Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 11:38
Static task
static1
Behavioral task
behavioral1
Sample
c8bf0770041c796479321e6c892ee9c3_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c8bf0770041c796479321e6c892ee9c3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c8bf0770041c796479321e6c892ee9c3_JaffaCakes118.html
-
Size
1KB
-
MD5
c8bf0770041c796479321e6c892ee9c3
-
SHA1
f6e74f54a48e4541f4264449640cec476128c66a
-
SHA256
7063cece57f017a81a502b532252c15b62193c9037deb5d2ff0dd9d6977eed7f
-
SHA512
f727eef5702eefed9f627bc224360c48fcf7c376c0069b004ae815f8a5972159cc5d0c5c291c8d9420d972c8014c809afe7fea209a8ee40e230fdf6148a675cb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20ae332408fada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431093398" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{42C276A1-65FB-11EF-B44F-526249468C57} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000169a53017caed40aeb3e2e38dfc62abfeb38e26ba452392c0bf14090db60f9a8000000000e80000000020000200000006602da89cb4042d15cbe1b709e4f452f8b66939b4f432cefbebd6577ca065fd820000000a4922e95a91eaca55926da04c315c8b7a9583d0257003ac48a6559a4c3fc9bb940000000df7eca73911fa8d88587923795c65b7997622dd973bd8e05ec4b652234e93eec7c5cdacb6061a8fe870b0bd46f3aa1ed75a67a6c6232bd9e63d843f662d3c828 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2748 2520 iexplore.exe 30 PID 2520 wrote to memory of 2748 2520 iexplore.exe 30 PID 2520 wrote to memory of 2748 2520 iexplore.exe 30 PID 2520 wrote to memory of 2748 2520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c8bf0770041c796479321e6c892ee9c3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529b53f258cfb698525cca8fdfde5f17e
SHA1927ec15a729151d64a894eb30c1f70097681862b
SHA256a2e7e207b1d8e0574422cb61e78e3c808360599f1f7e969f1e76b18f330198c1
SHA512100ffe2558378c5b0391b129b29423f409c82e9646fef738389edba9b18fe5c653d6d0ed237e62d462e95caa5f9a197343fcb8328d90a21619b40da9ea6a267f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592a6f6f80971ff8b8b25df33926e877f
SHA161a3ab2a5379297c83a23c0391752d207835cfc0
SHA256cfd829fbf253e14e8b87d0233ce91adf81dfb50829e101a2eaaab7a62b9053c6
SHA512a4893c903178d523e2291b03c9b640e7ec6ff1bd1969d74133aadd863248d2d7526a52fc2835ad35f695dbcc6d974c3bfcdf8fc6a60f6f3c75e01c504c0bf27f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ae46851efea97a57358b52bdb9ac3f3
SHA16adb3f3ad8cdf8352e5e9cf9d9323cbfbc7e214c
SHA256b3b1cd0d05268040a253ad6a3898f6a105dbdfcc4f4e7a0e3f864d6590599556
SHA512eb68b517dcbd1a206428a0a95a5316110f6556c57b9be959162ec040ba5b1712423b58df6487c9e4aa35e977a3e040c115fa99a203bb2345dd668ebff112a112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfc28bbdcccc6ef198f83e7b8b70d300
SHA14c9c6a1327b75824c3282e9909a86efc95eff348
SHA25621d72ad7cba3060891f751b328f6afce477830b1e8ee0d9617dbbf82d965e6d0
SHA512824d3e27f3e6aa74ca0a8703405d9011ce88debf9ba8741041b2cbfb75cd16d43d0a8fc02b1c0747bd5d4c924ff2846ec68031ba63dbda8f9b2da4113932443b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2706132078295a3b41857c781f16b35
SHA13f827f72c2c8bb61e8260e7b586f546295743cc5
SHA256c94ded3feba220ae25634ad5ea438a9d339755300d150ca341e93ec9bf13ed67
SHA5126f482d2028b6e021c4317ef85d2c1dbd028415500e9f06fb106f025802b6429b54a4fc3da5d42092f5a4464d2bfffab430320d3d189dca9da7b9adccec3aa57c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c399084ceae1f2e59340df7aa59b3496
SHA112dd93f89b3a86c13e8feaa6c4213b066cb73e86
SHA256eeb8df1efdb34779ad9fac92cfad70a23ff22b8a6d095f209e72f25148bce353
SHA512a763894591302af6b577cfc756d026b23a75ec869624a091e592442c9d9ac4cdfcfb0677a7162b1fe1445ba3e8c9ce4184b110d423a2ad3c97dec478a6977374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0048230f1e94beb112284a198b69cf3
SHA15f242d1145ab2ee9fac208dc86cd04f77e451cd7
SHA2566b5ca5787bb346210a2c3132d2bdc03002a61bde7a02469c18fe38cc90c1f96c
SHA512b9751fcc0e85bcd9add835b64668b19f5c8edd4875274e44a333bf3d77949e26c0335c3a8dc30d2aa38b3d71c2ea34f379b18a3d2eba1a4a79570d8087381ce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c19a89609ac52c27e3afbe427ea105a5
SHA165b0dba34547915cddcbe4651d02e78bda21628e
SHA2562d52de5bf33352eb80f557cd3cb58ca3252351fa16be9cc657267ad936a54abf
SHA5128559705b5e26eaa6908bda6040b5561c1486e3de63335c7019bf28999975490e6ab8c85527557521fb9d7802f603b19ad00771f506d7e36757d1a5754882eaa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b48310ab21270ab508bfc93b1960a214
SHA15e8d9ce2901af15bd546df846ccc468de23bb3e3
SHA25688138f07582b7952d6fb5fe6b42085854a0da6eb27b5ba17a399bc9b0174f33b
SHA512ffef8fac7b583b883d3baea37762869fc22eacdd84742f4fbaa958a72e4f80adf9cd69da118f0625ac835a8c2fa366faf010a5fa64ccb825444fd53b88d055cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2c3dd8f3e9a0c4c78769ec73046986d
SHA1eb4f28c5905b9edcf4b1a33445123746aa7b49e9
SHA2564aa56069c9865d9163440fbd95916f050488353a8ae96990a4301b25f6c24270
SHA5120c45a39fb56489881df3568f1a25dd9e5dd9d255c8d01071b57acf4e03cbb3e228ffd95506662cedcb06f83a655d6a9d38bfa6547ab17ec873274d2b2b61f00e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab66c985044ea723ab00fafe2dbde442
SHA1c15fa0fe3a13a9c4481723c597153d910e52f63e
SHA25654b99b1040ab80a2a5df5f99840b44ecf015c0d065840b07f8fbb6d761523675
SHA5126ee6bf2f78b38ed2cfaeab9fdff3711683e736795c8818d20b10f9cfe6ff6086bd356951b54aa32f02d98e4e6054d101d1b710a03e92f6dbaa971cf654aa8bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b041b5ccc546118418f0ae2adb99c9ec
SHA177353fffeccd52b4c9b56547117e04fdb54d2b74
SHA2561ad2475709e9b921fbe6845d711f9837be334e5283f33cbecb8fba74ba88dbf5
SHA5129077c5c825fe070edd1a61fff8f5319e352ed49190ab00a38607c55ea88318e6552de1285d5054fae916076c7cf45c62f73d033433ccf4e6e56ce13ccf192149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5095196a2ba3a270de0f5e97daaf57fbf
SHA14b93650e3295fea2cc17a2fd38c2d693f53c3f97
SHA256e8b1ef962cb4381833f98d05f294691d657a76b6b89d1e2049fb2499704387df
SHA51272f2726787ccf65775a70a641c96817eb2d2daf278b1da9036c16ee86a34c46d0989a1a284ae89b7762761fb577fe3e26891554efe3032fa034612d4421fbcd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b60fc63ee0042505bf3f9f8bb0c42cda
SHA140a3929c01001d31aa994f2ee1cea9a6036a14bf
SHA256fc6cd38e7fc0d29c93ac1cbd4fd59bb26bb7f64920ddb82c0898d58a6d296560
SHA5125fa5a5fa168cfbd1fd2e138923191b14397f1774195d7baf7c13911d4b5a050102f26759a3b925aac6276e5f5a8b8f470e26d91a19549ccfe062cb9ec29e1427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a7d73ea39df97e9b084b3d1fdcdc9f2
SHA1dc204a91eabb2d46a7c1c65e7a38507d031e6d08
SHA2567a3ee74e97e0a459bc75a589d0692634d5951f2f7aaee93a1a26a06e24aff871
SHA51248768641ed386830f19f8c8b6107996de2a3ecf83575f2c9bdd8a7228ad2415951003d5d66b6adf7d16b08c1c9954e5a46bb7462073c0008532107a058a8c535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e1c1a6cd0ee15bb9411f24567b4387e
SHA16f2324ed4ced5cced8fb86bf687715d2421eb258
SHA256dc8ad176e16de9b50c9877d7c03b2fdb87a727ed73cba1d405512a1a5871a105
SHA512a104f174bfbab074fcbab4690f1a73cb8688bc9bed19a98d8c0b4754d705a1862b09a1d8108158025f24f826946bc6f58d45d684713553848f031e3cff4efb86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6fadd935b9b6b6829234f3088d408db
SHA1adb04c6524b197a965af718b7f51a06b40ca2528
SHA256033e9c3b27c6633b05df18635414dc65ffb9d5603b895a21b61af2dc65b35e3c
SHA512a18af983c964e1342ae5b10f7b1fe5f65e49bf11a7c9c6dcb0087a8adb056cad701f542998934b842fcc088677673b048c62fced0ebbccde5d50b78d954c4c47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50194c36a51a76ce71b6fc5d938ad31ea
SHA1233fd04674fe05275a51f96d298cd42263ec8f52
SHA256732f5ed9619a424c227a0e56ce0f2c6a4d062032e7e4963aa70ea851eb96bd89
SHA512123bcceffc1854dc14fee5c7bf2fe1e5d2d025993dd813dca9bc949a314814515cfe48ae8939cad32d79f4d25deea408c5130f351d1a556d515d5961690b2d46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539694a81e27056d07d460fe6f515e8f3
SHA17c19186ede9ac1c56ba31e36e5eb884e0c544cda
SHA2560c3d72b99d95ed20a25b7d150ac7669bf87130e9994bc27acc9ff35f63193453
SHA5127fe8888eaeaf9f4f5f3148835aa200977f5d4a88b3b91c3cada686c5043bcf8428ef6c748f484f91a44fd3daccb28d6c8ac0f9d1032ea60d0b13f2f00c3112d1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b