Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 04:58
Static task
static1
Behavioral task
behavioral1
Sample
bdef3279e801651461bbf0d4f7d7fd45_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bdef3279e801651461bbf0d4f7d7fd45_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bdef3279e801651461bbf0d4f7d7fd45_JaffaCakes118.html
-
Size
37KB
-
MD5
bdef3279e801651461bbf0d4f7d7fd45
-
SHA1
d1a4d71d830df49f8dbe5aa768fbc1d2f5458bef
-
SHA256
452e083e8539fed2396d82f3e57e1c1db4186bb3d5870269697a5b01a4c46d3b
-
SHA512
ff97c5ff24ed24dd7dc4e8c2d02b676be210e2494cbce64d20c6eee3819745d2a4a029b880e19b72159ce24c3212f1098752d799e162b5b24e5b909a360c5d6d
-
SSDEEP
768:Yl9m2DawLyybhET8+HR5hXfzJ+N3KDi/3MK3mPhdMZ8h:Yl9m2DawLyybhET8+HRDPWAurUt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{783D4B91-61D5-11EF-B29C-DA2B18D38280} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000dfa05dbaa08bae0e00e45b275bd9418454b2fc63ea098f294f638b735aad2a9b000000000e80000000020000200000009d6977bf70b9b031a2f781bb188b44813d7b9df2c659ecd35ade38f962ce1da120000000ce0069288b683e8bee477452000b4200582246de663debf7ff61a947359ec2da40000000e823e8068681065a1ba2d45a5ef5a8175a44164ca64dcb091ca16fce0c4996e62f76aa2e67ae9c763a8047fdebbb4059a6ece20b825b1140dcc6486d72a8a821 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b04b704de2f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430637363" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2472 2348 iexplore.exe 29 PID 2348 wrote to memory of 2472 2348 iexplore.exe 29 PID 2348 wrote to memory of 2472 2348 iexplore.exe 29 PID 2348 wrote to memory of 2472 2348 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bdef3279e801651461bbf0d4f7d7fd45_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dadff835e6915242401e77c7fac995a
SHA1f1d5341bf7cf1a2b1e5d9726fc5d69e0a24e3d21
SHA256ee2d9ce63b1b2fa3010a3328c543d9339666c41aef79f1ec2147985f35e101db
SHA512c83b897060e64143e18ea923c037b57083b8fe81abeb075306936788ee902d239afbf0169175418acb3916b207332bc642cdf34aeb2a535f2fc8be26e48db42e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd200785a341611fc0156fb62d52160e
SHA1cedb9735fb33369f5eba20f8f51db6d7d676800e
SHA25682a4e2e66712add938d1616a303331f405fd819b84fc9e36eafbdc5075900b49
SHA5128dfd7e1be665f02a24453b6573b1f509afef2f31c8ae718e68dea5b070486c243a26bc2cff437abbdb17e6623de175ed18692c88d424ea82c8c2c7cb773b464d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c191040094126b80155d7731951d2876
SHA1261ff68e33572586f57be4aec063b565719cdadd
SHA25665bf0639ec89bae32738dd8b090eba710ca5fa7eb738b0d30e629218652fe028
SHA512a310feb3a73e822be6c6ebf08741de2ccbccbede98776c1394c5161c6252a6993b019e90061c003e87e64eac7d91c20e155af5701d2a745e51b690b8104c27b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548f409a10b7231d5c4d4b4e329d3fd94
SHA1492c3b3a7974fc838805dfbf2f43851ba21e3143
SHA2567d62f00342681e271f1a360c1050a59ef3ba0f3de5d6d0ab811f3b534f9740de
SHA512d93cb3dd0f8cf05a716c22fad38423c3d90d75a39e9abb0524b780a7a6997405b6ebe210f910c690e1e17f69f76477f71f6a414eed81b5b13b6941a2b9c48875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c73c12e9e734455c2d7e8555c07e802
SHA135e33a7758d2bbc011db12a76461595b96688c53
SHA256740ac91158315709d4e33eefd1a069f90574a19587230b0b458dbd020e269819
SHA512343f85fae94a307b2768efe62cb9d5d37cbeae93b3d3fd6ec1f30cb3a34bbea8e5506b08aa37b1f6fec8e3e2b7f54dbbe8e5c5ec79349f47687f32a02aab272b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5591f2aded9210122792ea14de9843257
SHA1302bdaefc4b42cd5cd151727b8b3fbdf3174c99d
SHA256d8e645382ecaa6f21831dfca533cf9f40f9fe7919a7b03d55a448d3f111421bb
SHA512ec42690406e06d2f1e60f07f52165f032a3f7304b50ccc63a39ea3f8dc0f053e6b5d198e722cc68c301d9536d7969acd0bd143a748865afb5c860fee8276f928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54171baf80405d5516bc67635d265ed08
SHA1491a2f707fa903488eb34710533fe35ac45930d2
SHA25624385c76ed00b8fd08fa144ae4bf97615cd91be777a185acc6689bdaf495eee5
SHA512919797fc75c01e6b2eb18d771b82f71e505ee3e574df54206bb8d70c2111fc13d7b48c96a98535a389fa8d9e7efb72b1a043af9e8c076fd97c6bb2ea4f3eb4c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544310e8509f6c99cefb293c8fb1938bc
SHA1b3f6ccc154dbdcebbed3cd3da29e3cac269de5ed
SHA256799e3701fa69dd859983128f95168b1f9a092705aab4e401b34fce053c08ed25
SHA512c62504e90e777ab1aa1de9ad127617224ddddcaa9d4602a9a19f70aa6bcf49d5ac5a8a5789a0d92c99b38e88c148775708af394bd916c1b5240e2cd70da80301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7a40c3e381a56b70f4da262df29c5f4
SHA17b2172df4b075695645bd44b324bada4a2a849cf
SHA25650b2dec4a70144a2b030f77bc59b5e3b168a050c1c1b538d30381927dc33df0f
SHA5128cfdfe7be2a230310069b23277ba32cb69376150e21d18092dc182539015a2f3569a93153528065caf3afdf72fb806fa5c83a5af965cd9eb956a5df52cb62107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c92d85bf23f315474df301e581b14380
SHA1f933147f6a35192345cdfd4808fbbe5f11f2e501
SHA256bbacded6e2f99d447c01edeb4d171a45b0dcbca0a47063b5e70df0938660964a
SHA5129555df6d4509101d652fba9f28181a0016447d5aea96951dba2ce99a1b3e53aea4a6928d21735684037c2e26aa31118278f78a851ba901a842c5a83cbec09898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582830f685fbe1bd76713339132970b4c
SHA17705f7df079d69c5ccfeba400d57b7cf7d43e3f6
SHA256d7cadc6ef460746102c5c9217942ec7f0a8041810e5d7e9d779702a6a3a98989
SHA512be568b8f7dead692501686607f92f19fe9432ff4c381b4d1b5ecef1c549b9d5497b3997f1585753c50d9549042ceb8aaef0551ce439570c2cf08ae25b7c748a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beb62dfa4d3d98713b400e3f3bc63176
SHA18bf7e4d9757105fd18aad5bdd801a981b12aa1c5
SHA2564f46a67e815b798c3774a9a819a274208365d188886fad91536050699cc45325
SHA5125613cb81418f588844f36c6e859b4500ef1a9734e76d7ac75703678897f1603e94d6d4db7778ad8428691bbde6fb79d5bc2b9ce8eb4615cc054549875cf9845f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d96f0a024e065a79002baf57a39d66e
SHA113d6945ed23231847a9c66008a0eae81e2dd9481
SHA2569cde8424a484ce0396e06be06957a491d65a738529acb27be15e69e196c5f578
SHA512f5e413c7462369c9b02eaacf84b106afc53a9bd29edafce45400d6093f07c5a219a24bc5a6b3c4fb031fef0067cd0ad4c3fc75e8d0bedad4243cb6ec4748cac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dca1e7fa439ca0db9478b7bce79c878
SHA14c8ae5580487a2c648803e55fd3218bed3ba2639
SHA2568ca7cc6c822b8ee1f860a7c6fc2cb6a9132671523ed3264d518a02dd0a90543f
SHA512e4ecfa49c5abd9ac7d5717ef38e709a14f3c926d6207dc47223e68efeb829a5b5579eaeb7fc48d46975b28c1e8f58c788a449018b9b83b54e4bcc2b668a51d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5448532301fdd74852c41b1fc5b2f0a19
SHA193aebc6257a136acd96a87912fe8621ab3836509
SHA25612dcd9edf36ca46397a7a83165b05ffd94d78a2772dd319f3e230a735b196b02
SHA5120c9a08b4e938ad862ca56faf2ccc01f56e693230a8fcc6a83a89f68a06f67cd4ca0507a2940a682879d2d791b9def2f8e49db06d3a4db173c443ccee5a38105b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57566a9ab3a65c06dead1426f7064b9ca
SHA122e3bd19effc5789dd2ad50056b40b085a328c88
SHA256315feca9d7e7cfbf19230aafb89d91a57bbae9aa072888f3cc39023afe786bb2
SHA51282b3225d96a8ec435034502d30cc48b501c7af8bdd62261cb248db9559a6d22c83e07d9d3de60191d850a1bc01874fac6c9cba8b01a5cc6d2d8d04744096ac7d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NFAY0EOS\jquery.flexslider.min[1].htm
Filesize122B
MD51b041c010262e27226ad3abee5b00b06
SHA1dd05d96350bc58ca0406b539f7a3a81d64ccb221
SHA25623c43d08890e4e03734611b3301efe9e6eb2f1d04800e9df92cb2c9636950e70
SHA51224865edce6fb43848930e29607655369e01542d9b9cbe11d733e0c06594bb5fdf9e5fe2e4f8a2ebc0f294103c03a45edb9a99829024839d80217f008f38f3e81
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XWMUP5AI\jquery.nivo.slider.pack.min[1].htm
Filesize124B
MD5afaf62954194dd1b045181a874ce3629
SHA16e99fc5610e06825e922db242b015b1beb59afd3
SHA256842c76943f54464666b2b4d0cb9bad3364b8f95fd95c377b2f736d42297c1d3c
SHA51238ec4883bd76f641f41b47199fb569176b8feb2aa9f2afee3de4131cfcc6308abacf4455767d05c829244d72917f15c74cc225e13b4eb83b0133deb83e0bdef9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z7V06J7Q\calendar-jos[1].htm
Filesize125B
MD530ec1eee101cffb6e3fb4f3720ffa331
SHA1252acf42ef2a75bc641f8e1169de92184b3adcf7
SHA2561c206c3aeaf7f9916cf40f5cf90c0b32bf42c13dc5bda9d7bd97ec21ba987f0f
SHA5126a8d74774b4bfbf0c478fbe43f1b678e6b72effa9d3c79bcf4ffe04726ff11e8158fb56fad4042cd4ff1f9704630adf35c1f202e35222d46c12c8d7f4a78f402
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b