Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
b3876349b55712c161bc709401a75ce6_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b3876349b55712c161bc709401a75ce6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b3876349b55712c161bc709401a75ce6_JaffaCakes118.html
-
Size
6KB
-
MD5
b3876349b55712c161bc709401a75ce6
-
SHA1
9779153a46988b885a51aaa1467ba214644615ab
-
SHA256
980be0af9e39c87bec8ae86ad8de834e6abf0c81b13b2dd6c6ea6dc33e0e32dd
-
SHA512
8234105c191e10dc992a402f6a2ca1a260bbe8e2ef0a0435fa5ee6f495c0c16d64bbddb212d81f5729ff77c521e1dfb3ad48527f53c3c05bf26aa158aec15b64
-
SSDEEP
96:uzVs+ux7xx0LLY1k9o84d12ef7CSTUWwScEZ7ru7f:csz7xx0AYS/Xvb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f042173ac9f3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430406689" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000007bb921bcf1cfdf5711ebe787af0b63dcd509ae705318d29003540e9a67840f5000000000e800000000200002000000058c2ff5da671ee6926c272aa7811892c14bcf5b8a2432e00e5246b9660b9e516200000007b635b251d1944b7ca05d158521f130b1f2ea60b300c123d40d2cd8092f632d2400000001af4428ba57245e720218b4cd017cac034f067d9644494ce64a5e244c2d9949751d5ce10c41ae041c7092135825e31f3dbe924b9f7675d4212158a7abe508af9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{63AD5911-5FBC-11EF-AE10-CEBD2182E735} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2600 3068 iexplore.exe 28 PID 3068 wrote to memory of 2600 3068 iexplore.exe 28 PID 3068 wrote to memory of 2600 3068 iexplore.exe 28 PID 3068 wrote to memory of 2600 3068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b3876349b55712c161bc709401a75ce6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587c979f4d86fdd6088d1fd6cd7980e74
SHA1086bd97103f4f86361af3ab51123b1bbd9b0e08e
SHA25658869a8edb67d9258c68c0c56ee7aca8fdae02344d52cac08b02754a0148f5c4
SHA512c16525f3696736d33157d13f17048e7d51525afbf95a8d29df286fa172b5ec44b5ceedddc4ce3d11695b9a5293c4a4cc36f7376bfcd9e68d1f8771efedf9775b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5495dbc3e8834ebcc97150b01cb95fb8f
SHA1165ffa1aa19ef8ef35570e1f379aaf74ad3c2101
SHA25693b84f0efbb94977406ed470f47ae68608dc9965cf162d235ab39b6f89994720
SHA51275f29565258b2753c1da133d2fc20b642984b6f3026a057020716e3aeacfa373d4b0f97c5f995bdea1515b1b31bdec671c3b98d6753b5c2e00182f585d0bfd32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a095fa4bf87ad0fedeff2eb82f89151
SHA186f29b4299b98c0e4891a7a3de555d119b68205e
SHA2568c9ccb288393f09e47bf9a94a29db67977086884556a921c57e0ecebc468deca
SHA512c70bb4909f2c8880b7825a6c723cbff398ba70d5a66df59f5efbeb7f27f639f6cbedbf649077e29b312f59d33ccf78b760b322a3a2dfa91a6b5b3ea81a518ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eacc199912ea39c0dae4d7a79726ca48
SHA10cc45fd7800aae9ce1278cb24a0611b62cb8c8b6
SHA2561697f0a37b1e799c8913a71f30ca27bc33fcd86e4cfcfa2247f1eb3e4240e032
SHA51203d03daa4900c852264987a28986d3504277d01b86ad3c56a94a05ceabd9d4d9598a67a37dbe0b00d4b7fd2dc500b78ab45dba7ac14ab95aae302ace67e62796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50497eade1e80070c24ce5f89cebd9011
SHA103fbac0e70a71fa21dbf58ece4874cbe3f05ab0c
SHA2560404c36163e666280628f1bc9ada23ec25d1ef82761a94003e309d13d24d6652
SHA51244aa1c604ad8e14ba9d40e249670cc69c69995286cadd5f4e7de69146ff1781cd048161a1eea5da032d762fbf0ccfda9ef51659fb3d1944d8432467dae6ac6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfc0b013cb5b10b06400303c5c46a6fc
SHA1254a04624eb4a5a8b6aee2ef23e724012541fd1e
SHA25612766cc27bbc24d0781a6cedf5ca21bca7aedf86c1a27c1682acef9b87535946
SHA51299a9f3b95663b44ee23b486c6283b1b00c0dd85fb194dc97f16cd97709df5b9bfcd317aa0acd53a8d1a306ed9aebf06b0828fc2484944c2d2375265c424b462d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58690a4487878bba9c0199131fae95c89
SHA1d6d24fa45df993a06524bc606507393f972b113a
SHA25692e02f30f69d1f5aafb6ccedbf17f689c38cb77ee88fa390875156c9dd5ab127
SHA512d4e1feb0b399c9ad5729235b73d471188d87474d5342ce7c517dd0b1b4e46bee3370dffa3308f0de8f2e5861b131de98a3648382bbb463017deb297fe6b397a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e62539334b82cbdd963a6eabf7ae6f4
SHA1323125061323b1711752baa28efda03fa07ca195
SHA256a5f23b35510891848c02e9886c32f125e915276720f621e6d1aaffae2797b3a9
SHA51234d99a572c026916a80ea66f8005aebc595cb8655dae353d3271edfebe6462e7ae567ca9a018a1ab9a35653075c3770aa2964a1bd0955c66f739be952b868570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555c2bbf1460ff4b1f9d24999b4d41d55
SHA1d91879014e2a6e6fea5166e97d06feed4d746b88
SHA2567a69a82de6f82d617ee3a489e73bfcedde21fb545fc0f7c0a9a3fc6c2dd46c6c
SHA512f5eea3708d7444af50d8a86561a31853bea460cf8268b9868d91bac8c4d2e6b90c966812ca2d6b0a79a9d3c7eec3146539011edb1aa3844221f50551d49388ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1f8c75f201cf15e8a11a700aed90f4b
SHA1e04929e18aac64879cb7e7cd745b6c0b757096f7
SHA2565ed7b531a948dce325b1dfb310fb67ffcbe2f56aef21f0f2a869cf6f983cacec
SHA51286e8e53393d9aa641969224391152722a18624e656906744e508ade4a2e96ffea59b72099780af9e8ca5c1768b4f1381ddfe9e51b23ef83159329d8500ef69d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5052cca2bef22f6438a2ce2e9df077806
SHA13fb1d64128707bc2ca572195200d3627f3c771da
SHA2566430716c2ebebea1019f75b16768a8c10d99325474572fecd792d7949248038c
SHA5125f437ea8226ae277bb04c49552198b47cbd6ba180550db0eb5125fdb59137d35ece4819fd536aed6285269bdff4be3f4128d7911e878c21397e0d39804c1845a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560730d7ccf7b9528074c01a825bc2af6
SHA1f197464e4b974e10a57f9cd0070cef0bbc5b0581
SHA2565e68bc997e0af8a5bdade8985df651b4de9f21a646ec0657e4175de0d61d0ae5
SHA5122b5de55ed4e23162493983f8466ab6cb853f9ee4316556706230bffba80c42053a8d174e49f60bde6ca407640ff2af0e5285d9d1e5e565cb23d843a15a4d59c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f914c00a8ff9c21557c8bf012c6b3535
SHA131eeaec30023e2aedbfc9bc4b7258b803bad2cdc
SHA256a88ed70135e98d7fe39535b5177263e94134f2dee6f544571d657e2d9b60a2cc
SHA51236074fb7f31c269ef5749d878985cf422ab348e9f38d40c66cf9d42770c1ca8785042240b3b4c88b5d0674e9461b581c02767a95a84701674682f42569d0567b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d84da5655ec849e4b4d0157dc598561
SHA1ccad35f458762e2c70480864ca33d7f03cdf31b2
SHA2569b5be7e6045a829f67ea637a23f45b73199101f28225503c042ea43d16bd58f8
SHA512e554cd5a9906293a3695d1a45eda9357b13b97fa4785521d24624a27744c20c1c14c0aef0b32a3514c32f408e31e7d5cf1d13617222e5fbe090a20f1017650a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520a935984272d8e8fe1567e75cf13e70
SHA1937074bd6a85c7b2437f978e7b583c1fbef362d9
SHA25605ebd12897b0f1cf6776fe71f61954819118fd23d91a09b01a0791e0a79787f7
SHA51220032e6402448746c6f579c5e7a242745d5a8e525f7d635f10efb68d322d14715be1c7c0a7f595470fbd52ce98d70a1a8fe42e642c0c42ff59a1d9fb6707e7d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f43d76116ec91a4c6a88ef84f56e03
SHA147bdaef781944afb530490fef75c7be409195532
SHA25632a3e40fd04e2a678cade091f119d9e6b776cf6235324a049b95532e400ae186
SHA5123d34cff0a9a1f03ccf775d512d1668f5225f574dd1cca303561af86ba36a70c9ce370b0544cbf9d7f5a1780a865d753eb84f69cf027e914127cd22aa21282c3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506652752959c5487063d05ee4b262533
SHA1ac8d6e0f6019dda2a46bc6674fc1c153f400db6f
SHA2564d7a207148ddf7500202d0cb9c51cdfc591928c909cf52434c1b5ce5b2f469a7
SHA512c086d4d55aca6cf419297708190a40cd22ff5d37fc9bb63d7f5970e370ae4db019912e530aafd0abcbaa7d2651fa687f95998f0d8072a3d6926f3b9da5eae1dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd6f541e0545b263a41a4275f1fce88e
SHA1be42bb0190125153834a41a2978fd0ec461fa0d4
SHA2560f7f327045a69b0393cc32c8cffa8811ad722b2815d92fe46e0a94d4360dfb4c
SHA512e353b8d74e57a361c420e6685d81f01dae8ef20a03aa540af0980ddc2b61f1c99970ad17bcdf7d087b9f368abc39812c293248aed87d4bd61aea4d71e6fb8962
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b