Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 08:14
Static task
static1
Behavioral task
behavioral1
Sample
c05114b823e2eee576469164a4849d80_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c05114b823e2eee576469164a4849d80_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c05114b823e2eee576469164a4849d80_JaffaCakes118.html
-
Size
6KB
-
MD5
c05114b823e2eee576469164a4849d80
-
SHA1
b8ca6640248647aaf3e76ddc4e224e586b15d1b9
-
SHA256
6d6120c8f640c2097315aa544d764b68649c0dd51645697f0b0014ac9bb79da6
-
SHA512
7a2aa820a27c390f640366d5c61295788f965f28df45f2538b27a76dd349d626a76c908520c52af83fbd6922ba4bc7c229b1a69a9ae0df93d9b395502a360752
-
SSDEEP
96:0hM3sHfIWw/Gj9epLwFRRinvPGzYWhWJ7BYc/:0hM32cFpsrUvPGUWot1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 708bdfe9c6f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430735552" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1568CEA1-62BA-11EF-B8BF-428107983482} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000d1b4dc04d319a5ab8c146ac92ce3b1a9dbe96600a2516e66427a97349b8fe715000000000e80000000020000200000009f9336dde81f36aa71fd4841fac81ba0224f53c35222905ce9daebd36f89d9ef2000000024b27b6de2ebbb8a89a6c392ca8f7eeaf9148a9dfb028ae6e42121111ca5a81f400000002a2eec0b6b27bcf63dd8617089daf72744aa49f33e3488661d58a2e9904010cde302bed1dbc646efb8c2dba3d8b0f26dbf161f74067739658c5a4c81e9214fba iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2560 2980 iexplore.exe 30 PID 2980 wrote to memory of 2560 2980 iexplore.exe 30 PID 2980 wrote to memory of 2560 2980 iexplore.exe 30 PID 2980 wrote to memory of 2560 2980 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c05114b823e2eee576469164a4849d80_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f02d0758285055b98edbd3e474fc0ac0
SHA13855c6eb053d256da8127a35e361c0ec875e42f8
SHA256228ca6478d15760c15caf0d1ffe86f69f5457c1c5d18473ce2d9a26c3245fdad
SHA512f8d18a31f2832ec7d9f9e0f3f371536a134cf4d0238f399ad1118f8ea65dde628b7b01ad0af3f31ed5251c52be6597623a1d629fd5028afa304763f73a57a196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a31869dac248b2126a2249f594c1ef1
SHA166b3b20ee638edef467aa03b3d798fefdf2113b6
SHA2567a0c694d5e46965ba632edaff802deafdb2655a3966187e6cf7c80caad6b380d
SHA512f8e29a73d40268660bd26ab7270a50c52ce80bbd9913b9cb48d2eff484cea150038eff2823d1a3788fcb43ecea9b78cc11d106eb20186783a3d3834443a3aec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541bde5e45e7f62fdf27474ef7679ebb3
SHA14548282e802d4eacdf81621fcb5b7df50806afc7
SHA256d7caf3588de8b63f246760c1e1bbeca79dd9c140002d5fbd6f97189790e88edc
SHA512bc902bceb1a8eb49cb733963bda093b3c5b95b56778b31d70751678e4be3587dd3a0fb7a10f1ba43434503050b5e7d8fa46f4c28f813caf0fe7601bd4f51182e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b483202e6e40ceb047359880a8095f56
SHA19a4cff5570324e3fa0b504d760bec23465ed22db
SHA2567ef0f179bd3fe1ac3ee99a1ae4e9bf82ded2e40f640faaee772d5d2f7027423c
SHA512bfffa72d1864d1250211c560fe245dd1f2d7ccd2450c0cfe73f084c77cb20a4140ddc7e0485c4ac3b40a9da53f2cad11ca0935f687c4ca9f934e2c7976e862d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5462f8e42936f7d4fd8aa6c4817278a40
SHA15ab853806f803fbd989f0a4aa79ddcac92662b79
SHA2560788996d7190c721c766eb91d15fddd8c739db81f84347ed57d76cbbb529beb2
SHA51244eaf5aa1969175a6aeedc66e406f4f97b3f8e374ed705b6127e0c81bbe7a9a3a52c762dc0c811c2fc4934fa7c19ff147e3fd0e406a1e2f0f0ba87fdd879ea4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5795ee35800bf3d5527e84f1d8c4078f6
SHA17ca9c9d81e35398a629f17b3fad1ac9a6f958f50
SHA2564673ae8ea63b953e7b87c3d4a316eb7b5d2872e214d754debdb7ccccac879718
SHA512c9b3f13f8e03f3a5b4f388865a46a6083b0f76c6b4a3786c3d869f988212bd48d10256384c0c4699b26edab0b84f5cac326fcc6f13208028cfe1e807a9b0d448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515770f1b0b34d35d91e537c5a126ce8e
SHA18ba7f728cbda1c9971892205240021ab5c51c05e
SHA256a09773aa4fe5db5da38ea7636ca3845549219a578debd40ab96229c7b60eca9e
SHA5128f67f9fde6964d0c42fd5a6bcfd09ef6ef12b451c9a149d79683ada9d036c65fc62fb4320061474a815a03300daeab7f50e0461aec983e2fea09e2b4f5adcac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3b7cc0a3621f6f42ba42b4c0d0b6791
SHA16ea553179d9de3b1a2a49421166b13b6e691f518
SHA256b2686158a80a5c7ce347445771de350f767a97125b646181d083720c9d381c9d
SHA5128ce261fc1d07cb6be085d0681abf064bffb9a75f6492f4744958a713ed56d5dd4777e1ccdcc87a6b3da1c06af031c362d7c178c477162cbcd7bc8efb91895c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e876199340823aa4f487af05333d737f
SHA16854a76f02da9093f94d4501f2b6ee533efa3e30
SHA256185b2b07c4703cb8047248cb6ede79ab1f96db3e61bcfe73824d5e831db0d267
SHA512dff0967abb399e4ba32a77621386e7b942e9e4778900ecbfa4bcb75c9ad33b878997f7ee6c966659996c0326c792fcc26f6600343bb8e6c7e01ab7882be7044b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529d4b439606b72a60c3e7f03dafeafff
SHA160aa44fb741f8c45c5f2f9ca204bdaf6f423ea13
SHA256b73ba08eb81573abc3d18bdbac2b4304f3aa4a5c0f746c1fa1896b16e769d147
SHA512b900579c68f50cf396a786db6f58fe04f2c3d94169fd355311eb95e04defb38d739b79e5c704bd098c5f3a9238e9d250a5ffa94be7ffd86bcd899105d6b7612c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55321f1f71fe2375ce826ea74ea06f928
SHA11d3e6255acfc008c03b4b079ee85c87e91f20b0b
SHA256f38e339231d53d85b471f8cf2fe21d68385f051c724575c6da43a5a031e19600
SHA512e6fb3c2f8164a7553bb54fb08eb1145c27cee4824afec2dd26364abef983d5d947aa46465d08ca86eb0935dc6caa13dee03c5cd6782df4e2730ee531eef9413e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cf40bb662648cb2f59dc5817d31bd80
SHA10e99f78bbc62ed430080c3d6f6532495780ea102
SHA2565dc78a8de96718d28abe055c0fd7d32665cba99db58e4b9e5d2d52d4a4042a67
SHA5121026368cf5db143a8c85b131ca57ae867de39c59c2730c553db88667434ad499fdd05c861a0f61f906e23145110778425501ee5c286fa562132c0f7e01760b21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553cd329967dbee996fcc4533b77603e5
SHA1f38047df5372bc643d5b787f6b997ba6b6b5bb46
SHA256a98bb6b32fcbe7830a217da779a9521ad34b0dcd3f617a4c90db3f91cce90d24
SHA51245799a63e8d033a6a920513cd4303ae9432c4f9093991e4e14541e31454cf37882980c64f3a4c53ad8a54697b2399ac79a1ec8983b285948ec394865d5d23cd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597157a38b4c897406fc4649d3e538eb1
SHA17154f1eb86ae2386a364ae42aaebe334f67596fd
SHA256489ff63cec9b013265e10b6700d707465c0ae0c571c130cb5a632074789ec0e9
SHA512ec7922b1178700a2cfa85e4e3d8d2d40fe05e4775e3bf76c5938e597122d8c0f1e6217ad3ec7c9d9cb67ed1ef9785f82a0ac7b1973e26521f4e30ad11c604a35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526e6a1ddb5ce6ec8cacea1fcedc46503
SHA12acd058e3341a888c4e4e9dc73c4b2c59e397194
SHA25663bee7f0acb13cbe2cf46bc49cae9a611431d93771258099d450942b0a1bb6df
SHA512d01649c025eef3a6f0751efd3f01b1503d64dddfd0db7380c2330156de9642ea6da2b2a05310b82f0e521419bdd705a6717c3ce232b6d8eda53b02e5e979bc90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ee59244eb1e13c0da6c3c16425d0d6f
SHA126616e785601536cdc87955e0fec7d6657a2ac94
SHA256a529d01b8770f1c86536215428057b4c4a5dfdf71d9d1e06c191d1710c0600bc
SHA512886c9d11d52ee87a1c5851b71beda4cb17ebb3e6ec48f4c22844eee54b46c20c9ee578b276b4dd8a0a29f633d7646da078ec7b93c99024a6c5b3c1a08835d1d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a1c0924b819b22f230d29bfe2e342ce
SHA1fdebbd922b4153ebf504c77806b36f4b37c9e89b
SHA256a2ba708e82eb7ac98f5f10d19a36094268dfb14610e931e2a72eac775d876ab8
SHA5126ad15e54c806cdd003149cc7945515774e101ce10d6bbaef2dce305da40624fb1742d43d7e5bbb382204ae1dfd06efe47097079598a7cf6a2d0b63610d383893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551ec3070060307fdcb154580a42ee227
SHA1d2eeb77654f50bbe5fd861534f3c57a79d79f306
SHA256e873335a4e1f5936c95bffdd61a356e05e5a2c4df94c5118a7db3728172b71a5
SHA5123eca986eec8477a5cd0526491156e6a172c8a2b132d174c9473e9ee4fbdc45efd04585431df02ff87afa140368f7135f7cfda87d598a12ca68d566b62f9dae23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd0db400962f2a86573864fd338f750
SHA1de14f7c79839e696e9d689f1a916185f3b176ff7
SHA25611f8dd79afb38fd55380f66f6f5e5f2db07096bf0f9e7958c0bd86e428d63ad4
SHA5123477fef8323b765bbb00cff67c856fb96d99bd4836954f1e086938800042434ff7dedb6b79e49a9efdbe4840e0d08e16e3d460ee3a83863c31de7e64fff0ae70
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b