Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 04:28
Static task
static1
Behavioral task
behavioral1
Sample
b21af0d0323306b4c83160f7007ca89b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b21af0d0323306b4c83160f7007ca89b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b21af0d0323306b4c83160f7007ca89b_JaffaCakes118.html
-
Size
21KB
-
MD5
b21af0d0323306b4c83160f7007ca89b
-
SHA1
64631c2ac29295c0bc14f21813596e9127e49d70
-
SHA256
d08e51fdab1be55b95e9d40a5364edb5a405141acd1a391e1a99f702b0f43274
-
SHA512
90557b6ed67d2c9f8c939eb6035e14a97914159dd876cfb8035fafe5e6b53f1bafed4ce47a7fb1ac7e3fd72fcbeb2119e1134b170ebca3db0034fd0d43a8c7fe
-
SSDEEP
384:kqlIcetZ4avGTHc5ecMfrx7hn6Z8r/gR/6guLZ:Ys7e8LgN6xLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E06478E1-5F75-11EF-946E-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430376403" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000472f394708e92e25bdd739343b538fe8fe8b93938cc030defc0a5a443afe9fdf000000000e800000000200002000000035d1ae78a3f049b42842586d4ec674289c7fe367e8bfd186fd093e1e7fd5335b20000000ff1e29b6e747cc89b0842132469f2aa4e053a7896b7a370a17e0287545808b534000000074a94a9e134c9c25b27d3aa2fc1c90c481bd1b886bd06d644a5809ac57bc43c3a2d61a6b2642761426e669773a2f3bbdfa0b4c80b5b0df6a254a34537dda9fd5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f06224e082f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 964 iexplore.exe 964 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 964 wrote to memory of 2372 964 iexplore.exe 30 PID 964 wrote to memory of 2372 964 iexplore.exe 30 PID 964 wrote to memory of 2372 964 iexplore.exe 30 PID 964 wrote to memory of 2372 964 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b21af0d0323306b4c83160f7007ca89b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:964 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5173bce3ea29f7f04bc4d6ec9734ab41c
SHA10b18fe1c13dd162f04e5f7314249a9dc02ff13e1
SHA256620e71eb096d457e32c43aead92e1a618c325d3f204edf8f93c7ae9c16d0b0c6
SHA51242de3bd49e4a6c81cff43017a4589b1dd83cf780f4884d0d79c88e1c2ea3470db53b440ff9e6879df9f9a38a93fc58e91fcb7627daae84577b9994ddae8f092a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e40be2e2cb82795ca3a47ab09f73e964
SHA176c3942f49ed0c7a3bda0cd6ccbc4538995fae07
SHA2563e9a3ef32df7d5f9179573745fc84246b208b1e39e143a776a95b94ea7e0879a
SHA512567a232b52a4bc910025d2d2c509b1555d1a2c42782d8cfc0a386c188d9f8298457de49b6c0b8b25ed86a438a54ae35959cf3eef770d3375ff4fcf5cd5717bee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568e396ef57ae8de0febad31925e8de80
SHA1b97d21d0624e668dbc7fbf2904afd1564bec039d
SHA256060add814c2acee5cecada5a36da97497e7e591ab263d61d8c6cd9d72643d2a5
SHA512a4637d069684053e434559eb931d86da7b824bdf95d2f00327c678ca2acfa8298c0cfeeba218eec9239403c7d267ccc11880a305bb30f2b4fd2790a01b898ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5643b036010550743a7eb3ed10ac24380
SHA16bd73e6af1d37a6d68aedb8081d15ac0bc86de96
SHA25651af76b5f3a5a44c723fe2e4acf55e83a213a00449596b53da006abab585113c
SHA512dc30539fe7aa6052811211e989a66fe2b76998c6e33247cc3c4ae1d1eb6e8219dcd54fd765a311e964728a20b550ab7373d2bd7f668c016f8dc7d9a77f740d86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55de9951e94b75b38f9bdf3353aeb2f46
SHA10aed6b68489473cec839ab87dcb58155e0938b3e
SHA2569d0068f03448e8bb8b8467bc1cfb8c79205e835b0ae27f63519505d49a61ef9a
SHA512977fd07d9953c49dc1b5f52315b41e34a892eac98f3e25d7a69996887d11c254fc696e57c4a656e394d1c94bf552dcbaac49fd41e13475511d078975a4dd3cdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b9e28180d03401a03bccdddb6b15a4
SHA1e8485efb2a4912642d6f89ee05b2484ffda3d669
SHA256bbbe8b30468d616095a92eaa968495df2a72f430de9c508ed3722d0a8dc2999e
SHA5121d3e5c241d88f636573ef70012e03efaf7c2c66ef8490c129cfa790a7d0bc27e141a29b96fbed571974c86284db3fc180cc3477598bd8ab8919ffb41fbb1bccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5959319af400c267e9bc5acfe8112bfc6
SHA16409232ee303f3e62e27d4d38fe0a7ff4085d904
SHA256f37773eced4fc792a22b73748d29e5246cc8f7886a624871d070e7e63232f1a4
SHA512f38ab8ee602aea19e1ae5f5bc68cc49d981808d11be479cd5440ad20e5332893faabc7efea79f07841d333756a44946cf757658d7c8740a53f4906ec7b889c39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5485659ea562a97213f6f668ef10b48ff
SHA10ae1c4ef37fa0d95810f7c836bb6a1ad71c9476b
SHA25629eb95cb1353d19c8ec078869fe7b6ef57e015473ba5f1688bf1eabf6cf5a69f
SHA512e3e8bcc2b446b5263824e6f2e589ddcc595ad6a028780f119477f1144393a98c562d301584bc10e7e00e08c0ff3a48f46628afe6f59d8787bf3acbbab4fffc1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5860f8e625c1a16314fd167d0f2e9b67e
SHA1ea6322ba509f18cbc856a7fef1f18d68414217ae
SHA2565ab48ca34dca736e21222e863546d93e52f90313b1d6236b7a1161ba571615ee
SHA512d5f4f5d724d8a67949ae4197ebb209dc36ebec96051b7fcff5bd20bec0db0d12b8708974b7102d8bc52a124841ff08494e15f6db57d09815b006c65498532e13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5982a7db90e8d6d9f8d5fd603eabfdcaf
SHA10f527790569cd47c8089004f8d734850ce0f6ee4
SHA256e5db1a1bc7fb42236489444e0956039c9b1cba2433fd23e76ba5980e88e0b7fe
SHA5124007a08702510ad6f2a5b4f1bc03a10afcf17fcb6f04731e1ad52c4aa0f0ff1f3c17f1321a5fa511aafad58da1f719ccc1b619283cf735e1f76cd3f1668dcfde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59be5f61c3c697802b932d6d20b39ae76
SHA1a57da1041c3669de5b91f1394fc336b984b8eb5d
SHA256846a9f0bd07c530d2fa77b76585544571efae00c6a8e48be96954594a932c12a
SHA512c8ba7c9144587d6b8af02ec2dda0f94529a6f7f641ebd416107b7efe1aecdb4fc6ac176ae87b865965599dfbf0e5056c069ada9841ab4f7674e582e4b805af96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c88f9625dfccb16ebc4839ca8dd0a58
SHA1e6cb79eb87943259245ee92280c050f683a12b71
SHA256b7aeb88e302afc3d926e4b4949b7a130aa222d96924e268f77b9044ed2048ccd
SHA512b32d398e3859c506ff1ef8cf1baf545a024e08554c81bb4b378969064a6724d8a297af50bc302782ebb8da683645f68244c43fb60f811eb53f3b9a97966d7c86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be40f9ded02a2af50f942527d386c3b8
SHA1a1ee57bcd53ecff257612d9ba129fba190dac402
SHA256e3523673134294596fa3201753b742970ebb998d6589a2d3756ac4e92aff3bcd
SHA512b7a5e6bb9f08f8350e48c7911c55c49b9501d90a25ff98715bf375b26cd11f91abfb321a2548ee23685543a4f257bbeb806177c759e96f7882c857eca7c6c146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52666dabc31e2d2d9f68f1ec79b1449ae
SHA1c5bac91dd51e20515e0b0e225cb3d8fc4dd6e6cc
SHA25655d8e2ccbc5729761fc3a77d5d65a4436a0a997d7c0c70330165ec3e0ecc9de4
SHA512449d2f10225214448a7692a138f69490f0a6c87cbc472d702af51c83200aaa53b2f98952011e8b9850903dc1a50e313be37bd4fc6ade345e859d5454874ceee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5458d40f35a84953f661ffab2a30b09ce
SHA1c16f231c7379fc9715fa208f6e8cc0f66b042e1f
SHA2562ec6f080b52fb4d723497ad1ae76cdb1b437da4cc98c04b66b055ace7ef2e42d
SHA5126acf6cf31756550c7eab27c2d5f2e146db9e56572a6c80bb8ab6ed12d5ef1882cf655a37a87d08d92eddec436525c4a61ac8824052b5d0bb9b304bbf3c830638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c09225b9c7af72b68d9344759d08054
SHA1768d09ad3459e8ae162ca9d166ee4820b1bc4dcb
SHA25669ce96c20504cbf15b1eb2ae37707ac5721fcfae331d730b9f7ede39af905f7d
SHA5121b245ab2e57497959ab9912a5f84781d9e7c4c8834144c5034b00b1bbd821839d866a06dfdbd47f02c1d1076e24ae7f3ef82de3513ad41de4e17e5b83793d32e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512ff2577bebc681dcf3be22774d5d690
SHA1753a6a046d1644ec5b5adc497db5520a5bc0a559
SHA25652862be7bd06c0ab1e0b4b1edf490e5719ef5db3e44d9c2027b79030fd72b863
SHA512b9d2990c56c202a0d8de0cca5a9261570dfc02b10c862daf5eda99506c549ab472a5b1b91c537f51b738cee6c4a8cdf949e96b70b58cc2d63efa2b0123f76bb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594126fe975a97d638e04e4d84b830f18
SHA13aad2745a33e1b08c1c516e9920f51e9adec072c
SHA256aec0b8e058c639102ad1444486b1fe2d2012470ededfa84fc19bbd1024480746
SHA5129d081e94450a6fbc442acbc45ffc6e2afce1d5bb935e869155b649137772c2f910a1d24e43791cfa9721e5ef4452a22907ddfbabc9382246c5f75aefc6ed359a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560961859eb736a63018b16688b2dd852
SHA1d70faf6d2508569eabd046356f0ae004610a0201
SHA256697cac618044ec481c5c165ffe6252571e78521cdbb48c4127510121fb6c65d7
SHA512a06d5ee4a1d8d43609b54815112d3b77513e6ed53b2e70733c232a682982d99e02b757ab4d85c1f7ba103cfdf54dda563ab3db677aeebc8286304406770273ba
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b