Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 06:08
Static task
static1
Behavioral task
behavioral1
Sample
ae235d19515fe7d533dbc69ede636e49_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ae235d19515fe7d533dbc69ede636e49_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ae235d19515fe7d533dbc69ede636e49_JaffaCakes118.html
-
Size
1KB
-
MD5
ae235d19515fe7d533dbc69ede636e49
-
SHA1
3c11d9dc48955f5bd11cbaabab7384c58dd656be
-
SHA256
c28d626ca93ea8077728adc02261efe3b2087269dbc60ecf8b15a23abe33a043
-
SHA512
b0e5dfebd99197a2267c526039436a75fc3fa75985877adf30ee165c35a682f04d84bc5d78ffb770385bfd3ef87dc070cf7d055cacf489075eb1d9d5572867ab
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000dc3db21a0c6f10d6186f5b725f871f30c9d5ec7c89dbf014c0ffe916567d7258000000000e80000000020000200000005b8cba2e094c65254226b73e22add5390681dae28165035cee46cedb4b4c0e09200000009c966a8f4186497645e6f8f5ceeff34df25849f82eabae3be2fe6b7b55dd78d140000000ee6c6b9e81c4e16cd0a62871b4519ff08dced846c8e8c9031f9f541ab5a6ca8f5070dec4d6d251923fbcaaa92dc3780de2a8e27a32915b4f9c8b8b8483f283c2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10d10587c7f2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B278C551-5EBA-11EF-8FC1-C2666C5B6023} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430296010" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2852 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2852 iexplore.exe 2852 iexplore.exe 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2588 2852 iexplore.exe 30 PID 2852 wrote to memory of 2588 2852 iexplore.exe 30 PID 2852 wrote to memory of 2588 2852 iexplore.exe 30 PID 2852 wrote to memory of 2588 2852 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ae235d19515fe7d533dbc69ede636e49_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58f16012ade317fce9db67ef1f84b5b2c
SHA1c4ee8175e2660326145b1c80b0792e372214f87d
SHA256f29bec1e9536bd2cd97b590be3aed9e10bcf81c59cfd61fc51210fad8d33b0e0
SHA51281eca1cfe8b2015905dfed5666d924bf295c79201589a254f384a17def4dd434855fd123448b89908547097540d81c08dbd882d16e1e1f55a95829cf08211aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53f558b330fec188465f41fb038f67c5c
SHA1db407c1b6a68c0ab23382323cb74da53aea012eb
SHA2563a25890925f869e61fdca43fdcadcfd1c18fa539c85e1bb8f1e30b626c54a026
SHA51228cb700616ccc83c4c2ea1efd2f1b4a098d87fbdb70c4640aceb33439f1f31aa6bbb3f88a2216ed2e0d41a2520b1c9dcebb46eda230cc81c4358f862a12862cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b980b9c2f72846ee28392d2f74e6d3d5
SHA15ec369c973debc0b4c9fd133f268bd4323afeacc
SHA25605331bb9d31dead50be3d88daed58d00af355a253d8c43dfe2d7677f9882c678
SHA512f1a9ac0881b7ad96d1f6deb211422f8168ba45ab1a706ab720b4320b8ff2837aed24e769a4e8622a8cb78685d5aad09b89c64d1e9f23a65c001b6569e8f99f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD548d2b524790265d621dc43945737f5dc
SHA1b301bfd06ddae503adab6bd1f35d08e5cc4f5661
SHA2565fcd550dd13cdc32f4b8a66ba1598fb8c92fa04d91daab7fb47bc7a8512f8bfb
SHA5128d9e6a7a4dd3a7e83b22d8fd32f5d638be2b1e5cf63bbc5fe4d7494a776a5cb9d6da6222e56105146a8b6238f2be0f8d6dc44711c4b411f840b49c1545246057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD566ebad5e5407d975ad99442d5b9c778b
SHA1cbfb092f14f86a8700b1060d8e22cf896359a42b
SHA256c8aabd7c4433443ff834b7eee108e7bef038b7a91bc4f665d2d4ef13b9e8e821
SHA512e438274af113c46c3cdd54d3488e7ca53e89f126e6c19a851c2ef021eb613248c4f3cc748cdae81ed16e63524c5834b2a9b285c5ac22e64014f3effa18bf0f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5082ff499af39a7047280368f27ac2c5d
SHA170e4e9be5f17568e0d3ae1120de6591d67f66f2d
SHA2567894ec957139aafb90c98e437e46f81ffcfe1d23fab4b52e87d9bda29a792845
SHA5125759ebadf24065c722338282fa0ef52c6f62100b7b74b7cf75cd2b29df50f013b82a45ebb45db751893e63fbb826a8e6245ee62f16296acc0fca142cbeff2b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD586506317d6fc1c4577ca67c4d99ead18
SHA10ea5287ae0fbb36797afb13dab256843a57db5ae
SHA256148056ac9194398a86263af9cf2f9c28d9d406ac633f927cf2c9b81c37c380fe
SHA51276d6c931422687babff3c9e79fdbeddb8e3d9c2b23ca73778a51d21d1cc9d5628f1d6cbfef940dc6c5d11cb29af75b8ae69f967979d28afa8ffe7f7d7229562c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59ab646a24c0921ac41504af2593495fc
SHA11563880f00d49741054c17fd54923459e8dbe840
SHA256840631dacee3b721a5d30fd43be362f55adef83aa9df54ecd9392e9845c263f6
SHA512667575cfb9ec5228262878d5714d3ceb2cdbb3b0b715ff98548676edb8b6721e9bc177353ca064321605f75a910bc434261a79959696359f0d369e6ccfeb3058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD581b006f1ba2fac32a0d1b81652591280
SHA1a0f782d62740f276288b3f5db537012173e95183
SHA256274807075c69d300bc5aa8023f7ed94b012877b3fba72b71d09f19eed2f0a019
SHA512bd954030b62387efebde9deeec92a03f5efba14dff58729b1589f27ef9b64e120b161301140ae9882023c96ddfe9de100b0f8536160550d5ddfc64202ab5088d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53fb640c6ba5de06e2e1ff5adddc01d59
SHA1a0fff0d98b9a17e9999d958a3e9562cf5aba1847
SHA256be9caea7ac35a5ac5873785d58b0efe64af8a790bd17eb2f9ea3568f5c3f66fa
SHA512332277e1f63dcb433e1cb1f1b2c8088a38dfddc2275323656204c36e76f5eeecfbe45fb80600ee4bcf04ab7cfcc3315dd7050813b83491635ecf6b3d0902ef33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c3145c70c3e60517faa580aa8232c4d6
SHA1355425c4804b7bd7f54820e7808dfe0578096b32
SHA25625ee7c27f07e3b5f1fb24916446ef9311e5614df5c42f39ed79601e406aa2048
SHA5120a887310381c1593dbcf16823175debb0098fa272a9a51c92d6b78a051974d57d46d73fb52a5b6ab56b10ed117548915ee864072e066f8a352b96c39ce89a951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54f2d44dcbc374aee0b9ede28581bd2e1
SHA14a5c3b0e49e084ff3e7d7685a014f608eb4a3013
SHA256a0b296b279cfd8c5085fd52288e29362e71b1b05cb2c8b458eda153638a77592
SHA51292a17f089b60f0cc7cdc210320c6d9f46490db8c3b3c9dcf520a4b624c407bbe51a04e39256ae4e7caae19933da75cd6a514ca3b2127448461452c3a61dcb2aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5547e49dbbd97abf9a5d76529944006c6
SHA15529dd615ed8d1eceaf6359aba49878b9bf6cf32
SHA2566c6eee5abf6a019f0ec218d28e80455e9548213339edda98fb59d2d4082fafdf
SHA512a89952926c4b58c790d3e32da4ce72ded1cfaba8c820e11a527328668d12bed28d73010fb392acf2237f342639789495b067d581d6678adfebc96d6b59af9ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ed9ed076941391e128133ba0e566bb87
SHA19673b7b123b3929e5c41cbf9a8675c93c9634ec7
SHA256d64f8654342bfcd104e4f426e21a4dbb21ca744958ac6a1ee31ab3b107ca4f3a
SHA51247046da00d4747c5478c703d60bc1aa9c9c8cc8ea91d15ed2957f91b17600df46ba0932f916cc4e3fd48b3fa295e3b4cb4d90069bf530efdcfe1ccb8e5309dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55211661848e904d7cf6978285e2678e4
SHA1ea1aaf44ada6a21b80862c84bc48ff437cacdf2d
SHA256f9f05ae11e012c49dce68a9425e6df71ffa15399599e630d77cbbeab4a3dd983
SHA512273fe546904c03264b8571029bf2a7d3d30b61419616e30a44654ecdb034657325eb86958b7eaa56651b7f2bba3fd3c8726340f1ac838a39aa672381bb09cdca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5458f05aab4976f86c9b8cc352c93591c
SHA182dc6c13aa7f2eb815f5e86dc31137b600db4147
SHA2565dbd2c92bc37d4e3110da47aa9aac83e73d110683fcf1bd767384fa0482288bc
SHA512e55449a6d39f446629a759a5175712ee1bd01ffd5884ab5bc3741c58a97cf3792e0edb45b15a3541d1f0f24f06b69748b6581af40b5ed331ee183cb6c64f8187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57137ef59ca21401896fa05ccd8fb1c86
SHA12a1bdbd16db54e57f3a708e1dbdf2fce1032e195
SHA25695848365eaf554cf580f9173214114a639f6eab10b695c234ee6006a50b182fe
SHA512f44836d06c6ea4ca5d1f0957a253561c71d8e9b60cb96c38ad47dccbf6dc670d46b0460fa4ff86a2a53e668879990f793d2d22c21b0c4e91990f4b838519d42d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dfe3aa14a771e33a38fdb6d49a713d8e
SHA14ba5a7511516bc69a754df4f899813298b5a49f7
SHA256a9a196e9f47d14630087f3b1d4e32280c7ef33a7a6450c33dbc750301a502aa1
SHA51258704460bbab1322853313513903a9d5d48f1fa74cc27b77c38e2f4141947cdc55ac178301b8c1bd2a6e9e08e8572cc1ad98bf1af5f676e00a2568c54c3ff1a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD526093b33ecce8f1443576a3db54a2446
SHA1735b992edbac915ef39d5c58a3cd3d96169bd3b0
SHA25669b0fc8d6ab5f7e7a8f5aaa6f69b7891260057dc469083b5a4e5982b22b33471
SHA51228d55b967930d363a2b8ae26bb8123a7b505011ad37a2010e0e16749bfa8915f3434b89078fe6ac4a48a3bbab440a6f6cf3b658af536972f9bf703c6d32a0d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD533f43cdcade6983435aeba0ac74883b1
SHA132f287ddaff4e3792650902c25dd2e82685eafac
SHA256331d4438a1271e2f83c001e36520f863db5fd0d92e5649f5edd121e6e19ef156
SHA5121322c34f991f390365694a8349debf9579d9dc122b678de156714ccb99eb05c6c7e4d29194533d316bd423a561630d14bfb6ed972b0a7ac1e21b2f3be7b59cd8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b