Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
ba626860cc1871399609c240ae8c9648_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba626860cc1871399609c240ae8c9648_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ba626860cc1871399609c240ae8c9648_JaffaCakes118.html
-
Size
3KB
-
MD5
ba626860cc1871399609c240ae8c9648
-
SHA1
b2f0cc891d338662e0b1c9c1c93a47651c20cb25
-
SHA256
d02b41c4e6359a4c6fcbf734ad2fce3acef131833e35cd8305ebb3eed320fb1d
-
SHA512
08966abaf381d86c625730b26e17dd21847ced22bff483ea34bcb8315ee09eea8558a9ddfb7f746bd574b3b3b1ff170da868f4e9e58d879dda611935b6d66973
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34F3DE21-6109-11EF-A24E-4E15D54E5731} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000c2236b6e0715ae71414671d44559371aff23e56ab892adb5252d39c3e19b5b79000000000e8000000002000020000000b1eeb6c00290e3b10d409e5ab7488cfa454544dc4e7faf1d4c15443fe9b030b820000000efbde53844cfe3e65949dc7b3bcb66276c1298c57f4152836b92a36487c1050c40000000f1766d658bede00edcaacdae74c84dcac6072ad6b644dd29fd74bf67ca6bab3e69d5b8742d3e1cb652f68cd98968b2252abdee4ca6d6c893a7476988e6018631 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705399f715f5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430549632" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2568 1924 iexplore.exe 28 PID 1924 wrote to memory of 2568 1924 iexplore.exe 28 PID 1924 wrote to memory of 2568 1924 iexplore.exe 28 PID 1924 wrote to memory of 2568 1924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ba626860cc1871399609c240ae8c9648_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD511c2f898fd8dfea3d00f818a53ac0618
SHA12dc1125099460977b01ea545b9404446c6cc43e8
SHA25672f7fc10a169e801c60ff5ad2562df2e06e3c78bdc316d895665f2f607cdec15
SHA512177202ed0d79e6d0a98a1a2888ebec7cb0e8fa21ff7442e236b3bc90585f706c28b7cb4a5f42ca9bdb0aee0e97df13e8c81d587ef21253119ee3fb612434643d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5faaabea10cd20b4377a572f29a0f55fb
SHA13ad879916a585d62faf447b9f9ed416e91f5b7fb
SHA25629d368506b80b561854307171d8140b4275714386705bdcd03c9890edb5f726b
SHA5124eb905f493d04cc226cf0772dcc08d0de7654e41df517e238bd030a42facd3666f6e74e6199fc7aafe286120ea6eeb3cba6b426cf3ec308786b57b08b5b5c162
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5055fa366e2036c86cdf958c651d2ba35
SHA10affede54d6e47d4633cb13f765fa1ac8d26b998
SHA2565c41245cfa5233c39edd54de92a6e72eacedb1313e3a9070d4f6b4838a46910b
SHA5120208ca20a735c318555264baba5457e61e789f3edf5b82848fa6b2dec693ae5ba4db9d9da6f1b2836383b4ade57627ccecf94577a2d1dcb1bb5b44ef375e3d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53909635d7e4eac80a97e9be4a5d4ed8e
SHA1d0e74f83f930e0607c445daab4b3a339324d7553
SHA256a32107d1e11e1daef19ca5b96d78d820942b93c515fd618fb6ee296190ba18c4
SHA512a69ceed92e870cbf713fd47df0ddb1bbf9b2c95c8ba55abfbbada0c22760ae39ac005273bbb0db559b9cf74de057fe6b4903fed451b4048484edbdbe63e6309f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57be32b8a9727132f5cbd9a72832618f3
SHA1270f8948186e272845920d02dc6b4d631273d713
SHA2566121389c4f7dfb4c0e46299c28412a19b416490b18dde7513e7210837d3d487f
SHA512d01fc24c923ccbe86b63bff302007ec93ee511e0a6d0033b6a0b37143143905d7f490cb763dfc38003fe7b11841812432bf4eb48b0c5cee6d3764a3ea86ed9ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5829a212cac7b422a6a3b46ed9e67f16e
SHA1d1ce78bb27006f5905521e0955c460ec3908ad00
SHA25607d9b20f88307b51f827fe3a40bdfaef35bbc26369febff4d944c5ece4f2e43b
SHA512892dbffffff3a130b8af124c44940da5d5220e547ab022d571b23180b6fc88acb4bc6e5d133c605fa86eb608b3b62b3a4d5a3199e80bda35915852b221b2126e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58580941d33f6806219204190baa8149b
SHA115cd175f32617e7d89d7578b6f4383dbc084f8a4
SHA256a12024e5c7928751298374108d174c30fb0851a903d5a4156e210c945f27bcc8
SHA5122acb47220dbd3f098aad815dd5fd007ae79a64090c551b2e4dae1c6e52db2e971910362f18e8487abe95430a01e38fb778de35e708b4ea8ee5f9434f3cebfb83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52bcf57765f26e11a2e26ab980f0d1107
SHA1eab4f7fbae9485353fbeeb8ce322047931498308
SHA25681d107106da10ab5bcfe8adfef686bb417cc721394bbb50fa6b2e0f928480949
SHA512784050e8f30603ce2815c2d89abbec5116aaf1ac12cb45d54612b8d97cc70457ad799768df8e9e386d2e598f93ecf22591b9ac7ba532c20e73effef147b95173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b04819db62e3cc483c7d939e1f3401de
SHA135f9dc7d3ffccc4b87d81646b12fb6b065947b0e
SHA2567e43c118524f2f15ae81fec606e8c6b792b7fa49251c1d496afe4135f788ef53
SHA5124ed66a24e5cc810d0a75d21e4f878c8107836fc8d91fea91a8ff0e466fd7ee6e93077f355e166259c22d9e2a3ff852b0473033c14d9ee975879257ee188efae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59331a0512b8f2d09c7541dbb27a6b322
SHA182a2f0f62b945fa2208460cd1a10c9ea3e4a4f6c
SHA256fd501e7b81a9d7fa20bf0351bfa21112d5dc71ab60a9ea1bb383142b155edb11
SHA51232727605088a73d0670e1f58567dabbea4237587c7f287d02c22e6acd46d651a66e78e6ffaf6a7e5c5e5fa8d4013a497523b1e6a17875b3a829e4a49d0e11b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5acf71027e4a6b8fe69cf36a589843cc1
SHA198fd10fbe95597304984abd7dd3117dbe9e82a06
SHA25607367c156d58acea55112e5afe9d7a3e6fac755fc755e0792010e98597267af9
SHA51210df541ee9c9ff3476658a55711dd2a7f080dc15ef3b3ad20a8e692d4ca76fd55a2c986c80b91dd89ed82f0e9c172a7c72f8e3edd31980aeb33c945b3290ad9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD548534eb19652b711bcf395cfdb5c2905
SHA1c362a937cf70c370433c1f101a48ec5ec8397df6
SHA2565006ad66668f73b5e80dbf6aab49c9198d3612bca23dc29b58f6902b2e5ff859
SHA51239be4717fadbb09b4b2c9bf8934a9deeada4330766e4920ba385f63ed019336cec9afb92f2bca9f371be353048014c00516c7670bf3cb38347b6d1a3c29642f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c78c23c7461be74b475588122d5106a1
SHA1ca562fd19331b8c389d615b994f463b524706a09
SHA256bbd7004499ad254e3984cddd77990161226d68b9939e1a49c1cafaa2a2fe6b5b
SHA512ac00dfe4d9ec399749b3d05c195b57315258731d81dd49c17d841a61964bc11d1a6b3de294f1fac0b33a80c217312a28b651b507d1cac8f33f534d4d3944af59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5864500ec201de743c463cbafda7df258
SHA1d1bcf960db5b19942f4fe70c27ec0aadd6c5cfa3
SHA256539b9f66ae55d2bdffade106862db5368b0836597845107ddeb180e0b61c013a
SHA5127b8d9b8763f535ba4b294a521690b3fd651a89ed7f3a1cf1be3d6bebc3ef8c9687f7a7ee5a9efe9359680721956105d812783ed0461fc0d9e72d0aab7365e18b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c04badb2474ec68986ad426de2fcb81e
SHA1a63c1adce07927eac18c3087dfaefae1c592e6da
SHA256cc90708add9800a50e15ba504b0a095635dc40bb9d92191dd82df0e20e43c32d
SHA5124b02c4bec0fa818d98d2b9e15c2731bd6637229de8553333e73e7a35048a8fe4465717cf58fdb27a2cc7b9e28037244f0cd326c7cf6e8d25d722386a6e822d61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c72c968f7f5a659a15eb0ae585d714d3
SHA167fe661a503d847c890d4cf406cf160c27840855
SHA256680cb2fe65bff67405f0f815aac45c52701f2f26d3dc2221f3930f7f6f967782
SHA512a85f6c7288bce68734b49f371c10c2fac5d4338a8f04eefb7f7eabe827a95f8897fba3b8aab50c4031a294403c8273c057103106cea900da14df15e3a34f66ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59f6a8526337a0862313fb8126cbfb29d
SHA122a967dc367575e6c0424592acf04a1e2ca6147a
SHA2567e62dd82efab163c1d2564e7473438baa8bcee0018eb4afce558b458ff68460d
SHA51248a4213c534ef80946b8c0ff01c0fa792b5dec595eb70a01e748701ce0465adb1aaa3b577bc51b441b52daed9d2b400500a8b7f18866a3a3f4135928eb2065d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ccba5a04d84cd035f153755d1ff9196a
SHA16439cb6089d19dbfed23b9fe7ee69e24e88c61b4
SHA2568cba8db26adf3e479e498fa3d2086307bd8e97dfdef0415e3c2a7fa554f9c4ff
SHA5121b6a6cb2445035e01ea137289e50ea9e8c277b5cc04b3988cf8ed3e660034bd5327fc4168a0b74ed08904d4670ce55c63ac4f80292be1c975c43031cd9121936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5150c2179ab3787fef6ff27b961b3f62c
SHA160faef32ae2e8fc0d22b56365d79e55cac8b8e13
SHA2561c09a7b52c9072a15008dbebd5a856cfd67c91b3479d82065d80fd127b37fcdc
SHA512af1329fec384138d1f33b97b63b46b2b2ed40143bbc7032ae796961e165188d3c1f468f894f894e7c35c451b9b1873bb5697b3157814abf3699ee434c65592a8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b