Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 08:00
Static task
static1
Behavioral task
behavioral1
Sample
c2967dacc1b49c5738edfe378d43a7b6_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c2967dacc1b49c5738edfe378d43a7b6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c2967dacc1b49c5738edfe378d43a7b6_JaffaCakes118.html
-
Size
7KB
-
MD5
c2967dacc1b49c5738edfe378d43a7b6
-
SHA1
d38674832cfb3ecdc6d8da20e3d653df5053637e
-
SHA256
8ce47bd487491867e829ede51ee44414d19c2817bb161a1adc74d9dd9640f1ac
-
SHA512
678abc647aaa62f1316e1527ea9684222fc409ec40044acb7157e46b1aa87e775f2920b53a2ad2258947a00f35def76cf21fdc4f8d47fe55783224c2f4d950b2
-
SSDEEP
96:uzVs+ux7mHLLY1k9o84d12ef7CSTUzq7CY4WcEZ7ru7f:csz7mHAYS/ZCY4Wb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430821124" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5364CA21-6381-11EF-AC25-4298DBAE743E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000008306422373f6b21a8f24646a43db9102052d60aa624556553a9e3cfa9275a082000000000e8000000002000020000000df9edef36a05fa5326793b9f3a6a379527e94b98c295eac70dffe4de7ed7338a200000005e6fc83edd7b962aff0089d80743523a0e538c07364463fad12052301d1f27084000000002923fdbb3888f727ea902c27880106f46336a98b1e15a940a813423ba0a71d50d8274337b96e8bc1bcd9c359fc90920b6b853865a82bc7fc5785fe94357f1cd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90fb5c288ef7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2028 2420 iexplore.exe 29 PID 2420 wrote to memory of 2028 2420 iexplore.exe 29 PID 2420 wrote to memory of 2028 2420 iexplore.exe 29 PID 2420 wrote to memory of 2028 2420 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c2967dacc1b49c5738edfe378d43a7b6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8949000c57ae9cad93720aa4d6d222e
SHA13e55b12c7074b5e72a569cec13f13e4e4fd191ba
SHA256aca768afc8052dcddb69151256cc9c4ff122c4d6a82646764b9040ec81149242
SHA512f829521c5e56d87a2e40bad60aaea8d006f8e4e54596c4c9141e2537bda3d703e76bee617ef08fe756247efc0fd8ca10a2d16b5f20e32a459c5a678922a34331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529dc2d10c9b2cb75b615cc103fa00c52
SHA145a110f671c8a68ca8877548b4a401214654ac37
SHA256e55aaf58a971170dd3a8e6a76eee873669449efb3f87d899ccca7731386a5b1b
SHA51246475660303e4e1d52d30e32c398588b53dbd965d1246701587b5bae6506bf5468f4a8906df636e16f9f01f84e2bf05d7231b7557ee2c76930f5d8a4578dc4cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501a002b0fa2004221a3da6a6bcd8a2be
SHA1b00c7c0a005f71709bbe7ddf301b8670264c1ab0
SHA25642aaf9666c3f2ad188ce0e69cbe665a65ee065d91607c0d04e00164fa2a9c4cb
SHA512ebffc4f85a0a50f64b9bee14b89da471a6755a3a528bfc68cddc5e7a2fc0b7095a6cac8f1f25352c1e4a28a7e7565c066ec3933a717d356a9b016f520ce19b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5057cebe2787caa92c0be1921d6e23455
SHA1033f6b6cac37fdecf0531e9487240397f4c03134
SHA256051bef7a85184bc5770f7517a6868e2d9b03625af623ba1e250748cad1bf2f9f
SHA51291975feea7235daa7414619bb3076eba1996bb6c595d893985d8f1466da114e1f54d2038440782d963fd126a9fa8c3684b369262d84c3611cf5bea57c3e2eb43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d3565fbdfca411f1f169fb2254c721e
SHA1b0e2975d675d1be3592091e77bf27ff9be431cce
SHA256aa743558395fb9f454a9f37818c4e3f1e7e17fbe78620d2fafae40f89b84c96b
SHA5120af563d28ab7e8116d1e709ec070d0be80fba57b7edda24b88b9c122ed4985d00492e263dacfb421922771cf2a10afea93bc33e015bea925e3f7c06602811f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e439c7c5ad1f5d544cf7653973457f1a
SHA1fd197c98d6c2873ee88fbf77b8815b3926b5fa91
SHA256703427f9829967db50889681645e56c125d2f8c7760932a4b2463b7aa5c783e0
SHA5120ac29db5f1ebbeec160d4b92c3c2db6ae05bd8b0aebe4eae14ce5723f1036854a94f320b77e66058c82fd24104cc5fe5f270ccdb4a7f38213d87a764ef763ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d4904aad7973a61160b094e8dbcfe4a
SHA185391de55cc987d283e33346fb7e57d2212c2651
SHA2569d20aa74168636eb1df878afcb529285e0a35219dc6e04f8b3e2bcf0ed345ccf
SHA51226e51254bcac260b2767a136be082a3d0210e222656b8f6a82b150f155908ccbf8def79e585c6d0fc73c89cb32309a061ae85f90f22f00666d35fe909700b46b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5161c763b0d29f414cc545f325037dc35
SHA111564914f5417d97dabee70544ef94ecfce7cf2b
SHA2562d826af21d3814ffff6bc5ca6ae48b0cd06f8239bbe4fa0a745301af138a5350
SHA512794ada0973db2aa8fdf2970417b1db5ff037a440232a7dcb66308580e91491b37928e902f8cc275be32ce78ae7c85fd481b9df22a1e1770cae541f499e043f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac6ff4ee7e69ee05fecaa5884710ed47
SHA126258e1f417fdc70849e4a1de833c1ac8a3c4b3a
SHA25699df47499bfa9be4de7c9f00247c1693592a8bbd992ef7026bb3843bd4ee5392
SHA5120850a6309994747dc52728dd08a76d2c091ca2f9b867ca21f933303739dfe6813dae285691557e7ea29e7e9b74df3c71fdeedb3cc74b1de1e232773a2ec69d35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bca127fe7d4565fa2fe5b27dd596bfbc
SHA1a3894bea25634cc1512b80a1666078bc0085f179
SHA256438204806af3f7bd86d03122bb11db7c5b1fe3af59d29fcb7790557e523f16e0
SHA512953a07378846172e2447973462878594906d6dc52ab7fef316a556be7251c1d6c9cdd239efcb09eb15870c8624d87da0eacbe9d61edc1ddcda4e54a7138acfcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5237225314b30649ed2419405c0e8a637
SHA1952847880c0dd082fc93c092f382ad6fd0d36117
SHA256cf9d63c3a42c0c5c2d8cf2ba59488e3991a76e51d71d8b98a86383811464f0c4
SHA5120d58a85fd357ae631d42d2ed1991ce79381b4ea507f1929654b055dd401e315d9208d45f4a14bc91e060cfd3d7ef1e256162d615366309c1f6809dc0c92ced0f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b