Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
af52459f2703115a35bd0115a9d8ecff_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
af52459f2703115a35bd0115a9d8ecff_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
af52459f2703115a35bd0115a9d8ecff_JaffaCakes118.html
-
Size
27KB
-
MD5
af52459f2703115a35bd0115a9d8ecff
-
SHA1
cfda32ef758063963093ea882771459a74d0912c
-
SHA256
8acd490f2817a2657a492b4c1457699103156c57119cd3f492c9ee8e90fef7bd
-
SHA512
fd57d73655bb2531403d56ba26dd350c3faa5d8706a4eef1bde72ff49547f007e46feb6ca23847deda8a659ea332c28d35b752d377b8d0244e5b0299706c04b9
-
SSDEEP
192:bxl7vFZ7vLs3b9TsVi7NaNejPAfSZWfF6nWflEVUwbWfZ4i9rYuWfJ7Wf2QReEgs:b3fjmb9lHPnV7wx+J3efbbm+r8wkFM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430320632" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0661CA71-5EF4-11EF-90D6-5AE8573B0ABD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000a376eaba00eb4d8fcf4847af032000c4f0d53204dcc366ee51145367d54a8160000000000e8000000002000020000000cc099def522e99bd80c7386d9547cac03fd993d567a3de7fa914390d18ddb8b220000000b992f0bd7c6f23b3f5442fc07a09ab935adecb3909afe1ce3b85894c5935e67c40000000ec5145b123620427952d8ebbf2518b616388b2cc21e86d2e4487e5b15a3df79b230c3ac15137ca945d3d445f168d165de1b85d71e18f208f2531efa5ea678ec4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40ae87dc00f3da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 308 iexplore.exe 308 iexplore.exe 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 308 wrote to memory of 2344 308 iexplore.exe 31 PID 308 wrote to memory of 2344 308 iexplore.exe 31 PID 308 wrote to memory of 2344 308 iexplore.exe 31 PID 308 wrote to memory of 2344 308 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\af52459f2703115a35bd0115a9d8ecff_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:308 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ff9aeae6afec8d2b56cc0cd30669b13f
SHA17c9c83ddc15141f6430873204786f2d553abd82a
SHA256c76ee8715b378413a03a134686ecfe4a1e5d8e4ed9dfe969985939b119e2f037
SHA512bd9e6636b6183cc2f72c1c9647bc9154b10e70b17f646d61763ad05f3b4f3bca626ddf605a3139d611b85b339714096216436c253e9532845d888c732fa49857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ecbd1a75a02c4c74ea4eb1e4c5e8b038
SHA11b60ae79a6507457afb3b7d4d9825a3be3214af9
SHA25648908054c4f429e869b7ba00b8d8cf8f4853b2baf6adac1e1c7271f8c6037003
SHA5124c0ecbd46cbdfc7f51a373c62cde43f2b0a7b4915d8ac009edf20d2e3518a3323924e0a4b35a3cb01fbd01438b89f6aae76f27df5a88c0458923fb26493e9341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d2183d0c57bda23c65c59d0a3219ef27
SHA171bd6b76d6372bfdff6f95ac727f532e62ab32b4
SHA256b574d79608c51953219e61ebe9f047b291ad37c2e792a67a0051732749344504
SHA512ebe32f067e41edfcb0567646714e1130e0e4b448785280ad081e91b66156cac16ebadfdceb6e63889b6632109e738f748328779d599172d85001850e0a551dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f26ee6c5e9bb5340193014bd714bedd3
SHA1074ce698d04d4984fffb75763c0e530975f0d2fe
SHA256b5060ce700d05596af5fbb05fe6752d66b1d9eb6f65337cf26d691085a7e8118
SHA5126556ec19562836b98f22f968b527ca53c579ef23864f7aea8dfdb684cabf9c7776ae6c9668dbd345efb33ec687f55aeec6795c4a7e57e1cabd723d532a63bf9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58be3d07a2022c0de0a4208acf90ba9ad
SHA1442e1719eaf105713e462e7f24f15323913f5e9d
SHA256033ca0905f533a61c00788c2f539485804f2e96c8ec26b2db5094d7297dc165c
SHA512843f59e30920c99d94b839b9ce37a7679518e861d1019215d731d36c44c01e059766fec98c7bd75ba1531e7d47bf2ad80650484a7bf45df4c39402cfe66bc02e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54afc44cc32de74f24b64d42fa4632de2
SHA188f21b3686c2d261b86a69ca6cadc9feddb7d70d
SHA256301c8af34bb1ceca7001ca845ed0e5f61487447a5942bcfb529408ae87e53397
SHA51236895f526bc6a227d747ce203282f9ee093ea7bed63abb354ca163137e6a05c0dde5b408ecb2377f3fcc8d9c35c43ff5c56d7ebcb4fe3944a8de83aef6ad0a54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55601f81c0a31759aab8f9b9cb034486b
SHA1821efa6ac4889ba0db0741713422dac177b6e88c
SHA2562d063dd79bf85e76ba4917e45127dcf7f5bd1c51a6a6da7985930114d199c364
SHA512adc861f6de5da8a1b82213ffe5e28583e96c7ac3a8436b39b087dd6e02c29e348035385d6d68aee9c89ec59b5189daa8eb8cdd8962fea6f37fde7bb85e48940d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e4b53e1c0c524a61615ef2fc8925a188
SHA115901d692d06321fb1e882ddd0ff20e69a29879f
SHA25690a122a0d217c51fcd92cc132de37fa3fd338a90e61c354b5902bb2e048d2d26
SHA5125618aa8ce34ee71857ab8b0e3a16dedf35f6c4a02d45afc76e4bd3ad6806a20f519925cfd460826c39bb20a514e0b30cebda077d8d6d26a51db40794a5dc9feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f86e48a2a3e1da3b82822b932a34966b
SHA1a93e11794caf880acda25f19071d8e86e7825b58
SHA256c232429dd9aca440ba5535650114853b080418c698d3aeb6d7cb54741f608d48
SHA512986d5c1e24a931a213844711d0efb104cef80a90e399f6d3a3788d18da7ed05218b8821ca31f6cc9d6392fc6b20ce98391c507bf3597d0ed8da3ba3496c8601d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD561b81de8852e408e9bb3afd9ee75bb06
SHA1fbe986597272221a43a173c399e780c8fd7a06b1
SHA256b13259f2708c37b846887a57a45c184db1a5c4e840899bf9af51aa6e52a56b19
SHA5120325f544eb45ac1f9bca313c4d9ebb1ad241317fb63e6f3b614a6f8ae3fbca2e04f19504453f1777dd8bb77b160946ec5d8358cc538fa00d5f0f3c9ddb3cbfdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58deaa4c0440e7d4d562b20e116fc93f1
SHA132f3d096ad5cde2f56cbb20343e26889a7c17095
SHA2565fe669ed0f1d41ed4fb9daa1c67597a8d2f86579b4c22adc8fe46a5b44a26388
SHA512f69c12767bed2c9fc84b0b0ba13f8be03d8295455944e9fbaecb5db340f697ff4aa052b569355e2d91253fbf7bace9f9c1d1f03ee5009a4019faf6f8f154ad0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57772ec6b59d0bf2a9f13bd74d9a7c0eb
SHA12f8bd9007fcffc51be8d909a1021c0741e6853d4
SHA256d0c5e33106295e47162ad90e1f60609b9d422d369a764576a3512784f331cc48
SHA512b5156d4272126566f80ebfa3ac22d7769636a5b2921a810bfa87c120733b7c84994673eafc47a7146cd98d755458924eb8a5d9676786589a2c3a514bc341908c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD567dc557286e20a21950d34092b5ae733
SHA1ce5555984b6d078bb18f3daadafb0b1ce8efcfc2
SHA2564145c09150a732d15952a2206d23e3cb7e7ecb20a96a5933c9020cff8e210102
SHA51231d8afea1e608dedff777504e0655cd5877a1040fdd3c0609f78260b4e1bca0f3434011b2a94f521fc85989bc518ddf76205bf73eb98e7fb5da35bcad3124720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD534011ef07ec16f6b1f0ba7f29bbb70a9
SHA10d373c0979a61665447be2a48afe198ea5362162
SHA256485614ce525e816e4e39915a752ba1315ab93b9ac1f05d9013a6dc20e71b2f55
SHA5124cb1dfcf7f0d5e4a34f40a4defb42a4579ae69e0fb82ced88a3c2a1b292d5f33029a9a259618c1dd8501fc0372aa2f5efb741400d8970a6a35e40f035c4ebfdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5020e92081e5087d566edd26f5b5301d5
SHA16ba3c576d1b143c4cb8639b125c89c1357042a16
SHA256400e73197c37b7b5027dd6a86b40d11ae7a244cc410ad12e859b0f9e166be094
SHA512dcc968e15850f671db0eb67fd216b1ea4da70a3c8fb2136892894a874e715e39542bfa918355f2a90edede0074a355395a293962d0e32645e74dcbc525da585f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD548f345f7c22f980a804f966e8870da4c
SHA12337d4c629b61ed8ca3fdf2eb19bc3c5dff63997
SHA2561819b2f59843cb2eb945a50181f29eac3dbd38bf58b81828c2679e8277c9221e
SHA5121299c73b6b037a8074ef99625892a9f13a5a6651efd3ca9902a33c284d148d8976769efc2db15cdd2046186c039f62d87d04598e80a6de82a79ebd9a44246571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f4538ebe7f02932be3b04e0ad0c0c124
SHA1c9e301b4049471f5465fb4aa86e297b5f0222a2c
SHA256bdb47616c74093beadf664c85f6465cc84b7a88cb8567442859d13ce56688852
SHA512a6fa4c3da82911431c2e019099b4a9477ae713de7f2083467b1bda7646f76e50720cc2cf5b1f3da5283bd31cfd57f3eb831c9d037ed68090ed341208a5c96a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59d2f4882aeaf3930d3f661363c83c851
SHA132ff625ea99f0d2dee341aa9a3a7a66224ead539
SHA256fdc0eac4b5c9f933933bea05fe8cd3da0d541a5dec85618274cda250a913b5d2
SHA5122ccc37380c8e14de42699df2ebc24ede0597e4d5e6bab82c8a9471b913e73ae3ea77fec83d9c3c1dfeba6a82e79903e44dc0cdaebfe686dff2743db3da64ae2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cda820ddf32a6236c853b41725504c6d
SHA144de1d3b9ad8332ff643e387accefbd8b1b451bb
SHA2563d26057ca71579879167dbd8475b34092750d74b0d5eef2c1669d3ea1aa68815
SHA512545b3a6ffe92cc87cb7077934aec292bf3101241b43227e4699206cfd723d76e8cccdb367444779da1b10b12cf7db8378795a0e42f19f225fdd4d8b374957647
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b