Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
c7e04a3565397e54f199488e9985d524_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c7e04a3565397e54f199488e9985d524_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c7e04a3565397e54f199488e9985d524_JaffaCakes118.html
-
Size
70KB
-
MD5
c7e04a3565397e54f199488e9985d524
-
SHA1
dca060c1ce54cd74b93f3236303bdc182a93d22c
-
SHA256
97205d05a2670119115013b16a83567e903865304e6ec5148a71bbc73fe05aaa
-
SHA512
c355acff50bed94e42986e28520d22493cc0985f728ab8617126a504fac31084af2c8803fa30448342bc977d4d276ac53a61849c02fde9dc50c1929553acfe18
-
SSDEEP
768:ipbAA3xj8K5uHx0LUeYnVmn0wiIec2TyDXGQ9wlGu8Lm/lwlNPawrpYrz:sbAA3xkOUeNZP94
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50daa9dca5f9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000009f223c768f9cd8b6f23b91c6407d8d1e59d9833b548ecaa3a0353dd2e9f9c767000000000e8000000002000020000000d660ad42899e91227cae7090fbe2ab31eebac56106bcd78acc9fec0f5a6bc30f20000000830befd8bb14d0a310470487dfb4a10436afb4d0fd206168505954ad437e151f40000000db6ec9f51d748d89c1b0e31b61a2495129e822cb597a69718f430963e68a36dadcad994a9c4fefd09dc768357d14cbd9f302714cebcae6bce7d3f77df2d6adfd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{08243131-6599-11EF-B82A-724B7A5D7CD6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431051209" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 1176 IEXPLORE.EXE 1176 IEXPLORE.EXE 1176 IEXPLORE.EXE 1176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1176 2528 iexplore.exe 29 PID 2528 wrote to memory of 1176 2528 iexplore.exe 29 PID 2528 wrote to memory of 1176 2528 iexplore.exe 29 PID 2528 wrote to memory of 1176 2528 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c7e04a3565397e54f199488e9985d524_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d17a987a7915918a557600b41c8dc8ea
SHA119f63967a4a130ea153352193987dfd6ed1840be
SHA256ac15f26c1ca62f6293989b777acdbd88c4e9199d4c7e7072864044764778a7c1
SHA5128f09b863f65404c47bf0da80806fdf80516345dcc8e62f72278e81bbd53128f403b72665424db0cb1bb041b3c388d25c93966bd839e6666019d51cb502f88120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513a85f9c0331ca482423dee124b6b324
SHA162df93885c3288e20aa50ee557f4fb87b9ed5336
SHA25693417d71a66e898148bcded502bc14dbd301da7bb02742c9248958e9e9ce2bb7
SHA512cd99de3cda0f0e07f18831d0e667bfdf24be71d8b408a6fcb37fb41b38d02bae0d21a410b3642b85ffa5a76046b11581d99ee04a00ce0220ea0e2595af48eff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cec3156a1f4dc9d0e2e1f42d7eb9cd8
SHA1b8681fe900bd4084594b34059453dc1fdf515cd3
SHA256ea90cf8fb7ba1c387d3293527cac02b7c7baa33d2469ec877240459e8d102215
SHA5123472e600d168c1532d13b85789f5cfc8a110384cac0b92d4f31e020ccbf4717bbc4ce09058d252f6d5f68e9cf75ac7aab69c6420642d119215855770e146648c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e33998cc01a2cd91acfa6669536c171d
SHA1ba12c835ac1d81f9aaa1330aeb5c9ca21ffea343
SHA256945cfef874d27d571119f508c8e7d5b205abe24502e99e00f0a1f5b88856d1f0
SHA512300d7f6efdc052321e37a25ebaa1e3e447ece005f203037ee665007844d0c52b03205e4c2123e07876b3e619d4faf881a01f517731af708cbfd51958acd0c119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac7ff56a9442ac6b8352f856ac81c6ca
SHA1d3d9bcb02cc1044d1d6d8a26c7ed481caefa0538
SHA25626c0ad652beebd73297b702b149fbe4443e54ff18a8f471f59c1f68023b2071b
SHA51220640dc3c45c02b5c491b79412c2f6e495851cbb4fd6da4286335b48dbbcff23de7d0c1cd5226adccab5fd06760882b1f354797cd1f011ca014c40feda319d2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af1fabb7926afa1576294504efd96270
SHA1689d7b9f936db2049ac6095c6c6fb37944f0a762
SHA256e63c6541555ff021971c52b0677683ef9214f300228c91b1a039d5564a90554a
SHA51208e9c8e8a9b1f447198632ec32ce8f52092a94cd58554c8c27c857f7f93e418066837f79db5109ae6e8b089424a7659217ad4caef8a410b68705f0c3671bd8c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5315325687f72510d8e4e63f3b52b28f1
SHA1fbf6e0a48c0c1b2877a3909ca5fd12396e571628
SHA256a0484a0df3aa7a9ce84a1f3e2c5702b7f41f50b654b64ea5bbaf335e49ad94ab
SHA512e99b7fd9cb21bdee043d3a8f299f0f65d983c7b7b626a583aeee5b6876fc797f06a98d661b141f27a4b04d19949205a1adee1a106919a8cec5b8d86f7db3426f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d9d71a2ec853e307e82b946a365747a
SHA1b11661d3d2b2d78fddda730d4dd0d636f2e713a8
SHA25626bdbc2dcd91f3efb664576b9a787dc3a300d9cad79ecb8c1d68ae6044270f7e
SHA512aab6cb75c96ce21c686c90aa1bd0811a1b1317193b81c5403e265497fbaf37523e894a844cc18b97942840a1a75d4a51df3a476c0904039b147ac61fac3b13af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d82728682a1e4cba19bbedc545d4e9ea
SHA10d0fe28210d5d45b6c2bb82387ec7ef9f6a32d03
SHA2560b7a581acfe3ea32838fa4b28a90bff4640e4e5264915da4f42464940a2ed517
SHA5127ee7049208901eaebc42ca37cef9f81383be38084bfee902a17b85a1ad3ae3b40b6743e45643513b37374313b01fc6c8a5c73148ad40c51364efe87cff6c8fcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8b258a530891e65957ea961a405a5a6
SHA1ba2091d528fed9e8a883127b950a241bbcb46aac
SHA2569491ca6457386c162b7520167c380f6cfbbf92e242ba3932eb7edcb468af6ed7
SHA512a2b23236add54e65fc1febb5a525b39bafa8fffecc70ded29f710512b2a6414cce14067f67a53050be2b204b7baea0481dc529fdaa2621144a331f2e777c2b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e041e56088bed0b7b137b43687770947
SHA1242dde7e0ad2ec1f3ad978cccf1bccbb9d1cee99
SHA2565702aa527f74f1edb11ec9ef09b79fce190455833c0045eb3f3210223e122b09
SHA5127979f6fc9535d5c64f997e266935480ae3978c96f13c6b9ef68cd9766143a3f2c254bc02983f78b2bcd7ae9c3cb4f572bb7349d0e941a0d26573e572dfc6bc74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5116e6800344430079c99dbaa66e7f70e
SHA1cb80f7889e645832c291ef7d7667fbf44e370bb4
SHA256f54744e410a1022600f3bb6c445378cd1dd5e8b5f7ad4a611159867fafa64550
SHA512cfa2b15bb190300d71ca95de15bded596fe470b0f1f265e4bbe56fe7ab0ea36595989f114cf13827028e81a5ddd17c8be1c03ebe4e27a0c43eb3476d98a5284f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5896727749727b63ce71d9c344451a576
SHA1a99a1194162d75a355776234d58db32337c32471
SHA2563b5fb8b1586e425fddb4feb37e99e31b1ca2477c071ad13ae27c65a4b2a0bc1c
SHA512d8c56ecfa89c7b247cbd7ff4df82b197028c835a6c4b79f14f16aba4c9adce96045130756a2daa96dfeaf7beb52de9c0b4a38eea46819c7d64c277205942d68c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5434988e62e7750934d22902ff6c0e267
SHA16503a74367362568a4409cf03fa4db42359b2d19
SHA2564d5dac226b6fccd8144290b9685cd5421f728dc934628c28df2cac395fe86f74
SHA5120f7eae385be505eab812c93836887d3fc7218fa89250190b2f1eba1df417ecebbd610495c7752a4da3e33b79e1bb0521179f902393f1e7bfc40f0c4681901136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0c5dd136e374f7a4cd91c40c956b407
SHA17f2cc127a88b430886c22ced680e0f2690730481
SHA25677be4a56461497465956da219b2aeeae2da6dd4f2d52f576f05e62fa6130e5f7
SHA51274762916dc8a5808e65d8200c32de056453d4ee50d42976aaef3c70937f8d5cf9ebfc5724a6717b0c4aa15ad159873698a81744ebbc8fecc617a807f743b5597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51201a1730311706ead5251282bcdf32b
SHA1d96ab2d6dbfc5a1b3b3b2639c042cb8586d17ae7
SHA256d2ad6813478a5101818552a675544a97444c1fb57e4b0f968b2980184d315dc1
SHA5127528ab22a2a00dd7623439ea412f2702c82434df7386f981495cd04d96195c3e9fc2f99989f7283454eee9f9db0fbd27083d4242fdb8cc10c07b2107f62065b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5384bf2738277c49b0bc192e79a340ba7
SHA135e8a7506d57450f4ea0fb2b8bbe9446d07cccf4
SHA2566a99a1a57b2bdd8071f8c861868b665b1d04d75f73c332f1e97154392bc75427
SHA5129da56eecd179b988a08fdf701f76adc2d0370002ad3c2dd6d76d5e3d3cdc2474d8232924db6bc73f6509ee4370ba09f0eebe8796a76ed5ee0468bcde02d0337d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5645b994e2220a8ccfed14a356534f662
SHA1234d84403ced7dd8f10e83d5805e9b05fe10c671
SHA2565caf2be7a886b135b9cdebf16b18a0858941c3490198f08d41fa127e495d963c
SHA5128f77d69bfd21f4d74da16ef5785e46510af7c72f816a2990be0095a651784553b097938fba8f231e4f631613f699efd00b38bd9a993b4e2fb4909ce1ab188f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52771419e8fcce3b85edbaa540715f46b
SHA17c4a2a4cfc066f2a12ac2a4144e06d3b1635a570
SHA2563ba61f45310d2c9f33d4ff46cdc1ff6f8c93370bd1fc279b8452e699fb1d0b35
SHA512c5c7bf6ebba017893b9357878748b678aff355a7432fa53685dc80eb952f628a41edae6984003d4225a71d578b6d24a244c08d17daacf7b288c2575f7d206400
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b