Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 08:32
Static task
static1
Behavioral task
behavioral1
Sample
c2a1b4724970785f91fdd3f7c1e36632_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c2a1b4724970785f91fdd3f7c1e36632_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c2a1b4724970785f91fdd3f7c1e36632_JaffaCakes118.html
-
Size
8KB
-
MD5
c2a1b4724970785f91fdd3f7c1e36632
-
SHA1
ff55842489d2ceebcf8339a27d6036c9233c210d
-
SHA256
868d0df9b56cc8319430e9bd61829edca817b29edf7a9a51b23ca3b00ba7f149
-
SHA512
2a6a8da87831c93dfe45700485967d05dfd1c1ce1da8f986c5f87de9f6d300ace809816ad485e55af8977b29f6306595b2bf81b04a0afda1d049f2240b5a853c
-
SSDEEP
192:bh2Ru48+iAwfkwWsaYGr/P2iFHmQD6zbEq:LDxYsGPfmQDGEq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B52FFD21-6385-11EF-A839-E6BAD4272658} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430823007" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000f95091ae110d7a3fe91f47e17cf423df8fb8765d33c667071d430b0be408b989000000000e80000000020000200000007f0448736b34bc634305fca69b744880b0f14d62d099525b529d0eac447d8b88200000004055ef91487fb61cb8cf8459d20c7586689a2b1d74500e584e4cfece37dc1c374000000053c3ee2f041732e8198f5a3807b4b58ab8715624860f71d1d5d9fa564b36312af4cd23f784598585e840e151255f17a246c1522aa47c07c7c7cf4f466158bb06 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60cb05a492f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2440 2380 iexplore.exe 30 PID 2380 wrote to memory of 2440 2380 iexplore.exe 30 PID 2380 wrote to memory of 2440 2380 iexplore.exe 30 PID 2380 wrote to memory of 2440 2380 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c2a1b4724970785f91fdd3f7c1e36632_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3915907b2d3b097a8b597f10acccaef
SHA145b6dae77a3576202f64d1ce9401756bba7bd37f
SHA256a7cb1eced8e80aa1d07749a04789bef909a0ecb8947dd91e0e1ff8e59348511f
SHA512e35756e8206916cb00da1e492ba7f93bda712aec8673215c5dd5239e1cabe3c7cdff40011af250b551acc0999ae5d534ab89595fe3e4c25334485c72cbb8cd47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c76fafc8581ef23e50bb1272583103d
SHA1cb69ce045d1ea3f63e283b60359d88770cc8ffeb
SHA256f08dcac68d5500b56740597ae78b1aa71b33a4981bde3b13596a0396e9dfaf9b
SHA512b9279cd2b41166bedcfb7262d86f02a261e9798f92a82bfe0e33534fe7e66ffa19e926ead480b6c893453a804ee712329d3f2a94543a30870439b590624a2f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc0f9c0b0fac7253aaa561e9322fefce
SHA16ca8bbe3ec84454c21364bd3c2e87903c9a52841
SHA256c5e1063a8b394bf4e97ba53ab0175bd1d17ec0f538de5f50031c5908982e41e2
SHA5128d1c5f9d044001ab6398fb593efabb76ee6eba8b0131e1b1f3a41f8e462309d3e7755b3007b5de9bfd0eb0199f1b99f825eb6506dd7794b8a8b0f9390e779558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f70d33a1cf6adfde9da05199e5ca22a1
SHA14d13e8745d7b5d7b39880cf03748e8973383ef7c
SHA256627a8d394d376b8ffc57061ee31f57edcb7f42fd8380f8b0e946353d6fe01914
SHA512bdec4965916c7e8c99bb8ef6f22f4e69fa8e174d7b3d9cd772ff4ebf8bbaa4ab92532f22045ff8cc102c5a4f80ce070eaee6ab523bec8319af7c9624a25e515c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578cd004f28ebff1946d391b1b3aecf1a
SHA1835fb4c75f57ed324b634a86af5c78a9103cb8df
SHA256871fa162667883afd9e69381f49b032838b4deaa71ea656d0ba5ddbca7f5b979
SHA512bf7eb7804dab6afe2275864de254d4e5eb579ef922006a444ab8de3306c86e521e03c10066467df56e11841e4aa02ba9e49066e4fd0a20ba852370b10bf4ac18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52034422884caa3afcc3a513e20f86452
SHA1da733927cde44f29f35693a5d82d00c3636e661a
SHA256d1513df070c75c370233957b14aaa3542949dac296890bdffc1ca88303a5f956
SHA512b3ec409081d2ce5efe5bc7893a902334b7a8eb699b186bd2f1bc2fe21f374ba89555f07892a7ccdcb624d5ba4f5c6a7193e317114b9ae059bb56140ab0efa278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59326d8a629a9fbe22e43c13940e41869
SHA1c4f3d8b7ed581e4dbe7e1a7a63dfa42cecc20e8e
SHA2562ceabded2bbcd0e080d359c8e8f595080056141bba51eca45778e21f9f8c61ff
SHA5125235bd0410fb2186e5f7125540f086e0016a5eec31d2378c5edb3097d13ee4efbe66e1539a8acf32ea5e1d9386108a4c855116dfb93e0127ff43bf3c85441c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5391c9427e08c3080d5feb79755c73702
SHA1ae530032038acb2297f1c7f88d1ff762e60f6200
SHA2569d67ff091981f54fe146bae140b0ddea2be6411963b1e3eac64f47d576e8dbeb
SHA512227f3e5f69ec0d4c5df5092fbef3d98783b5fb66d7c8dd6bbdaaf9b37ba3f1e32e717f1c4bac2983dc09fd866bd392dd7933d8a586bf1bd76031e6cabfef6c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53842f228215c86275ce7e4dca62368bc
SHA182d16fa5c1985ff81563167d25305a3f7bf5f719
SHA2564f37204cc782adf2c15c4bfa3b10d615aef50091183d639794bd9cd302bfeb1d
SHA512d527e5bcc341c56a6c82c2d8e85e4308cf6ede715e1a924a5a9843698a9566671192ea6ffc10867df7fce09785d15c09a3a91876c252efbc714529614f07709a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50568ec48b9425b623af7335dfc55d70e
SHA1aa53d43ffe632fc5dcebfbe0d7ace4a71ebe1537
SHA256cc409bea6fc995569bb7ea0e50dad79db89e7cd98a22f312b6e1215467b34bb0
SHA512d0ae94613044e394cac607e6ccddb8a9b6b4b70f19e6a79cdf5376224792089723d1694a250fdbde3eb6649af69b815edf433669a08f98a2a3a6a82723fbf5a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fa53ff7804bdb87282c7152959ac0cb
SHA1d28be5baa05f04415b0540422bc87911901d6af3
SHA25627d5dfaaf5bfd6d423e2c233b46dbe32c60fbfd7c5ccfe821407f92ccb4efa92
SHA512147ed2425b3e56e186e00020177680f9b43f15a9aff07fbc7931360c662666fde1ecf25ad9cff13a7163b9ccfa7ae350bd93d7ed41aaf3aa6e87e26142d2aa54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae5d354109674e3f584e015cc46bc823
SHA1910b72759960d0ffc18bd7171a6b1591ec1af224
SHA256364efef4e9d16bf513ef57bff7b729af33344daad006d9bb89fb9528df373d55
SHA512e6eaac27d39d2175db95f8dce2e6380a80ca4baa2e0c8c4f63d7aac76204f6f98c4f55381b9e935fd082b683f531a70b1f9f9fdf898c67cea0b3043fb73c7d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c99ddde00574b6938dc7c927c404ad96
SHA133ab65c565c9bebfd623c5d62f339f1f75842782
SHA256c9cb4cc67236a4c5b8b8b6ebe334358faa7a36f40ae1158bf35810bfafb091c4
SHA512998343a89232231a06d4b2a525212ae8089d7596d6f7168057380fa944b7adae14abdf893c5ae661fde0bd119280a2c672f33c46c994d877fc16c45bf5903ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa3efb0db2077d26d15cb3c92cba43e1
SHA1201ff055d46c959a93148a5fd3566640d3d421f3
SHA2564ecdf9cf750c90ec06cfe55df45b99d30df87d2984de4568949f9b4ca3154462
SHA51299d5d1e25aa211c42673d217fad812dbf8e847e7c3f497f4e4beb60925aa26d8973b6268cb1345b15df4f25922be59d2d20e1a981e9e350766529e816067bd28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d22ea97a6298ac8673d7314909a610d5
SHA11fdd83ba2453169395c67151376b6ee39db97a85
SHA2568bbf41bbfa2d508e6bd4f9b7c0704d5ce9e2f6a4d6132576e6db72e58b3f9664
SHA51249721feee87c3ccbc090f12791e2aba666ca93b7e199f6937063407377b9737115f7548af85e3188ed58f33e4c674fb2232c10888fadde26ea6e7674b8e9ce26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d89f6e9a7cfd67cd8f3a4613ffcd2735
SHA1e3edf2c00973508f1323c71ef3dc25f534fb4fba
SHA256809ebc5f6e5b103622b2b9b81288603f1c645ef3a4afffd9894c89a0b1a5164a
SHA5122bbc4ff7a4bac5b64c5261d8487eeca066d95b7ceb3f56eab6477976d2b1d0710b70e88d394469151246cc81cee4a015f346360af56fbd5c85e62ed1af9b9ce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c8f87f6f6585005c5b1f81f308cc975
SHA18080aa3f8914d996d7e508ed39a8814d79d72971
SHA2563aa20f13d67de56e92df84b5b9c29add45256b88c418a80a619687c5c2393a2f
SHA5127132f76be1f73176897174a3312150c73fa7a718977f2862b4d5bad4d893120dbfdc8926b04487d468e9cf1cc80fb4affaf42d4032dd7af3456c2fa605060bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558f6bf4df75ab1520951f6080a5eba22
SHA1e25906dbf082be5810d35d4a149412f097d29661
SHA2562e8c25f0b0b8da980398f4e1809731d802768b134e8389145db195fb7596412b
SHA51227591fa4c90d88b80b1ad1f5c137de549fde139cdee33b6db6fde6be423d8b947beb20c3e081f220624ee303d1651c8e5272f13755731556445c530b8636422b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec3e59524fcf593c7b90aca7a6825c04
SHA1aba1666669cb891ad39eb997d08435113a92cab5
SHA2566515ba296fdd9666af44d0ced1a701149131f929aaac078f790aa2d54357cac8
SHA512f20a7a88d93349a58088e905fa73fbab934bc72eff647d55478f2f42e1c74a687ad9e4d98ff83540d10e5b4b6fc756b3f8db1f4d41cf0f3a080c29f5f8bd07f7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b