Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 12:38
Static task
static1
Behavioral task
behavioral1
Sample
c8d5414dbd07d4629beb1bb06ae5412d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c8d5414dbd07d4629beb1bb06ae5412d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c8d5414dbd07d4629beb1bb06ae5412d_JaffaCakes118.html
-
Size
461KB
-
MD5
c8d5414dbd07d4629beb1bb06ae5412d
-
SHA1
1ad3fd97bcecb9fc72fa02c2a27e3918b6cc1c12
-
SHA256
58f4f3d9662fdb22c85adefa3662062b5b16cdf6570f331970589d5fabf2240b
-
SHA512
7b0ce435b3e8d6f67c0782fa1d662bac62effb1238cd84bb959385598c166668819a61fcc7170f74d3111cbeecb1beb0974054278ad6c501ecdffc1da9939f45
-
SSDEEP
6144:SvsMYod+X3oI+YgQmsMYod+X3oI+YLsMYod+X3oI+YLsMYod+X3oI+YQ:W5d+X3i5d+X3p5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9E27B71-6603-11EF-9CB4-D238DC34531D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30fcf98310fada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431097008" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000030d77f0ad09b622f5393f95f29e25f834c49fda7bd6b15fea03092b3cde3a86b000000000e8000000002000020000000af22e99f09a0380edff8f1b0b8808f21f760f6b06fa49bd7507e47be97caff0d2000000070459b1d0b9635151f89981dd58d38c4be3c6734b03b0fbfe66a582542d2716940000000c5e61643c97c948484351aae59e1e354f247645fcfbc5a4350cbbaa11ae272b18838e4da6641995f196b2f0f5598da167aec409523524b15600199c80aa35b84 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2332 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2332 iexplore.exe 2332 iexplore.exe 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2332 wrote to memory of 1928 2332 iexplore.exe 31 PID 2332 wrote to memory of 1928 2332 iexplore.exe 31 PID 2332 wrote to memory of 1928 2332 iexplore.exe 31 PID 2332 wrote to memory of 1928 2332 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c8d5414dbd07d4629beb1bb06ae5412d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2028f62a94a9a826b48aa2cf0522cba
SHA1feabe6c1bc1209d87d81ce4ec2524d3c01b31495
SHA25698a07e53ab8c7d2ee22f324c463b7517968128f226ca12ba8a1b189226ee7621
SHA51280853b3c86b52de670423ec971c24e44a217f0cf48cc2cde59d3a9512add04779a2e445167159d3d4219a5b847377266c333969618fcfd19fe4ea09a7955710f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a18c0baf3f8f0cb3be1c203c14eea0b8
SHA17388a283c2b33136a9eecaeff1fa5f5e45eb7722
SHA256c0c2c3efa005d46d4292c0440045dc5199161448d11ca5af4e10046952938c3f
SHA5120c7e1674e3c034645e377eb205a4dbf1e5b43f3debab5b0b651d2bd71bd90f59d6be6d9b57650442a7b9a446f1d5dd85e038bb7dc0fd5830e53a303680692039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5513fb93a41792783bd2fe4a545e52780
SHA1564f63559ec842a9600ac107985396f904e7dad1
SHA25610c58f97fa4f57d5b12af8fa8f4de4976ee5412cb6defd8362d8ea3b55cec38c
SHA5120ece644a596bcd5bda86aed69a96c5388145f3d89835a778b579454efa394071bd6d383957e0d704920bde6972aa22bf6776a133e07135ae63aa097f0bb97de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce20d1fbee655dee198a9368e1b471d3
SHA1da5fbf27b2cfdf199038cc27b7d59330c7d53283
SHA256b13030df30e59c94c328a93d42e7ab5a3e66f1a24f9193f9f9ba798cad0c3645
SHA512fe07589e5a2a3d10f1f1d8ecd172342f404cea91b95b891cf7fc27e66bf6e95704132d9b2268cb20c0c07c98abc221c195d47177b6c9c434e9341290c5d51ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fb15d1bb9a86157677ad29b7655488a
SHA16e1bbda9b139f102513e0a78b8d619e912a20e68
SHA256e47c9cdfb99256ce66c311aa5dc66b0fc56f0bc8e9fb9a71d0d9cd239c9b24ee
SHA51222b119cc880d749acd8fad6529646172a93eafff573e1f990086d8ab9a07c851a17a6a91913c6c7ca4146546680054a79e146b6c0c0d44f76345c429dba333f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de52ebfe57ae3a4960252c79ef31359c
SHA145e34e83d737544269d0d697f714d799e4d281bb
SHA2563b3436c8426d27ed9e6b7b264f60c103ee5a2560dd21805a5e1ce83633106e53
SHA5120b14d86b6f055b37d370813412e8ac9f273bf316d02bd636d08341d6c6ab390bf01588ae503d98292e43df5a2d3227c018a17d7f760070cd25945fc22f63d5e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eabc18d1ac4f40adf7c05e40f83bd7e
SHA16d88ee97344ee67cbb52907259405f5517aadd94
SHA2567d08b4519cb6fa6bcefd750b0390f188ab0b81b60ed8ad927fcba42fb7bb1996
SHA512d7f9147f663c87163083e3c50f6054186e8c88fa70e282de21123650f92140c25d15bef59e6989488ba3ebedf4fb906aade134bb81962b1f3fa99dfcd46f2a93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e4f719a5c800f0a6511f596b3704970
SHA1b4c293db4c13c712f121b08d89038aed9edd05ae
SHA2563d8119a96ccd4b67ea18bff4c342ad912fb7e60e8ac79f1aeb0f226b67420c46
SHA5123d610de91508483bd971667e87d34482089fd01650c48918a93b7325a1792c39b276c7c506059f9108f8ba945be5355845686650a92385e6f99cdbd73b7799d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2d409207c4f31ea0c8045d8623058a2
SHA19546cce43778cddbf264ed09ebb44d7a67ac43a7
SHA256b072a76430d835f53155f6d650b52ad6907743ae84eaec6515f48f15327656ab
SHA51280fa73e1012822ff3b0b3e76ad215d3330efe64e2a3a63ed1e8cf4819f5d918321f6bd01dd11a6cd1662fd7719d5301e3b426ae24e40a4ac492a937ec5651d93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e84282e4e8bba0ff993f048e7efcf2c
SHA1ed063cb39fd6f50f7d5e6df2b20307fce51afb22
SHA256e763c59651c30565a2b6762c72f5d341ccfd01c93c7d49573c7383a1f9016c11
SHA512a0356e9eadd37d1ceaf3ed55b768930385f6087f7790ca6d886e5d7dcb89649b83d8b3b1158fd50373cf2898b2b340ef30680876af09a8ae6f65dd9f0c07db6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b80257eae4de0d334ed51ae0af2366f
SHA12a569b5ad5cc9ed843e636315ecb101699fd4f3d
SHA256bc887fb933c5e9a1ff4ed794167e011d3776c7709d9618a8e4938fd8e1ac8a91
SHA512ef1f982f9402e9e686c9a669c0cc5d9c457d604df3d3741df4d3a53e5d048716e193b8dbdf74b65bff1a59ab36c3b682039d6e41f36a9ac976c14ec60e1888d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8bd9b00c1755e6fb9c82d8ce1cf8cf2
SHA1ff0ee444727f043a83334763d94121a722e40c23
SHA2565196c878e4f41da4160127449b1833c1ea2c5b037177c81828346ee9fed574c4
SHA51269a08ced75cdb11021ce551c8e108902919257e6204a0e652eb91f1f752a2202e356cf215e376b6916677bda06c703259c99b265a3bbefa7408e22d485b08f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da2e3009b339c118c42da005b6634c6b
SHA1941448ad212cd314c10a2c0bdb945110724cd123
SHA2568899416e0192dc95af6cf32ec7045db3c13b3c483f3537e97737563ba6c8424a
SHA51293b0073df4dbcd48ad39f87e1ce569201cb83e0e8c131d2996307e99ba0e268ac4b86fbad72704885a902102ee70c78a9cf02a44a07763127d29f599d815c800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8a7792af2d9ab82f81e9e209ce4e3a1
SHA132e0ed65e135c9731e2850a1a3962524e9c69153
SHA256cec1313bcfb7b406ef0c1cf9ae29b2ee478125b02265249de11aaa3d5b8e2ce8
SHA51297e46ccaff38c4153c9f531ffe13c6b7df5e8796777c621bbe6d2300b7aab1e97d2ba85146a08328114b54b00da656724e52ecd5f35103c66424bbf74aa3c4d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db187c61574aa58932f74fb1cb02bea0
SHA159d6cb219ccd4141e7fe911bebf4b6b1d50e3bb1
SHA256c6541e0391bb146dfbd990ea414c0eb7aff1451e33e5e56eaf55f5b655b59354
SHA5126baf603ee93efa5d1761aedd1097bd3dd8153efdf29ccda3d12d5b170ba7e7d10f23340a2d2d74a8074668cf37d1a012e472f00ec1fd6ae3da3abd04a1b97570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bb1ad06b5b00e05c57fac0675235e65
SHA1d0cf4d5d5a01bdd1cadb02f05826df946f15d9aa
SHA256cf9b08438c885e50c14c7a393f1896446cb4a6c560b4a47b74a0b7b1b0d327ec
SHA512ddfcc53e53a9af05f3db999754b7ffb69c32bf1b8df40255cb2e53807bcdab3c6209ca6a7090bdb26340fc40b6cac1020cf83d7ba9f088cd9b6f362c177227c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59da42f36eb9558bccfb157b022d59ecb
SHA1495b34b9e71eb4b2dc73fbdf589d46d4efd96df5
SHA2568bc6510ee7598dd33369ef6f2525938531d2e7b6201eb4ebbcdfd860ae7a5540
SHA512b6663a1e70b5bc02e491fedcf94511ba5d850638a972a6ac069d69517f9d6e395173785fd58065f3c4035a4bb3d87f7a1243f8166381ffac638d94eea10be062
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b