Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 07:15
Static task
static1
Behavioral task
behavioral1
Sample
c2848938ff6902e72570154270552de1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c2848938ff6902e72570154270552de1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c2848938ff6902e72570154270552de1_JaffaCakes118.html
-
Size
73KB
-
MD5
c2848938ff6902e72570154270552de1
-
SHA1
be5bafe3d6a26ad415a14fcc538d2cf2943935be
-
SHA256
34518a844d7e69f718d4708364a83e3d89c40df5c9842636c872bc0d5972b012
-
SHA512
3b0d54ea093068c063547950da9c3f0b9ab75219dfbf9b11549bf44406b454e44e758e67f5427e1dfbdfdeb4199cb99121af81ccc53f4b80fd38ad3242be2a5e
-
SSDEEP
768:SpK21R/SM4sE5QcfJ7ANHLGkDvu38K4mPhLIBn:SpK21R/SR4HDvusK4FBn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430818431" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0C7AA451-637B-11EF-8FA3-EA829B7A1C2A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906a9ae187f7da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000003a115de28fefce2f14ca00e1e760c008027b5a4afee54e04f35645909586d2b2000000000e8000000002000020000000b0d7c16bf4f1bad13f16977631334b0a9f15744c1dd6131611863bfd1665edb820000000b193e0aac78d30a55917b946408158a49b5a0a0167bb9592661e59040df51fa6400000000828295cf8b2f5a2ad8c000ee6eaf5b919bf4b0235a575ee174f13599ba92a53836b8350e0d12d39b4e699fc2bda8ed372b639131b2b2f844bc5f9c6fe668b47 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2612 iexplore.exe 2612 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2212 2612 iexplore.exe 30 PID 2612 wrote to memory of 2212 2612 iexplore.exe 30 PID 2612 wrote to memory of 2212 2612 iexplore.exe 30 PID 2612 wrote to memory of 2212 2612 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c2848938ff6902e72570154270552de1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2612 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a577e885daa555759be7c51f6caea918
SHA1e65d36fc4eb4c9a6aa874b32434bda2ec512f01d
SHA2567355c40294260fe51feff765959d92e10695101d3c303b4419517b705ae9e104
SHA5120cee81c59ebbbd205d90820a2be11a5c880e24b1f76558a607ae7f6c3edf975b6154222f7f25bf3bebeb8fab72317e370aa4d300f9ebc29cbb00a0d757971998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55268218fad435c13a75841f6b5f57f6a
SHA18052c56df585f0903a5fec5e5179418897be5dc4
SHA2566775fc1796220253fa4e707d3cf0352a581af36cffaa05a274519d34cd3bb790
SHA51204ad5d4c217e8d7e8468b757747ee2c18d48bc6e602daf636b9b6d0ad131c71da0fb5a6d8e1377b65fc39311e43219aefc25d960782d82ba9d4c5c97316eb267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565e835372a1ef8686777970a966f7e76
SHA1d7173789581539c5c757339465d59aab2a7870a0
SHA2560354859c3e5df324b0ba17484c5ccdd24ea9a583e352cb6427e7b80053c1d3ee
SHA512414b3de15272e06327e94ccf482b2e92901f5b3f62d14e595a2325f6374e9d57f249bcf0c6ee38aaaf3a1bb33b6995e4b194df55413b99100408e73b77b04659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f78bd3376c4f66b7ba50c9c8df61841
SHA1d528bac4c97a400a814b23e72f2c2bb27c5a2ea2
SHA256c311d1d7de4e490c7c5a3413230fceb3fe88e9b0474547a9f55df73dc0e56f3d
SHA51288d0d7ccb439bb264751f3b58d56d981d04fbb436ada906c2c78b1e58320246561a0b0f92f67d53d45b6fb23f08734b80f92894c9c8e32cd15ef002eda8bb371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef031869df34454322fa3cce3b712d4d
SHA18e40a2565037bcef64fac35d36da9cef3236d47b
SHA256bbcc33ade58270820cf1c36803ad965132b929b7f4f9638bff49eaa800beb87f
SHA5122d56d7aedf1444186aeac376a7169e306bfc7e29b8db30710aa6b29dbef7d6a4cbf1c6d49e56cb71ac229fe83d55fe878e58562bc9a413691ff9e78840f042e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c35c713a1458dff8f346d54a5b1d5f0c
SHA1b71678ae71bfe0eae3caf3f80be21304582eda75
SHA256eb5e0110925beae1786832849e9647d386ba3e2b0eb64a26e6b3b7120b53f4bc
SHA5122c93fdc24f522eb84b394e9c3c8391004023c5cbeda5aa03cd80e9fea5136b4bb70c9c8fe9e4a353073185cac693efd476cdd1afa99e47297673beabc85724cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c18d25621dcd19d6791ffca9615ecb23
SHA1e63ac6fae2138d3f6af5efc7ccca3d2ed6a8a398
SHA256c654a5d08b640c8a19657bd8c9388364b12bf2b850768e50a6982c5fe6d4c10d
SHA512a835d070ac107762f8c804f20a8e8bf6e68899bb26125feb9830a2a57ea6fe5c3ec7e93bdf256136f62e620b68fd513dfa7807d47d4fe25ff8b946ed843e0479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533848c516042368e36bb225edbd5c3aa
SHA17401a0451c33d934b4a732519672af254937c86a
SHA2567d2b7cfbfa02fcdd7cf5e650bfa03dff23af95c58ccba9e84db4c1165ee83e93
SHA512c797fcfa565643b84f5e16c2005fbd8d6d9ebd886fb548decfab55cd96e9285feb244a7114194a35ea1c0418382c1483ab23d3d950235a1fb8b6a90e3665ae36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f33316d32d95a863481a84825aa1a7b
SHA1bd7f629404c0d475ae9c0d06d3fae8c05c4802b0
SHA2562f28e95f106062559517627b6b1f69775a9fae9b71ec9c135760c5359a8e6486
SHA5124ae3d66e2c17fbfd1749dd713acb2b12ce3a7a5c27623eaba04b25b3eede547ee94bf6790c6cec0ce0eab87ac42c0a7e26abef6c77ec415ff15e27c80c5a920c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b458c417c3b4f368c5fbffbf3ff7505f
SHA19fc0aafcc91b829962e234d69dde1c252a1878d4
SHA25616a3cb067b2621dca5e69ac305bc5a7f9c363b8ea23e0e44b5e20403c0be0528
SHA5122e84e16f27d7e8b25d0cdf6c119d12d8261e042b3a00a12c82a0138cb1867595da36f8f6d9bc9bcff6616abf5484bf5323c13a9cc7b9a41c076f47eb5fabd615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e5272ad5cfa336d84e1a830ebc77b6e
SHA170bcbc7e074a6beb1fe2a34c1ea9d4147271c97c
SHA2569d9b15cfeac5889f27a06bc30b2221e6f4d9e0465d76ee47513fcb842e1ba174
SHA512f12e322a9c988ceedec5cdb9060937bf2bf5e8d1df97e7a80fcc266ba28e96e9c63d0cd0cfdf11b146ebfaf1fb3184df3eeb850550101916a23b2941dfa720a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5242b185e1599b64ad4d0175e26bb764a
SHA118ae629870faf59e097820a76a6f186cb585a257
SHA256e97a6cc57b02d48c26faaddc8d9a86a612d63ebd4884ba8f2607ccaca17328ab
SHA512ab7223347dae21a229cd92924a81765e72464042810a65041f52232fb5fbf3381672c9e98a2910128af2ed8d68caddf374427905b09e0354647f0a25f443acfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b598eb4774b6fe51be2db878b6faf4b
SHA1fbf1932fa8fa367b8844011c04432d101128291e
SHA2563f95d0b0b09b9ba80db8bc057abb4406b50b00836c00400f3f0cb1ab68134163
SHA5129cf72350c350d0aeddb9ca4acf1801691524d2ba32a07d37df8972352c9836cdde78c9d8f4577e07e90d4720c501859a5b909ac281100ae4861cce80ae78293c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c52ce5e25abce031e3ca33abab5f01e5
SHA1d4bd2dadc34eff0b3ee35b54752fca1db26e3ade
SHA256600edcba425ff7e802f1bc7e37b8c44aa0da5bb0f34e81ceceaba5e3ae17844d
SHA51261ffeb5c542da301082835bdddc769d50d2f8217d53b33509677ba4dc92a7f09f18a30febc746d4061685cb2b2e5c3274fce3e756f4841e15c32559249088e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7f4f5035ab7de2d12ff6ea78b59937e
SHA15ab4ed9c627127185536ca2dd7ca7cd197537d5d
SHA256fb40525ce889b68c92b14c45b7e8d9cf988f45b2535edb745cbdcb5cc206eca4
SHA512a69c9d96b50aa9c69829ce61166455bf76440960a6aae209f9db452a86c45617e2f926c6688a24b0e6d4189188132b19df44006ffed9657768167dc5b937f1c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5669ce13a0c61a9650d1632683b47adc4
SHA18bb41a4f9b89ed275224e60e5bd145582d884810
SHA2565209fa07c57ec4e3111b7768c3b9ede51c921301cbe893156ec55e92d4929841
SHA51262b991ec79af72cb4ccbc1406226f65c795052b7b8945b5787805a772263a8fe2c93c7364d4336ac96c89a32416a25fa9f22da51e9bc0e9d6772c14c5be5e16d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c26774aa52cd6a32c7a2654202c2b9b4
SHA16ec1262c33fa9b639df708f4a6bfb7ebe8c4b668
SHA25609d7fa52c4c92df12bab6385af8a25d3414eff7ce1c6c5dd62e6464261db0c56
SHA5121b1f34aa46b2b04b796e84bedbd6382072d39c1a3f2b6ac4dacd9f935f7ba3e7bc8760b06ff4432eceb65ad7f906c010abdb35d63a9839e321ec6d1bde49ad4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b2c2ae862b2a15ee2c84fc587d7eafb
SHA14e670459a5851e4eb3811a60fde21265a04f361d
SHA25638f8f25b32ecfa24971e6d6ee530b84d379c9ab5e3f3d985ae8d6f8e05e1c3be
SHA512939c5e37ef87c5fcb7c79e0a77b41ddda00d0a5de4243339ad108993559293a523544111aa549be2cd96e7edf67ddaad415bf83eab658487d424c80c04968e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5576508eaaad60325a77fd2daaa53a7a3
SHA141103c675b8ec86619e8286462a8db5db2deb7ed
SHA2563403a8068eeb78e2abf51a2f0c8134787736c1f475dfb9a47c110bfc2b5d7fe6
SHA51230bdcd4bfc0b32e3048c39c77f5c04689bbe7de7ab79ff627d0f29d0c26ce985c0fad212273989b98366cd854b8e44f1562c30ad3d371096d6a86959d11b94af
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b