Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 06:12
Static task
static1
Behavioral task
behavioral1
Sample
be095b112cdde8cde1fd54c84502c21f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be095b112cdde8cde1fd54c84502c21f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be095b112cdde8cde1fd54c84502c21f_JaffaCakes118.html
-
Size
70KB
-
MD5
be095b112cdde8cde1fd54c84502c21f
-
SHA1
5c6fccd792db938cb04f0fe474a458ba7c495547
-
SHA256
5829e046caf459ebb498c5a24cf8bceaa77c6777b18366829deaa614fdcecad5
-
SHA512
e806d04cf21f5afbebb6a44aff4c8031f652fdaf7a2578b08fcfcf117c091cc6783aa373fc83bcfa9cdc142306a37b2d84b81612e77565529804a5508deeff39
-
SSDEEP
768:Ji/gcMWR3sI2PDDnd0g6M6jHoT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFVG8sM:JpcITTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D9E2E671-61DF-11EF-A205-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000000cf9a6e6a47f064875675c2d7a933f8de85e9c2f4e35212f5246bd197ba2fc9e000000000e8000000002000020000000518247f688c6151dd6fbb2b5304e30b69a10e394458621c24d25c359d76d01af200000007b4f45f5d2cb8a2d9bec7a7d87f1411fbe1e0b01608e0682e60c45045ec49e6340000000379da559398290bf4c7c6d0de9dbf975acfe68383c59cb0cef4cb339519c95acf3438d89cb01004d9d58a9fb7f7dd61ff0b5d68f488cf6dad1940685d49aefc4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0e108b0ecf5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430641821" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 1856 IEXPLORE.EXE 1856 IEXPLORE.EXE 1856 IEXPLORE.EXE 1856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 1856 2972 iexplore.exe 30 PID 2972 wrote to memory of 1856 2972 iexplore.exe 30 PID 2972 wrote to memory of 1856 2972 iexplore.exe 30 PID 2972 wrote to memory of 1856 2972 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be095b112cdde8cde1fd54c84502c21f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3570908ab8eb8f090a503e57f9b8270
SHA1e7dcb0b017789914294980dbb15eb9292c545c26
SHA256b62c4eb2c5bef803c744faebb5ff6d91bdcafb5ef95911b3ef3eef16726f7fd8
SHA512c7956a983436cadcbb4d649b73226e228c58e144183c2cef85f2ef754ca88fe6f9ad57c132bbb6b6b0490044d981efc5ec7b7fea74fc1785e1da4351293ef01a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530f4ee95eaf1d27691bde5f08e38823b
SHA1a3c912c429cdaad95b4aa448e700dfa39151d203
SHA2565e262cbd3dc2ca8257df02d5c5b6f01c343ac7844a5bb8b9b12da9c0ae2bcf70
SHA512d767504ecdbd9b1580fa964a4df1df04709b317c515d2ba5774945d3bbb9404c208b190f919efd4a66229e8161263f158b91c2aabe7b4b913f2344c87355714d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5947b0d0697ccf06b129d4e225d3f8521
SHA172d71e8400741a3339f63284ff0ebfc94ee9e02c
SHA256b8b9edfd9eedd9f36d77eeb6993f3c350f56fed9abc2f51b4f72ae028e6fab5c
SHA512b1a020eebb9f3d14d7ff30e15688eecd4ba536c1e75f804c52c73b5257d00dbc43cea6c12eaa9f16d46f2daea2da24b6369ae35a6cae9e1a922f11921539df3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cd759cebb1307a50f1f9cd699fac746
SHA1f24a825231d622f7b6ed811c35eb658f25e1fd16
SHA2565c355d2518c7ca70ad52a77268ecc7f222c37fb7477e1e7956877b6b5eff884e
SHA5121789075b34d51455c66522ffe00c706ab5afe2a2ca61a1b040087806716bc209fbd8b4c7bfec46d515d10ee203348c611920cf6a1de7103a6b4c493afca4543b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547682a51c4f4b4ff60d80478bcd30786
SHA14dcf1a5756747335a1e024f6f7745515f0751d6a
SHA256e9368f9b343fd492c1e6f69a70efec9142099fd1a32318abc6f2254d04062446
SHA51281a0d04359f70a285fc609c08114d1608e793160ade789a4ecfd3975257f5fc0ebfa8457391954d72dededd7525549b05853dd114ac03275f6409a500a42dfcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a83ed7f35d3d98039fd23d189705ee4a
SHA1cdf35eccc33dce3f03416115b4644c4ca744fda4
SHA2560854b81b1d2468d5d2f455202acdac04726833f88842693c2d665180150503e3
SHA512601790534e013f09d96b73a9675d3569e79fe5f5e13f49b1fa7f7595ee331c12ef00380c15eade6a5345bdc420ecdb6473f2eb39a99cc639c3a9a5e4bb94cf78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c17e1b0142e4b64aaa14e6141430014
SHA19e88856f4b638f295414e23a4e7fcebac0ea9d52
SHA256273d53025eab4f258476328db9596a66d081fd317e9cc1b70199e17c35d584e1
SHA512b3505b43f77bad4d11e2b01c6c486518ce96c01f17f2fd60974ba80e41ed97c481475dfa3b6eb0a921628a4f994ab68ea68b334f1f76657d431807b62dcc78ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5995963ec100320247ea26ece911ccdbc
SHA1fce568db4d2c2b39ff104230ad43f25e995117fb
SHA25631b17b89f84d921a96bdcc0ebff40be45a007c3c77d7fc74cb1b8b624eccf0be
SHA5126cb0fdb37c6e83cd34a5a1360e2ab64ccf93764da76c3df82395f1cb26845ce13f2e736146c2c62221a2170a55640173b9399a6eda6b8cfe7a4e9c51168a2b3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520a02b395c95f534fa2852c4cd53b6ec
SHA1143cc5fe6dbaa67b84d93b018773d27f5aaac64b
SHA256eecc39d67d143c12c7ac4409e88fd3414a468658f38e79fe434e08969ab58537
SHA512566733f25e7c748fa8273ceca579384d57c05e5ce941c8aaf90540a535c0221d8474009004b9fa86a6728559f2b88e2b4e6c3ec582c295dbdb349d1eb04dca03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f8556de35d5d13453099113c08e35fa
SHA159c18cb005e5eb3b380b841c62b1ab78b67d09a4
SHA256bb3a8cee89e256807b0afcdd9137cf58c7a93b5b3da81d361176a8918b3abe17
SHA5127ae20d96f3a2e984c1e9b534ba749985ef7325f1320872db212081ec58514df4d3f25e399558e088540db2e2a7a17958c4649ea9fd828f961c2528962b7134ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e979ed72d56a0a68db7a4a8daec6751
SHA11afc01d7b1136e1b889272ff7acaaa1c1f4f2431
SHA2565f39791c20928ead27334ad2374381862838397b14a5ddef518a2e2bd6f63cc3
SHA5120e1a3456d79967af112d2c8c14697d0476b0ce70cdd76b786102ba54e479623e2439d377ff8e898c20be5591e32486beefff3f3f56cd68b1f1d7e9a363eedf60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c96c6b7862eccf60e2932e490ac47656
SHA1d6f774019cef36537d27523e62a24fb7310d0b57
SHA2566c1272e80bc09d819a928c6499aefcb3965fab0fe49fbb97a0de2c8b67f38bbd
SHA5129468422e2df65840492a9d755f5336ae4f11adae0c0a99ef7a07a3dd99b20ba49a733879113d842081fed307b4c9db220841365d0764c2cb6fc785671218e51d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfae44534602c1626f74ac9628e57a3e
SHA14858c047af6c97b18a8598b5a58fc173032460bb
SHA256f82bf63dd5f7694a984eeecb155f9ae936d17b839a0c4378e6da7a4fc59925fe
SHA5121ce240d3065fbf51965c1e10ff327d2520ce0fa95c2104b8a57c39a82a15b26f0c644ce023f283211b54beae6adcff76b253defef6cc1e2121a54921623027ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53be11e8d50bc4cc131cc130064791bcf
SHA1081fa3ec886a95780ceaccec2e1924f7dd0f1d6d
SHA25629be0cb62b09d4795ae02a51f86838751b32e6a5c953b6f6c6d5f9cb110aa67c
SHA5122632f1d916e440953a10aa3a6a362e11b18cdbb95a451c82bf7ec8a3560da0553c188e972a20105cd1ebd9579fc125865ba375f31d77a921b060ac3bd43020e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e9ca02ea2903623b6cf3bd798a8a35d
SHA12b6657aa497dc648fc343df13e97d43b68f15804
SHA256f051104e75918d41bbd5dad15affdf76be9b0aab415883eacedbec964d7f61e5
SHA51277d48c91373231b2411a709d2d90ba611cc1e947afbe55ad91b6bf892b09776178fd94ea1790f304b9567d84842fe4f733235cb69b43c60940a4b298cdcd82ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52083c9b5cddc39b6256563f7f5b06a66
SHA15b4a2ad75a670eb4d04718281b9bb0b703942763
SHA256de2e2f5a1aa5fd157587e332e1e9169e9d70482d61750bfc1171f11c8e14f61b
SHA5120e1d653aea4c1fff68b5807dcdf6c634521a57e2fe45a28a3ca944ec32cae1fd164600bd2d15fd782c7f6e68c5e7a12e88db2ddf984cd20a7be3d3c3d61238ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b3576877b7bfb12b5b326d8500f013
SHA162080570802574eaa02ca52b981a63219e6c8b45
SHA256f916da190bb16ecdf358856bdf3de15da53472519050ca86f130f646922db67c
SHA5121aef6318bbb374c90710855db61d9c8c8fd41df62b9834418629b32496de029cc65fbd940894181bc3bd77cd3eca5cbe51bbebc05ff0f73f28162f54dd2dc089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5dfce6e365682d070dd52cee5c8d5fd
SHA1c897c428d83c871e27738313c739a8e78bed655c
SHA256106837fccccacb4539da9d95aeee571e60e9cc589b62b67b87b4b279ca490c90
SHA512613ab17ef8a9389390f0f908acaae29fc8b1f5dc96ea2bea8fb6b9fe3b24e8893f62f7fb1ef6388edb6d76fe28fdf56397762b0b7a835ac0f82e3a67a9c35dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557a4fe7c00f03a25cd209f874c40452e
SHA102075a3d02c95ce35902d2366074dffe76f5c640
SHA25657ac82ec37511b861f01d47ebb12a050b38d022145c961cf93b9d53e05cd3672
SHA51253133c7dfbcdcf50ef9e5de01ca80147d83c814c7eb3e45bf481438734af03a3e23bbc2cfee8412e895f0bf7eed7d7e1903edfe3c44148d8ef3f0543442586f6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b