Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 00:27
Static task
static1
Behavioral task
behavioral1
Sample
b9a85bfd0e3f13da03b284ec2b2e5124_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b9a85bfd0e3f13da03b284ec2b2e5124_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b9a85bfd0e3f13da03b284ec2b2e5124_JaffaCakes118.html
-
Size
10KB
-
MD5
b9a85bfd0e3f13da03b284ec2b2e5124
-
SHA1
eb480cd3d0d9c823cdd8b364ae1eeab9c3d8c872
-
SHA256
796ce64a82cb5c32d33d44148d111ad6257407b3b4c89dc785da76ec7d75ece3
-
SHA512
a78f8fcb2c6fba7b290b33672b58243a6cf6add8e8759471ef60b6510328832ab132c06b615ff1ed89b2d385ec96b665ade8a889b8faa5346bdbcdd8dab19f67
-
SSDEEP
192:csz7PRAYS/IzDimcISEcEcEcEQpEcEcEcE4PHb76f:ckRAY8IzDimcI3111Qq111kHS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1011e84ff3f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430534714" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000002e583b756a7d7885aa8bbf9e41d348d3e12706fa7070192cc08d7da931465e57000000000e8000000002000020000000f0f06b0dfba0cefd5facf11dadaaf33e82cc34d1ae75801810b1bed06adfb0fc20000000afbe8917d266331570f78eb97b5a64fb6bb6a75a7cd051fc41d3d2d2b7e155db40000000da05d2507fca4111798775288c666a4b7a2e70cb57ad0b14f070b772f1db37a96b830c6a9a7f111ef1191005a716476a0bd827e3f916b66e60d383f7b72ed081 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{791E0DA1-60E6-11EF-A2BE-5E235017FF15} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2548 2220 iexplore.exe 30 PID 2220 wrote to memory of 2548 2220 iexplore.exe 30 PID 2220 wrote to memory of 2548 2220 iexplore.exe 30 PID 2220 wrote to memory of 2548 2220 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b9a85bfd0e3f13da03b284ec2b2e5124_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59376ecd84d670f4d8782793130998871
SHA15b38c7a5cd319e11455e99475613099bef4aedf9
SHA256b6ba6823fd1d09ccbeaae5341b455632f49d86626286b994410f1fa07d5d2089
SHA5128ce9c18936254a9fd83390fd4bb2e3ca92d1047862d32a0b4463e3b4c2a04ae12dfdfd7ab77c21983a990c2cbc3c792b662a69f00a38731d3ae39410f04f2174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab609ed500b0690a8869b914009eb8ce
SHA17d1da02223e163ad54a0c7c93cda4cc3082925b0
SHA256aff2652144550bdec8cc09942f9e5c11d35fef8b7adbeec719a2b81e6b71c377
SHA51253bcc236d26ab5d37c5f73e08c5a18a829cb387f66225dc7c8a88948d061d2ea5f2c1e9532f7246f3a9b9cc9ad3b625a8194bc989a4fcaa90f52d344a882d1a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521ee43ba95baca0430d939bd0f074880
SHA1bf05c2a286f42b749492876cc73a6fca92aae732
SHA256046a4538b7e351a90d24f2d8e8fb83460a9ac23f39e2185eec5c5e083e4fdf89
SHA512d934c1244226ee47a52fb895dcca1263bc77d4b279b1d37d2d011159510162c8aa7cd2d7b71aef95f0460eb865c9adb3a95fdfc9654b11efc610449147ea5e9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53803caac18799015a57edd49dc5c2d48
SHA1ef7f886c91d6e368eedd933a806f2751ae23fc36
SHA2566598278d2780a7f402d99d7793baa1a71097a7e6c22dff63ffbfba2461211cf6
SHA512495bc5fddf4c62044bbbcd8594201ba7db072f04a55ce722d4b138565086450085b662ec5cae22ad5187804c327f7230037d6b81cfa5a18e80d65241ba17ceb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52813d6227e5fb5bdde3215a639384fd0
SHA1b36a7eb9d227a8f98c022132d0b85400ce4e4085
SHA256acb5d3350959018f773a6924df09a682884ae6fd82ab63d0b8613eb44df33c9c
SHA51271ab4160c764880f2be6843976e6944679367e07ea908a14e8ca3ea7f8bfe4e0ed0d05c041381e4b8812d529c3218d02e590258e86fe2abc7cebfb88f553e695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59394265473182721de9d106cf389ad02
SHA1d8a055f306ebe638153eef5ab9e87ec6a81f0fcc
SHA256559a50a9ff6e87a3211f9a7b56740ec70a7e88b7de137b3c3ce1bc08c23290d9
SHA51251bc4ee15e48514095f13999d34ea9dd47ebea78b2a757858d5253817d30059ab6610201626b0372d865048f3025177a8a4a88505bfc8f4d315ac86cf123217b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc49a952fa82fb02d53a279f8b971d42
SHA136a2c835d6dc07f2e3de9be0ab8a80fb3684b1bc
SHA256445d28ff22069a5a59779675d12f997bfc6c34603218b637e14c747ba2116a58
SHA5125af4a683cddb0dfc3cdb592c9e2b5c9948fcfe4be17a3f81e2f91feba1c4eb367349e575d04d99a1d5f88b4c614f143fffe6f1f0003f2b1674fe18384c4ab965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51927ac20e7d615682bed566330ca6b24
SHA11c81f03d26e83e2d5bf49e983ba91d6f3123c0e0
SHA25623fea2f53c638e55454ad81aa1bc37a564f0e53bec8d08d284321c57c40c4b73
SHA512a6252cded45e91f155bde8817a8dcc05b300f039325b056b8e3a2f1354b6a92819453e2e27208ee5445bfce19be3b63c4c6d8d120b9b7eca074c535fc8a0ca76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d439c41c45a9a11395460388b987776d
SHA1db3f6e8c5a53e261a93429e921c4fc838c5abe97
SHA2560acf0f8e49ff065944d065f57ad62dcec56a288a66fdaa8f8b0f2e8e29ec4906
SHA51251869615933dbf264e9567ab4b30be0c5a0231edb9890a3c22387994ad96b9e2178f78b7e8c0a98559fb13eece5584ca3b1939865515dcc6fe449280d224e569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5945daf8a33582229b313f3b42c555f52
SHA11f4d0e01fa3f22a98aff08c56809bd83418eb5ed
SHA2562918ab2b3329dca8798c106315f03d70575be55ab91fbc0a90c06e3c292e40b8
SHA512e00f5d4b13ae93e91e31b2332012a224bd650df07c1016c1c82bd3f8a3faa5f4287d300de2ee2964df0b3523954e6b55dde3d0d25e7b7ef2ea1b471394b9771e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c086dc3e0c72bc446188e7a579a668d
SHA18bc74d20eb018210a2e03a488e1c78d70cf7b091
SHA256ec9c0362771e50522dec607d8924408c8b6f8627088a5704af5f6c46e404524a
SHA512f2fae6d0c1255ba4af5a6e0b0639d88fdb80530cc04e5bb5b5b38cfc67e2a95dd9360860da0478d9a3c5a1893fd67201d5a95372e2791aaa7ceee2cf6079f2d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eec9325545315eb2f0c4490d86964660
SHA1553d7ab71cd91b6b70318849f0e552d697609002
SHA25618af84b9b98da9c4a111ec784422475ce460ae20652af8b77ca005322e4a8d5a
SHA512837d700637285d7a10218df39915a1e0fffc03d4f0d3b80d766f7e8a45760ddf5e7ab01031227234bcf2ba22a02ba7a975e8cae4a0529ae166d49c23a6c90f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae4ee696ea36768ebc4738eb0f35fd6d
SHA17fefbce3fd0252fbb7ee1b8a508b06f20799f4dc
SHA256f48ad8d0722ad7dc421f3a44d830c2ec02717408e06f24aa5f909e64d7a974b4
SHA51292b06d0f4aadc72e29cdf090df2c1022faddc770df53dc173584cf1d231e53313f95436582cf0b4e8a20ec7838766ba28de7296064f79ea745d6ce3f6ad39181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9a8bc2e3dded15952c83bada164ef1b
SHA1f99eeb3147e6c2664e36aded1c411acc4250130b
SHA256791dbd58c4063abde06090b01fdbac4f26b7cd66e46f30004da375e9a7872822
SHA5124f27b7a2736873a990eccafe8757e18dba135560e9d828d9d28831af14e07de06f87de12a01dd93873c19d2cfda74b4473a375269f508a820e6ddffe9b6d6639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be0fc5dcc6715961b311d86aa7d01cc0
SHA1a80ddb6d2a60bb01b8d8a545f4c66b590af6b6c4
SHA256e3cd70ec8663f88da280ea310948039911bcb8b5437671df2e602905108a1690
SHA512f07317f4343c26358b72bf226fa84b81aaf796f035b466276fab76807a31108d43a1641c7bd76ae9b4ba32c937847d88f1005bd5964050ca3cbf00a36c967f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a89b8a5ecf9b9b26aacd5400c96217c7
SHA150aaf07ca9d6a976dbd0e7b19722cbfe74e2df9a
SHA2565ed72226f1669660cd34532ff834cd82f2ca159e93ef25ca744ebc712e9a199b
SHA512424e4ec3427f4d9813d7a8bf0e919bf4e1b2332b5f15a5d9025233d9d4c53b19ebb4df59d307a3b87fab8b1083cc9f0d361d87b6da8910677363527748538502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538a1689f6e465968afcd3acfeb4b34d1
SHA1efffe0d8c07e914a6ee8606abaf371cff7667bd6
SHA256a18a90100a9f1402fcd2bcb7e20fc61ea27e1544314625e90e9fe85578994555
SHA5122dce0e627af4300396b2d48fdddc4d5e55383c296fb091468c662b17ddd33669e8ca6f89b9475300ce9232ad95d22cb9411adb55c15e703d36d69a87e0547c7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b57d57a01735566a1417410fa853df57
SHA1c576c1d971a6da02235c2f7985eadbb75c8d341b
SHA256470d5ec4b70d7791c3a62136a00040041a65d3dc83c36547fab3f6b728a386c2
SHA512e8000a56dd60675011c5b07c66019a5aeac0a2680d4bbfb2389182fea2cedc92192b0b68b222c3f62138c37b8d9857006dfa87b084cbe634b0cbcf5bb93a6606
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b