b2818c6ab9656bef1aef6146e90ff32ef92f86bb9dfd6d5566fa5854bed330bb9cdd1c392e9869f1b47cc6395 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 605f4e4f51f2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7AD03051-5E44-11EF-AC25-4298DBAE743E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430245235" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2124 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2124 iexplore.exe 2124 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2348 2124 iexplore.exe 29 PID 2124 wrote to memory of 2348 2124 iexplore.exe 29 PID 2124 wrote to memory of 2348 2124 iexplore.exe 29 PID 2124 wrote to memory of 2348 2124 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aba81dc24841fa650bdb2759317f745b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f331b6ed9c21b311755f26aa657a7cb8
SHA124d50549632ee0ff5bef1f25062365bfae4ce40f
SHA256e3dd44e05dfd666395a5561f3c9f10918669db524c17e3a6e7f1c4cc0b797f78
SHA512d3f8a0e8f45691e6e3fb3581049bfc29e0b40ca7e82db6c9b08f5a0f68d6d122820461c5c83d73009920f1ce110ea2a9a92a4435cc671045f47285057ab3462c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf20636a7f3d3692e7096c00231a4d2c
SHA164d550bbafebea3b2ee16c51e41fe6ad516dce8d
SHA2567b46fa3462f0b1a05f212db65ab02264456d3cda30dfa4a2aa99084707d0c310
SHA512c0c55de377b2b6e773103079f278525b04241ff9cf1d64438ad19ba8c1ef4b7d4f944062834473f52ff790b371c8f60eb11449bf6479dfcbdc254e6c74b025be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5722d05f92e5be254e0ba614c486e591e
SHA1370407eda512e8ba71cf67b6db8587dbc26ac476
SHA256ca43491f2f2930f6864c73a5e183b9c5c77d9997aefaa85c5dcf2551985b8202
SHA512483c0d6976f1b521ca0692ccb552f5d108f5d0c1c1cf6275e3d29e471e566f94662d130cf70590eac2192fa8f36d28d27c98a05240f4559efa7c3ab7a66e6a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5098535dc81230af28b37c3baaf8d4541
SHA1a8b92a2d51d73cc9965d37339ecd3027917bc83d
SHA2565609b98cf6338da784f381f1192833de77255fc44e48c89d015090ebd14fc42c
SHA5124fd3e83124d4f80073b92b815015c3aa4e8596ace23612b778a9d514f0c0a51138a2a1cb8c3527f177ed49206e8889864a878004f796600a5eefd4a420c86bae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533cc38cd559748b52ee9984f32a8c235
SHA156d24ce9aa413f2799a036d09fcd00c73fbb646c
SHA256ba339749097bfec18b6232b96197f56847cb92f345155ae877c4530493161d16
SHA512b7366c72f83500e391f456d8a605b6064914108c695b607cee542affcc1c2fbfc3e4941551fea21c604725c891a942ca5b2af4ae90e0cb227b8e9bf61a3ec3f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59266683e97dd5edf2e4f6fd5e1cb2660
SHA1e8dafd9f1d9e8a3009378d1767b8b15339310ca3
SHA25658fcd807f78b33a089363bfaaad2a98e6bb0f326e9e4966e976a17c3bcc9250a
SHA512ec277cfc0577b6c2ca1aac790877c225a63b59d985b4dd1325fc6c1f5a70b68ee89c3fc6e72c05f81bd8cafbaa3a8118de6615ebcb543837ac9ff8c841aa58db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555dd72a0560796b5139c23ad8914f6fc
SHA127417764c49d47b5e3d0f1718def744333c6e1c8
SHA2560e5fd8ec2cb5b9e2c0213cd216b298fa42b3eb836df39a8c9b5803345ad6fa99
SHA512d2c77541de5b3241bd9cee634b7948065654dd12bbd30adcf6c333b8c5bdcef282c743238e00e1f3371159973a1314a77ae28c6b7f0e33c6591eb29b5fe116af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7cdd874d4625cf67d81c4402b1c351f
SHA19e83459ece7dae509ee1de48a0bbcacdeb53f40d
SHA2568b8a3941a4d2e4dbf28d0b8ebf58c61c114f6095778ec38d554403513ef4aa0f
SHA51206b47a2b63652afb1d1bb7e9739d7aeb8a1f0db1a2f5ed11991991d3de96c01b5a97f3f08e444ee1087adf56c9ee9f350629ada29d5e2794ac6ba2114f36f4f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1b0b404ec8b2a09ec074846f3d5d0f2
SHA117c1fe5532f97bb9eb954c564fb78f9b044fce85
SHA256eb1b6b67e01e324bf12e86875a8f2f517b70c44f346b2e96bf2e804bffe108d5
SHA5126c91558ed3f9ede91c13ff7591ca88bcf6bca9c7e09e4b45be30e558350f47aa2469959dbf8c0c21182e42ce999405034007ce38cf91ac5beab87e458a4b9fc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba91135073215971927ee79ae53783be
SHA19e74f913ff2dc777d7e14928151bcadfe30a1d74
SHA2569513a6e5d8918f03b7d3d7abadc9771d63bff2786eae39d669b92c6779e07022
SHA51288c6ef494799bd920c945146b8a40274711b306702ee3fbe8314c8fbde3a0ed0e3d92dd66e22db52dd284451063b07c06ec7b5cf608ed2639d4a5064017dc881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd9e446534c8e9377098c21cfd250f9e
SHA103ab9da02e02761ba8eed3214d1ca3706b4870de
SHA2567ef04093575d020f4c95a129bc1e266749e5efa05dd48798f351b6ca01a3ed2e
SHA512ea166de186d902d7d319cdd4aa5c09f8c7fe9d309dd794991d6d88b178f0b71259ef24b59c7806a5c7772df8ab170bd076b887acbc6b9ff84b9cf5de361ecfd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59acdb42d5ee64cbb4162a4f254f4ed7f
SHA13d852cc0670ec9957a12fb34a55513c3a29334c1
SHA2567f97e0bb0e5534455aac8b1a1e9042e4864e551b1c6cb006b4ea494f143fef40
SHA512cd765c47d90f1394d46f7ce9566571210e962b62d70e2c38e18a588835042904f72015af5089c7f8ccdca4dd940575d18f0933e0e95d09301d590fa2b5b63984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2235bc6d5ebb3f3e3cbc0efc4b71a52
SHA1330096d3ddeed6fcbd5782de5251c38f02f7714f
SHA2564461e3ac81b9923c3a51f8ee62ff9fb72fa42d583e39d7a2233cba7d11d78e9e
SHA5124ca3e18862c0aa05b45c7c30f52394825e4f9d84d7c6850130251cb5c07a81497e95dbd42e10cae666a9331cdb9553cddf0fcc7b524f064da2fa266f296a63bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5080d679c19deb3b5d0c4a154fcf59366
SHA1ebfe6b452e7c408bca33c4cc709bad8eb054c187
SHA256886156bbea08cf464a907450aaeeab952cbac221b33eff90470de7444e4ef7d2
SHA512c473f962787a2bfb6420d18834e6909d27c1254f1102f20d8c7c82305c4e156b220f4ac46f9dd75017a8c9eca927504cfd507618d8f4624be86512c181db9e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ce12ea58f36fa8fd8328d5cf7a3fb2c
SHA13595d65b14bdd280ce6a2fae9aa3f087b278315f
SHA25668b5b1bdc5f3bd7570e42fdf0f8696e7aabd55f1bea613d8df9ef7849ecbea93
SHA512f1cd9b4af79cd71f0ffd7e03bd202b9e4fc21c922f1a1f3ae77d1de1d9ed81991bc7e89041d48dd50b871b52b62fa43f7068e4d89eee93976f928353ee030543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501a4e8b3b125d5197277c6e67d4cb40f
SHA18e66b8f49ef3f4f40a16d6851b8a8638131db735
SHA256ebf0f43b58f1207e628ff5f64e702b8da1688d035fc2e1e81e459424b23b34c8
SHA512adf3d1bf10ee28f4edfcf2542f97cc88c028ce670594c991ad398943d186da8ddc5132e04b8d4a430d1e0f1a9d344bfca3f5c7c6bd36dd0255d4fdb17099bc4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55602eff7680b218e6ad3c5e932ff64ce
SHA1a3d254da72710d213b1acadde279ae1e0c82d83c
SHA256e11d8279adfbd5e01873d8e6d06bfdf88abcb36bc93a2302f7680251295ff6b6
SHA5128f113dabeebaf7d103075eb841d491878645d39d4dcaa529da1792238027f8f41d7fcb7fd472c27ae93789a1366d70cf6990cc8702f3b1c11c91e49995747ae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584bd28ee530a44c06633bf853ddbc8ae
SHA111eaf67fc57de8804831e274c063437ccf29766d
SHA25642c0fc34f5b947ec983d9fd3c564927be4b3a530750349ab3e9246d8d017437b
SHA5121279fcb2e142c280412d26ee5eaf1c8bef9899faca527934f6e005b6a51754ec11aebec48496ee8ced6a3137bc6cb257d9cdb323d58aa0c75860e483dcae23d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d36540fb5f1030390a7896da05cd0cd
SHA1ba426498d9d2772ede512c6a9ed909b4f400fd48
SHA256767c38ea4b2e9a3e8c227ee3e509b93396664ee9b9ce5247de762134c965df74
SHA5128ae3c031f03eef1df79a939337b8186c63fa6ad178c49a8098dbe63f247347ee182efb5ffe8634175ca445ac729208b20fd346fe3c5beaad5f98df65356689a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ba3d1761d5b67ce9017aec7c560b50b
SHA16276620a73c04aeee412ba9c200c2a933c2cba88
SHA256e9bc5c7f94fbca443340a6bb409c6898db3b9cfd40b949125b76841c94f51f58
SHA512e73662806b390792f85a79202a47452dd609496b9c92a8728d0d2b7695e402753e3feb2a6f417ff5173c4d354ab6de68cb44e584ea5d5bd2cc2c0d6c58990eef
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b