Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 07:06
Static task
static1
Behavioral task
behavioral1
Sample
c034de323f4cec8b35775051f1e9bbbb_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c034de323f4cec8b35775051f1e9bbbb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c034de323f4cec8b35775051f1e9bbbb_JaffaCakes118.html
-
Size
125KB
-
MD5
c034de323f4cec8b35775051f1e9bbbb
-
SHA1
7fdf9e5a2775af5139bb089b28ea5a83fdb64b6a
-
SHA256
fb659d035ad64ee782122bbbf141c34a21d3e151f5b0e956f5fd7e697a07180e
-
SHA512
4083163dc69c919447ca43e6c814b6eaef613c90dbda2cfc0c75c83698c70f012b7766d1426c312738fb6498a190e9eba182a3f7463ba84e94675d7c8176636e
-
SSDEEP
1536:StlfX+yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dR:Sv+yfkMY+BES09JXAnyrZalI+YV+I
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000f55079f606c60ec089995c282dffe27da8cdda8c7e7c69c897eecc9369394428000000000e800000000200002000000021e184a14482d1548798bd6b2c9df7a6d40f1fd1b86f83a9a3920508da8d159d20000000eef63141296f10155e0ac7c0df0102911ecaca5486f9b53bc677da6882c282c5400000001df97863041315ef45d89cbfb87dba18dc900bc49cf0b71b901c907d3646b692df19168d3419d1247325e12fc76541ef40cb0423f8452566ae19f4de01221f14 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88F217A1-62B0-11EF-9CED-F296DB73ED53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430731450" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8060615fbdf6da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1652 iexplore.exe 1652 iexplore.exe 992 IEXPLORE.EXE 992 IEXPLORE.EXE 992 IEXPLORE.EXE 992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1652 wrote to memory of 992 1652 iexplore.exe 30 PID 1652 wrote to memory of 992 1652 iexplore.exe 30 PID 1652 wrote to memory of 992 1652 iexplore.exe 30 PID 1652 wrote to memory of 992 1652 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c034de323f4cec8b35775051f1e9bbbb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e441e5c6a08e2b2c1c63ea54655ea05f
SHA19e9432c5907e47e942c3dcc485ad2f9bfa933146
SHA256532f283662c0737b43deabf76c85567dbc808a838af0677ce1943be3dc0f558a
SHA5126950083c472ea5bea72112411dde1bb7aba5760e71c42b796204ad032a4193840215aa88b77617d53bc0b7a631c59f4970ea91ab27270052739328ec14dd4ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f28a4fadf7f3f6249226fb57fec33877
SHA14886e8322bd2a3c0b8341776c8683608ce0937b5
SHA2563cd77cca5e8cf10ae7011ede4ad2635ec1db4f2ca749e7c5add83dfde000f805
SHA512b832f09ab74906676ab6bfe5e57b9e730885195d278c866fc12b76b52dcbb8ef4b3e6525a4f17cee77b5b6049fb080e00d0a58c0738b2cd2cad3ee78ec6fa82a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ba8bbba96f554d9d0dcb8eb0e806bb9
SHA189e7cd69561f5123ca1f83e7a9d4c085fc449786
SHA256624a2ab5eac786d4433f5d00c18a8dee4a16570d6230e7276b2ef8529a8bb6db
SHA512c9343e5b457455d4d160bd07b0290bc7caf47a4150a079ec05575094e9ec4f28c6871f2225809000563757704ab133c4270588f6e44af4e1eadf2500271864a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587e2317a6795687945c6226de8e4c43e
SHA1cc19a38612bea449e8b8e8366554ce93e5076d57
SHA25691c6da3ca53d3e5dfeab7335fd8773d8a4311388ca562d5bd75a825743ed692d
SHA512a25ad00278db0b486a3eed132736d97a0596d046dcf4e30581b36b3bb6ab621b493698558c54d463b85034387055bf0e0b51af212b1429a288bfb6419458adda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7e8609f147cb4bc1ac0da8996d2b607
SHA113a1a25d4b3a2b7f9aab58b43ce860bcda58a4c5
SHA2569e6c887c38f36ee785d51808a1a5aaedd3a86327d8c0611c898e7dd24b3e3081
SHA51290c1c137e1e79384c2693f9797008b64cad918fd3c9631689dc01a66223caf8a4ec1596f649e642bfcef15edf0cbd5094b2d81b1b87148ffde5ce717b79c6ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5890ff07c36b74873a2a1347d6873ac9e
SHA13d2b1afd85f454597bd42251699f6e0a5df63020
SHA256b05728cb076d5b1bf52f07d69cd6395594281a5914e0f05aa051979702ae25b7
SHA512242ae5d0c070c8fac83af33cb5845494f5c2144fbffba035c4f4f6742d11788a6018412c5ed933a6eacde6ff50b6cd5d07d67bcfe9e1836c2ba95229a01eb1b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e206fc7879aaa3d442753e1d6f9aade9
SHA1cf38b0ecdcfa69b934a52d7fa3dc5c9a624fb7ed
SHA256c832d956ca53f522d55833c58f49de0e37f32ee67cc9bc64276e12f0c1053207
SHA512bd48e8def3736e72e2dda4cd1bd5bcf5f50188c0e77e732a4b3412c9b9df58971e92b6e132974d236d701b62740c977374fc89e9d341e062e8d6e354370c4488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500f0c50d484c4185c5e62fde781b458d
SHA1f39b4838893d0e071927d7e9964b1c32907b2695
SHA2562839b207ff27ca9be25234f1c2e8d3a9c8a3b8460cb761d73ee1a998f2fbf909
SHA51299db54dc7014fbc657eed6460e3dee60b1aab315205e6074ae0945d8a0b497dcc8210764d93c68f4be4f7cc35f2e17a00066bf6d6c409092c349555dbb4af6e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a8fe84691a5b1a03e545e46efd41988
SHA13ad3e88915f68dcf0ae5efc5ea8a872c2ff9de71
SHA256670a4dbd4be511ce14d462fe21178f0b88dcfde1fad351964e5b36c8dd55e53a
SHA51217186540c73a23ba2f89b9d2a1297a8c7cb2f24f8cc0e007ed8495c2a4f7147df7b4ee2747be68a2158a876eededc895d90acb916642a739ef5899e2bc5e2d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582ff793ff87a3cc1661bbdc781bfabfe
SHA17d963da8cc933eac5fac733e2c6bd7b23cefcab0
SHA256bb3abe87ddfb1e9dc3fdebf11cbcc2dc538ba6c1f2c0d8dba78e06fa2cdf6be3
SHA512a135f54a72bdb54b611881f570e5d5ccf9be5787116cb3951348790eeed60315c652ed48ef6c90ac6455a5142d02abf3df000e7a747f31f36bbb06c857754d1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567a23088a51269e4d261e5303dc75272
SHA10be81c6ca3ee6cd84c23c1ee5f323d4c5172e103
SHA25614871f756c15e7ad47224c24ea91bad866e86b9cd542b33a255541b6b63b2bd9
SHA512d8272aa007d766737507caa8cc85a78a582155d5d80f2644d5c4f76494a59b31aed9a08521fd5b6626c4f1c846107fe6987bbad9cae5e5036543e00a48bd173d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571dc97f79a2afc07885ba09aa20f263a
SHA13f44985a3ccdc5697f4de0fa9871c64a9ec20474
SHA2565c6ddb70d6226b9f5eb15af67746113578e9e4b2be5fedfd3eab2b31773bc206
SHA5121fd95f6cf77f67c7b1879cd087c6e6f76e82e1459e0ad62a5be534781bbd264ec703950406c20d4ee5bb8ae3d05aa9966747291ca73fe4c723d3ad1c859de82c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c3f4ceb548e08f13d21c886b54a1467
SHA177729cd2c52e57a077e45b150be00ef6029da99c
SHA256d6f216e00a6457cf6cf5e7d0636d4e2f1f4f780da54cff47b31455b7fa6eb236
SHA5129a4dad122efb2f68f6e026329801d0da1a15d8575836eb19c39019129b3760cca085155c9b7a1b6bfb31d2292357e01820ba07e915cefb0c60fee02c04e555c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5c8376cdc9bdaaa1465b225dcff98f9
SHA184e0f461a57c234baaf1da2e5639d2aaea5325ac
SHA256a07d5a86cd2e4ce4fd64defbcd88e987fe955a6096903b645bc666990b47c8a1
SHA512cd345f56ee4d73868207d3ce278d472fe978d32f14a147f52909dad769028a56c9eafe14d1dad9862ac5a489b6f6a35ca83dab5cc72bd7ab01258a6bdff8d4a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fd845e07810277c2ba4387d278283a5
SHA1a5a33f9c98396af4deec18a7e4dd6a3d8ce31c28
SHA256a04c89bf8431d91d570aad2ae9be68f5ed2c3142d904d130f5e083baa4cefeb1
SHA51268afeca5a7dacdf1bfc3ee2a7774e0d62118033cb96603f52dcc39e164fc1cf19bc03a109a51a309339ef64225b6ee3cf680ba08630555340f998504113bf72e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582aaa70b703dba21dd751836e30863d7
SHA1196a2218a9ee84752fdce649833ce1909d7cdb17
SHA25658cd8e3ad0fc18988dfde77a97e0c7776daa41169c9d8ded35bb570126c36a31
SHA5125e29dc47ce687878088693d74bb8ce5b104bce574e2e2de7197a9874504246bbe4596eba31bc6d34f652c506d877d01333bf99ba5b6ed0cb90157383651f5fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517c2e26b9ac02e2e85121a5ca89962c2
SHA1f04dfc6aab67cd8cd0794f04e4241e13d03c96ca
SHA256063fb7a56cab126716164b7b63d3920589ec5eb1d342c5a9d10e79fae52a2112
SHA5123f7e1f8f176e1de85f80610eee539a8939380411e59ffc27d245c14d321f8a2f0693072baf73218a914f753aad22a6ee3f6ff86e72303c4daac764a7d76e735f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b