Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 07:59
Static task
static1
Behavioral task
behavioral1
Sample
c04b0550ee4d1ba7ca239df0e7aab163_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c04b0550ee4d1ba7ca239df0e7aab163_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c04b0550ee4d1ba7ca239df0e7aab163_JaffaCakes118.html
-
Size
462KB
-
MD5
c04b0550ee4d1ba7ca239df0e7aab163
-
SHA1
0efcf41021528dfc584af8c813edd990750c9593
-
SHA256
20d180aeb02b1d02c60e30ee5eb3f9173a470a741fcd4538f3afc279b5a55ae3
-
SHA512
21e1d15af99699010f70bd26ad34a45bfe4907beb428b006b3777510fc67f3abd2e72ef26c179c49f4ba2f88b82d80840f0e99f6e95e167adf4854dc3109f884
-
SSDEEP
6144:SgsMYod+X3oI+YhVsMYod+X3oI+YMsMYod+X3oI+YLsMYod+X3oI+YQ:f5d+X3jB5d+X3E5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c920000000002000000000010660000000100002000000012faa1da2c6a18615a29991560259d6d30b76e43cc9e98fe7b9a84d9e5a884b5000000000e8000000002000020000000c72515b6d1581d649ccf29884da099bc6e49d00c0f406c9d7db81d6218de405920000000b104b837e0f93d84279c0eb6129216c3a9500fc2b3201a1415b666ed932b79c040000000b45552ce267a72dd5879705fc1ea24b707582c14a5b2c5fbc0087741946bde7223779e670535638ec882fad323bd7434c36f06946d222b85fd57aa386abf0015 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 307765cec4f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5BCFF61-62B7-11EF-969F-66E045FF78A1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430734638" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 1996 IEXPLORE.EXE 1996 IEXPLORE.EXE 1996 IEXPLORE.EXE 1996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1996 1976 iexplore.exe 30 PID 1976 wrote to memory of 1996 1976 iexplore.exe 30 PID 1976 wrote to memory of 1996 1976 iexplore.exe 30 PID 1976 wrote to memory of 1996 1976 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c04b0550ee4d1ba7ca239df0e7aab163_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ea6e0a37211cf7faab637ebf35ce174
SHA1acdc1da7711d2fc0c29928e88f72850031f58a77
SHA256344a8ac714e68fbdc774dd7490f3f8e3c637b5a783ec5fc7a6fd7e4dc4afb28a
SHA51225d5807c915002fce5629136807fdb06107a41341905efddd0c80cdfcfc9f312ad1bd92a16e17cfa200429c521b3f0fbac9eed2a9256a09a64f5a55c8bdd8593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f4c22da62049ad636ccf266b163a00f
SHA1ead59982cdeabd70dee96cc7a7b51e1dc1a095af
SHA25691a66dfc592da2c3fb9db6fa97fd81fbf2025dc7117a942cfbbf78d2c8bf1507
SHA51218f04d23df6d989c9175c031a1b9f4853abdcaaf7b00dc90cfcea31530be26e594f790a6029422f9979c66d9001e498bf77110571dfada72a31df37530471f62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7f536952bdcd19828c1cdc42163266c
SHA1faf738cb3e00dd993e2d2d3f804c4fe0894f8af6
SHA256eeaea4a7ba04bc888a17d7795613016dcd3f05d4907150fc9769af216c2691db
SHA512d90230f47c255e2d4501b62ee9a50ac840c230d3ee9ee0a40659e44d46da4ff080991a67f2be448ef9b31d60ef839c02d4a9466e9e9cbce1898ce7484c190c3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a74c591ddbbd7af799f4a14572326ec0
SHA1136432cc0851a039cdc54ed3f7ea664ee97fe474
SHA256a26f2604cab14a30c40a8c0a3adf86e904f1a900deadb00d840a74133990c685
SHA51264a49461c1ad1a32042863fee9dcfaf74d229267b389d1a3b208519f88b29f6f7be326109688d640c5628ef2ea1ad2d1767467ef70ff6b371706dbb52cf4be21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0e1e61262d942a400264cf4f4f50f3d
SHA108afab9b5b415eb29f032b4fde7b38b551050d72
SHA25659f8784c5aa029783b4cd76e56b092808671a69393cfddaadbd7579ee8305a3f
SHA512dd03b025aef0158baf00a0646370831c6d03feca7e0c261b5befa4d6e835a6cf0f269a6955c9e13ad143b21320f39850ba9f778582df796610718adeede35f89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54282be5eb580082adc632706120979a6
SHA1bb3f9072ff3182e4a1af4b1d7cd0774714868d7b
SHA2564154b43be9da9386b658014a2c6acb32d5d5150a9e38e05569366a97a0b9d0e0
SHA5128333ec6e022f528103889476e1676dcb552c9268e9f7f62c3b5eae709b41d39ebf588d015195e451cc1aa86213a68804a7431c78abfaa37c7f96352c5d3145c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2032b3e1dd6e38d628e18949b88b473
SHA17a96bce793625cd5c0e7911e4e8cefaf40a75a29
SHA25679e85cb5b037eb19e697047dd20d8954283dc2339729a3532e964905ac0da234
SHA512fc0609512f5c90e522d47b225ec04a8168ec16a590ccf26d8de02d5a1bef59c513f8f0c65079451865a1478ff3f105a747fdae4e2f940a6a85f5c2405b42ac3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e971f495d4a4fe30adea979775e2c7a
SHA1fbf791aae64bbe2b1d13c3a000dc941865676398
SHA2568a813883872146d89b7564dfd4ccdf9b63463432c4178b8be9c83075d7159d37
SHA5124adb6b07e5e788d76230a32a7fa6df9815740db08037ce06c3bc5a4b97d26f4dc53a24aee1d130df44469461b3198a113f97db39d11a6a843da6d9eef994040c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552b8d51dba10cdf0d18ba46c1e628cf6
SHA1f7aa57c3086ea71b49ba1c8d93e5098154fbd65a
SHA256a09b43cbd65d1064e008ff94494c4213d41c412b9f4b5b3e7f73f6d7ef8943b4
SHA512f8485634149ed0de9b58b9f78213f806988373231e0a26474a71716ad53816db83b8d266bf120e5c72f46d18c038c2f945770e84250987f5b64f383c706e18ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e35f59a171aa8fbef3b9fa4164c11c07
SHA1e8855e5c106150eab4417c6481037f91cb8d7073
SHA2566a8200bd64b2019c4274d9dc52d4187268e6f608697aadec1fd98c22dae5e848
SHA5128d0f59be827625f81a2ff0ff783beb55d62278ae16db52c73ac9c690df1074cc64ccd7e35049159230d4edb8f228ae4af89e32c4f1082e6d501df01635a22c1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c33bee8a381686adc5c6bb3b4cf5f32
SHA18d978ba2dbb6ef0fdfd40eb81851e2afdf0e9a6d
SHA2569b57cff4c59de9440552f17e2c74efc2aad8ac4e67bf9127673ceeb0fb9c0c27
SHA512f6b81480ed661146d2bc353ea5669b82141f9cbbc0c240b42ce63858f510bb46cfec0abc97e4bd641a228aea59290180e667871258cb76aa089dba572813d846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f862c047a3e6e36684f4d213e5a2767
SHA1b219b28774f4c50e9630dbfa58f64aee0f34b166
SHA25656595beb011afe971c20cc7dc18f75fdfb3bbb8d14415f357ed68be57e07bcd1
SHA512cd7c2aade8a5fb45c54f1d7c15539c6d7308a88046671b36f306ac09c900b1948dcfa1087d267573d867b744a1e327e003422b8d8c84ae9e17c4d26b1fe32ee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530433a42c2cfae10f4f3bc60190086dd
SHA1aed2a3dc8bfaa6b742dee5619bfbcd2ade44a87d
SHA256cf599cbdad0331e3cf5b140abc9277ca10295929e5f61ae9e97bd2e809a2a4f1
SHA512be439b1a657e128bb9e8234bcd3e78e881d9561e3a28770756bdc404ad558acd0680d8f968dfb15a414b35afe7ce248d745ea629552393325a59d0d2fe2694ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d4da4e495db4082e406d2bff38ebbf4
SHA1a0b67ece2a3bde8cb41334ffffcd6419c46afbb6
SHA256594f2db0efd6fcb11ecdae57f1a22b00f1239226a2c4b6694eb0f483d07659d1
SHA512874fd2cbfdfee949c63676a4594f395a5aa49402374e24387e419aaf5adb3970b3822769ea798765b1d4ef6c000e042104c357defe3bf057882a4f7a9534520c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a622617b068cfe021338509be5dd8e2a
SHA197ae3aa01041ee2da6a28cb5eea2dd832c57cefe
SHA2567226675d7c870b9a2e0db89aa13ae2ae1a38be9c230314d06ac9a614651c4f58
SHA512d57ecbe158c5f206dc22bc589cd22b5c3562778a38ccee74ce36afc2ad0299dab533e5e5fad0fd7513fa07072cc928f2919a2b34356bcd1a7b024d641e7cff2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e8c99ea8524ac5b73d7c2bbc64d591
SHA1ebe10285707d14e0e64a3fe86b103c18bcf4ab16
SHA25648a696d553a27ed4e0e7fd6dfd6acfd2f3cecb9d8eb6ec7a748b926ccc1f4dab
SHA5126eb03fa24fa7cacf978ab412aec4dcadaaa04b7f1369c13ddd0f118100ba1f15645b249f15c6f87749a24444eb078675b549ea13ddf756077093b0011f4fbe17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54176b415eb0c499974bb497c8c7273a0
SHA1bf8bd467be6ea9e568d612ccf85fa995d8c6cd90
SHA2568552e3b7b358fd9e467719bc1bb2a4975e5a34148e073f55072c3c5f041c0aae
SHA512439b35e23d30809f5deb7dd4a0cdacec467676596854b4760e81f91add85e45de25f5335f89ad4d1bb45ae45085badfc9b9e799b63f2f2205700ed9435c2b04a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5197fea4592ed5c121ed92d4930218a8e
SHA111675151bc847ab04742f9f4a9fd98744cbd3cc0
SHA25622dd77d14ee6bfe2b93be358c34070ab712e7fb8011d65e915b54d7b1d7fe75f
SHA512a64c31547ecd3b59c9c80ae7eba6b84fa9dd932c10bf827727d889511f4cef28e4140b8a22920fe9e60a916d965e068b413f5dbfa64018fcc24e3891f69c2601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d83668791557237ea047ff2201f63b3
SHA15a40a8a46fa574f6308f5ef7db91c43874a7941c
SHA256c2a68b62fce8e0f9144a61cf2dfe2d8c62d9aa3536a5488889b6b7b8dfbd748c
SHA512d1b8bb622f5850948a186831cba4a0d406d5855e671b127d7af5d4d482ce1829a3a67f0b436314e976fed0fe9d4bd8b92954ecb1fdbc00bbb28c552813e60a44
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b