Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
bd8e65441eb2c8d5ff1adf8a536761f5_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bd8e65441eb2c8d5ff1adf8a536761f5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bd8e65441eb2c8d5ff1adf8a536761f5_JaffaCakes118.html
-
Size
6KB
-
MD5
bd8e65441eb2c8d5ff1adf8a536761f5
-
SHA1
d3a20497cb64eeb1980463ba75233c8f8b530c11
-
SHA256
c0d6558895b0ce1b6431296ce544c184429f41ff0cadb8b062611fdd80be8b61
-
SHA512
2e76cd4cc5150ac06c82c2dc5f6dbd9e3c3387c78f2950cc4043721eb722da15383880bc65624a83f816bde56b7abb6a5d12d4249bad17186ef892b5559440f1
-
SSDEEP
96:uzVs+ux7zQLLY1k9o84d12ef7CSTUaZcEZ7ru7f:csz7zQAYS/pb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0CA8E251-61A7-11EF-BA91-7AF2B84EB3D8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430617426" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000753fd3c2a5c01b57a8cd8a2e35fbf610d2bb6a2fbb163bc3d2ca1c6dae25ebf1000000000e800000000200002000000050a728f51f57856c8744c4f2444ef1c5908648684991660b1ea7a3ca6fd8a833200000004683ef13e3bdfda54cc86945a69c914fb75eaa15b0daf8e639d2be5ed73d3b7a40000000546c4550eee2e0e32ca3878146b31be34221a1dc7a96553fd579df9d8cdbc5ebf0610e337381fedf1c8dff3502b7b8f4801a3ada3024b3eb56913f3c79716405 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50fba9e3b3f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1928 iexplore.exe 1928 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2108 1928 iexplore.exe 30 PID 1928 wrote to memory of 2108 1928 iexplore.exe 30 PID 1928 wrote to memory of 2108 1928 iexplore.exe 30 PID 1928 wrote to memory of 2108 1928 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bd8e65441eb2c8d5ff1adf8a536761f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e73913c615ab86e9e14e5bae6c9e7d72
SHA188230fab0b4b27c70e6144273f37a075ece06f3a
SHA25688de779ec6cfb92db554cef2b1648067f79dcd18be215b89d897c4508f77f2b0
SHA512e3af24537fa78b5cde965300cbb114957b6faa603d566ff4b6a5c166ba79996a0b1635ed25647974f4b185f30ac08afd745af417401ccc273d9deea69188a411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd307bc361cad1a03872085f3cce6d3d
SHA129756aaacc3079accdd84c36521eea626650742b
SHA256e3042fb2669cb1d8adfebbdd35c0d8d7d8d5021267dbe9a9fd913b054ef802c1
SHA5121dbf6918d4f63ef7113119f3290a262965179639df4907f174844609891cba0cb432824e6889f3af7213e96a05fd196e3bf5d366371e2d8105ccb0420deac77f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51262a303c27cf36289cc003fd5e11ccb
SHA1596b9c60bf99e0b2d7a8a6997c329ef47c41017e
SHA2565b8d5d6ecb135305d86f351b35fbdce702d8879a2109236ffe63151899a5768b
SHA512f04ee4c3c3bb8882ef02293ed148cb291777bd6346835fb341c255125163644c55d9925a7539c5726cdf71e65ef4c68cffc3709f73d6b004a2f7ab96b1997754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b379f7da37e89159cd6a7e542bd8c6f0
SHA13db011b5ff102e9928e896ac47d50e4eeb76518e
SHA25631c0d79f173e31b9fc9c26bcc4e78e62591b0380fe869bf0f441653ab8982e24
SHA5124d566d42c258d6fe6ed3fc6c8ecd5752f614f89f31e54d5ae04af73ec11fe7fd517c428cb884cc0c3c75859192ec5060a54fed4d7fd8af61c6f90c5d94d476d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5645871733dba9cbaa08ef1bb2ebf0b
SHA1d14e24e589c2e253bdb95d186c3e116455700669
SHA2566569a775a9906a079c92273a536a4889db49de0972b4b1201c3fa91106929d44
SHA5128918aad5ad18f510db0d2a08bd939bdcb7663999c7754a8bf8d2725bd6c4d15cc9f7634bb02562375ec1edabec6ef3e2f63e5bf73cfe331f6835cd0d437ce15a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bdfb637fb2390932ff0d484c20a431b
SHA1dfe488a20acdec37b5ad2d93671daabeda5f7652
SHA2563eda137d8218ae3dec1650e0656b6d1245fff02fc06828d7e9b5f3c3121b14a7
SHA512095bebd2550f45f7eaad1950d6b74939b9d6fe2a907458a27b88275a050b90cec69d81de2d570e2c3e2df2fc11aab62ecff3cb42d79edbc9f05b20fcbb929231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d70ace9c4fed8a69f3e5d19086c5b90
SHA103cfc9884f75b3cc0313a27072cdf874a9e71ef3
SHA2567cb033f0b951ed54623f78d9b025ba4dd977097965179e7a8ace65f8d45f1a51
SHA5120c6ef0d1ac8f12b09ad19e0ce267bcff0d67b5e2a8b672f0b6593f45f1a3d13da2180d41133abec62f26d5feddc2b90664ad0d8a265a369c99189197f5099ca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516abb3f63bdb4450f52cd225328b82ed
SHA1858119b3169bcb2a6d527437ee47a47965a1adb3
SHA2566b093607aa11bb82be2143bdc458944e3b60f5cf7ea632bd48d7975b190b7ccb
SHA512f18e901cc20768fe5d00f4a74dc911c900ead2d1e70c31026ce4d488a5a7d31322455f198138f16ee5080e1f0299ae23417a83d3b694d87b9dc42ffccd0bac3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500458347f93655e8b59ff19796028166
SHA1d948fa4b23c58c11110e4a2496316211401faf53
SHA2564e3f52e59e74fcb9b690a75ed0d7426b66a336032b8fcaa3c717e74e37534fe3
SHA512a87c18e1cd5b4d2599f16a633830f5114a8687704a40c2eae9ef5efbeccfde25f7faba622d976b55b544c6e8b5ab20710dc240f26b733f3239593e8e58351169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b9653ee3d2239bd2c426b9dcce09880
SHA1a63d1126388c84df6af764905c9536bfcffa6a2d
SHA256d41b432a22ccb0c73428efd557ab3fb34eb0dacf628b407a0980dd089290c760
SHA5124ea874601b587f4147e2686fdd22f469a066dccfa69eb353b0238d303f27f71bc71b912c323fb81195e1222d80d2bca658835954a271e68be3aa26e1993026ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5365f52bd737c4c0bf1491703c722a766
SHA1ff403384a2ea0fcd83cfdc6d4745d8a2d460a1d3
SHA2560eacc4f0c24fdefb61636ce7b2ff832ce979572822f951aead6ee1dbc2776fb6
SHA51259e8afddaab73dd553b78d28be2def4f590346bc0dd8ac29b0bb2884b083c969d81f1dc65c9dfb6b790875217241aa6ac4cb2ff406b2978ee124f31edc96f02c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec01efc0051be1313d4e1e1ded4068c9
SHA194b1a52665cc55c90968bc37a87f00fc4f6c8a84
SHA256f4ed10fbc2795ddacbf9a0f364e5e6031b34157e52e2f3aaaa8570d773495fba
SHA512027ec3cabda7a5f3114c9c2182cf5d31f859f26434c94bd9caddb7632a674ed8e573e08e3595b17ec1198b58f80e1a5522b08e1c17e08da5dc9a15111c412f96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504ebd34c9c3a49caa143b24a9a2082fe
SHA15d71d531d981049645b123116e1fd525087d4b40
SHA256f5ea18add43357702ed32f21591c9a0b45520689f78ded0abf5956f52533e3b9
SHA512fa0554de3f31dba8fbba884f81c4f57d53fcbfc2826788509452b54768dcc4f8dfbf067555a92f842df4c8e3cb0689307eeb21a507da16b0d465f1597819c443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587c60a8993be3f550eb9f921e6b9ea40
SHA102bee1c32e0e3a21b89f125482a5716589664220
SHA256989033aaa71690f61ed8cf1549c3aa68397f4fa5689ada5581b2ecdc756d8a4c
SHA512644db6e6875c9de4e3405187fb3096dc41fc5e79eb3f64cedfd2d04f922caec7fcc04ae572398507584ca35da02b91f06974e91053d5ee147e5e75c037617b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e266f3def29ffad2db9de35867eb672
SHA18f0cccb9efb154abd540cab0589e0a550d01110a
SHA256caa8fd265a41769946c3d70ac2710bccfaadac2dce69f2de5be4eedcfa87ddfe
SHA512a5365f42183d645930dce09b2ac8c68f370c33c27afbf67478df504e03d880d3259b4fb4b308958eddc42ed240f3cec5a9daa3641459ce2c01a0d9aed3a4ee5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d21ff1e67d8e24419f706592d72fcf8
SHA1fb428105ee92a0d5dcdce073a4e5c9a41805e00b
SHA256b83080326fb80672d22e7c11a3ab04150e37540ffa3377d9ae74ee6f8e2676ae
SHA512660195e1876da46a1793f2d71afb485ce6ffff67d4452d7e99c886c9f800fe21c24dd67bafa4db84b7a192638269eef05c451c2f8b9826cf52dd39e2bca93c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc866e8943750ff6fbf61899eb82a775
SHA1085e0f4947b10764b2a5942abcf2d59f9529210d
SHA256a48802b2e93885d7305d91e2b5f8e9ae858fd56fc4f0d82d2bc573b60a64a5c2
SHA512c0737b10f13c9724e797311784b60a5f10b6b1a25c984dadcb705a32ba79f711b57897a3e647c29cbb984db371a26ee73328b5f273943fff8362b55d630de663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5d0a74ffd23ee846717a28419f795a7
SHA1696b762b97af13023c54bcff263df483933ac52f
SHA256f681fb46c0c03b90b957c5c95c3b89e473167491e05f1ed82bd68f996ca78a05
SHA5122a2bd83e6a18cd9fc2c1793fe4bfbe3398065b69b3a7738b5fef411f517067fdfbdb4531c4ddddb3cf57617b93c8d3fa1f5dd71774629f6ddff1b0d07d0669e1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b