Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 16:05
Static task
static1
Behavioral task
behavioral1
Sample
c92753c3deb566b2a6bbb8b5302f6141_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c92753c3deb566b2a6bbb8b5302f6141_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c92753c3deb566b2a6bbb8b5302f6141_JaffaCakes118.html
-
Size
461KB
-
MD5
c92753c3deb566b2a6bbb8b5302f6141
-
SHA1
f493c9dcf151a4a24c18dfe60da1790fd63f4096
-
SHA256
c990e8381fa8f9037a19c92db659f100390ec9580ddedb5498bc0ea7916ea9e0
-
SHA512
423d580b7bf552d52be488c82c3a6e1d750218e38642acd31f5e6fa511cf6dacac952dd7ad645ca3a809c14728a515756266d236dd2a1dd121b82f69fe45dbb9
-
SSDEEP
6144:SBsMYod+X3oI+YhsMYod+X3oI+YBwsMYod+X3oI+YLsMYod+X3oI+YQ:g5d+X375d+X3a5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C6F55A1-6620-11EF-8AE7-D6CBE06212A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431109413" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e086fd642dfada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000052fed80ee02b820144729c47f1a198994dfb53269aa5abc551d35cf47cc791a5000000000e8000000002000020000000db6c32b0718274d1431b9b4189b7e76227ee8d58c0d5004e7e6ca634750cce9d20000000f614495b463e9d69ceb17589ecc6212073145b029d6061527c29cde8f991d0f740000000a0fd0ffcb553defe4ad47223c68c5aa3c7efa05e274d9534ac015a167ddad462fd45756f745e76d0061ed9054048b1bfbbcba927e39ce1034cdb6725c8734cfd iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2784 2356 iexplore.exe 30 PID 2356 wrote to memory of 2784 2356 iexplore.exe 30 PID 2356 wrote to memory of 2784 2356 iexplore.exe 30 PID 2356 wrote to memory of 2784 2356 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c92753c3deb566b2a6bbb8b5302f6141_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2e678e4fd7b52ad2e89911139c257e1
SHA1576c57741c47da635897cbd93c28c35539271bd1
SHA2565ea5a615dd69d762b05e6062e3115e89c79a342bff43833a38138e9798bbed8a
SHA512944ba48378d7676e2d1035f267a661be8e0eb3bc6e53a1ba888f19df212ea91c585b73b523d05a30d7741e41b08a95d36d0394a0d514c17b86273584ea41e763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d254c7f838d6168b0706a7651f6a0bd
SHA1a8c63abc55853229960d8026daf6a3acb431911d
SHA2568a15910ba269d90f301e34a93c732fd4fe9642a1eddb0e21c6b0c9aff3f51b4a
SHA512de03d0bf86ad4b213652e023af6770d04c0fa0d66d8d2f6bdedf9a1a0fd10a64e67aa3f7156c925be6d1b3da9754087a14a46bbd1e50005a8292641982d8d847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a9818f0a5b4e438204ae01a83e73949
SHA1f2c0b7bbd677f11365786b5ecaaa6dc6943da556
SHA25684b7e5637ac34b712695cc92fea0a0298b53f21542530d90d62b325cc7384e3c
SHA51290a2ceb1859485870240037ffbfcb8793b906c593f0e319cc92dfb18f338869b127c6c610df2b5a38394206452d9aafce28081e8ed7bf7390485b5a55f97657b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5472b3d4404e7dd13cb714ca2c3dcf2ab
SHA108ac23ca6cd0b6171c17e13f1fa69263e8501324
SHA256e18f25f8f34aace80012b63b66c859ed776fbf1179f59e44cc666b7320bad0bf
SHA512c04b41719a1cf6ad50c99839a9bff0ecffb61d150951f7824ab186c3f6699613f5197317d2561d11bdeb701b01d01f25f4836497df559f52ab059d730c4c1de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586e92d235968e013184af4caabcf9140
SHA1167e356e0ea95b0878c92a4069eca80ff6aca1da
SHA2563c1d3b6860c43edd05c0da79309674dbbca6d785dbbc3d4aece7b70317578e42
SHA512e56bd4339bd4bac954db35bd10d0e3b745df590114cd5d8fbf7f1b785a6d413ba8f1db329aa57227ee6b5def93a3aa827e3a81c9a70667af127a64683f6c0ac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554fe0a0975e9a15786d9d1c123c0d845
SHA137abde2a01c5c5687f236108f2f078899d51d6e7
SHA2562656184ace19a4a98866ddc09507ee4349330ce511bd84978a376fc53cd76f48
SHA512bb915b5222dda0c5d0c21c84cfd522058ebdeea2af0e6a3c5981ea713f8331238ac6b80bcf2fa13a9efc4b4690746df69e92a6ac5219b932cad04d5199a865e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5372fdb5c9d3f6260cdfd817f788a5c98
SHA13c08a0f52825712c6a6de61b7ff57ecda2702e50
SHA25653fe5b89c79ae35dc1dbe7f31ac098ef2c9b9860f8c5931f5e6cb79ade1bdc25
SHA512bc047ed175f55c8bbbafda36e9220d2026765d9b624e37fa76a1788f9e8c9aff6a2c5f49f5aad6b93bf8a3a7bae9c35b05c0ab927a26b3dff06b0d92fedc9ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58672180c9ecfd784852ce80ffca1dee9
SHA17800e491ec13af03ea53634d2accb7d8780047ec
SHA256d3b4df4eb18d262b68b772a10d8eca189db74c320b288dce64b7c9e27f4ef412
SHA51251dfaca916809b5667430ebfda00191ab6ddb35fc8abee851d748733556c29e9d1cd1a1b518f629c6a84a9091e20aa7ee917276d0a0efc6fa9dfd2403e5fc889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5824e30fc378e85d6b84f990b66e31082
SHA1b33a9d3c500107f04e4ac788d92468dec50d8956
SHA25645b09ac158eb36f7a5e7141e58c85f661beb50326bf1d21c6754b5de89fded9a
SHA512face32a2a86c80418e176771759f68fadeb60c6c507975162dd207621e34dbafdc4d266c1c49baf02392a3a5558c09b97527935cd3e62620ccee022321f0dd8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593b5dd8ceb4ea700af3dd0282e944fcf
SHA15c386ffa8f26a1c35499c046af00e903177b67f7
SHA256d878bcd83cd5bd861f36b80ccc97957c3c69772618255cbd05df9d96af388d48
SHA51206610a8540d47021600cbf5ded3bd39c1eb95c3b9daf10ffc3a7c328b1f4b4faede89f5f415bd98a4ab8b56df4d4e68d2a6cb00fd9846741b9b91fd33802360d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56498a7fa7eaaf85be9d4a2a5555791ca
SHA1839e197496cc153d12a912507422ad93085da79a
SHA2566a0774f41048d9cc98754b023b1cfa535f9be4fa1f7a9f8215370291e3106722
SHA51202aaf1d5b611647f0f74b3b88b2783df025f634276cfe58d718fe310e875731116d3c7d9996a137c982919e83fdc192f1d381e2948b8c41404fd0ac8d298b72c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d77a0173e78a33888dabcf34a348716
SHA167ca71d56015898ae20d90e7b45a93048d2415ae
SHA2568a1f9b22804f8bb8ebc312f1d40813402cef00a9854c550f744cd159eb2a9205
SHA512ebb9f17d9e6d54be9e06680505b9e33e6d4a346096b460fa61b21b783063bb2f6a46e1770efd65fd937db422481255ce89ee8b598c2d6f50cafafe2f57f5dc8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f093b9029d4f7f14e5997a1b6cfd932
SHA1e83db91fa461e4ba708a669a63e65b910d5d69d3
SHA25617f3a407bd6093c0b60ac67538423b2245097477a6b4bd2269f1d11827b01d72
SHA512b1aa388dd32e52a2d8374d46a8d5f5ec13b4c7788344fde97e6761c2775c49a9f641cdb8de32851be8c92a7b6d5aa12933605da218fcce4737411f057835aa08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593cc15560bbbe8305fe59702a046470a
SHA11b211503e01d8b631a64411bf712d5040721a5bf
SHA2564449a5219dc989f3cf943b38f1e5d90966dcacd5ff7bc9d8ef0f166e31039b40
SHA512a8217b75686ccaa3219202f24a8f52172d63954d14756d5f7a639280f2aa8fda86fc4283ae531cbac21aa18abaf2b334424eb0fd1f1f1063eeb17093b4578194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d740650a5f16f6e0ec2f4787ff56fdfa
SHA112640e301ef7f51b7822ccdc37f917f69f334ead
SHA256c0a5ca801112541a76cd0f4c645f25ed19d340d019fc39e8576721f6a50043ae
SHA51246daa590f86804b70b0eeb527d78abe80537267840e21b36add901de716afeb079dfa72a5795d613d61faa3fa8e71784a57a411a6c3caddd4354d4e6f15691f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd9e136d2f25d1af46c5b80616ecc325
SHA1f76006b0258fb3e89d8bc6ccaf5af241a38209dc
SHA256a9bfaf57d2e1928c33a7722bc2fbd32ef45e86d085aa5b0061a869314958c0cd
SHA5121606c588280df9bb27765ff2b6f93d288fe4934239fb7569b337de06b3ca1cfbf3f1be06174b8d6a5ded94405e3778fc2a20413b8b748cc2a4eada2cff0d7583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3762cba6d878f74b58e01eacc9db1cc
SHA1a21f41366ec1de2e1d752ae42ce2d995a77c52c2
SHA256a6cb5f97be7cbcd6aba48c112f502d7cfe6abba76e8041e4338411a4fdcba1fe
SHA51288218549feb0c37704974eb547164c95132e25417d2b45ec9fb6c77ab814ed5f890c97a6865e1d2b37b7ef4ea9387c332c6446f01aa96b03aae99bb35e82346a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578009cc8dac44f4cc47ba993605ed347
SHA11508149d6b46861e45caef33d78f7a7ff9eb10ee
SHA2561c3855a71ca43c08f3d8469aef0f9b6e83b8826b389f8d3902adac0f63c95794
SHA512b47e0d6e41982b86527400d09d0173aa3460bec1a5fc7b8dab855f2b1a43cb88bf3cec27b54ec1b10a9909f1dca4c1ee5ccbcb0ba8a169cacb1b5eaeecc76d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f743810d53181607a1a73fc888564f1
SHA1dcf10d6d0a9fcf6d95fef615582d3705e6e1cbc4
SHA256dd846993c24406031d33221274aacce9e035803900a358c102dd5d554f8b8ed3
SHA5123f68eb2c73ce40b6de37893ae276650c81823db779e760f5d66c749ca0c6a2787bd8ff2818f92519531789bca0a337921c15d403c731c2383c13dfb5abca962b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b