Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 18:33
Static task
static1
Behavioral task
behavioral1
Sample
c962d6971977c3fe9f7fa470e1cea4e3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c962d6971977c3fe9f7fa470e1cea4e3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c962d6971977c3fe9f7fa470e1cea4e3_JaffaCakes118.html
-
Size
761B
-
MD5
c962d6971977c3fe9f7fa470e1cea4e3
-
SHA1
f9cb29e7415edaa6df4bf22572fc963818db8f3c
-
SHA256
97ec28cb36a76076fbcb285351d778ac68f016a021525f04600953c2d8278890
-
SHA512
44c838570fbd666143324ce0287ba920fece6a4a58d337436f04ac6e32e5584abe72be63bde604cba21b88122305f28874dd432974a89df12f5838b204cf6332
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 500707ed41fada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{280133D1-6635-11EF-A207-6A2ECC9B5790} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000004571bfd0f1cc2cc1dc7a2c1662e37e5f1b3eb4d47e2f0e0c6cc7d090bd23eb26000000000e80000000020000200000003e52b7d25a51b7a83f87b6547d12158e4677781a9c31a3ee4213b6fb69de31362000000070b41f20805486677b7f4d7dab6f775c263407f60f560586392352e1a7f8979840000000145906364f3aac4f5f01f644f8a181743288f0569ffc9fdefecb9b7eb7812f6767bb8effdbe092d244a7a484879e2e9d00e8a3e2e8889cb896c29ae2885e1d79 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431118264" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2516 2360 iexplore.exe 30 PID 2360 wrote to memory of 2516 2360 iexplore.exe 30 PID 2360 wrote to memory of 2516 2360 iexplore.exe 30 PID 2360 wrote to memory of 2516 2360 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c962d6971977c3fe9f7fa470e1cea4e3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c914e3d1e46a3baf0b27ba2026a53f9a
SHA1e4597fdf9b91b57515dfcb0eeeab396838649b8a
SHA2566ccc2c802486c07fd32fec1bcd826487d5b986874726d88bf776ed13716b42eb
SHA5127f0bfbce71cd3f39c3f14bda1ae9a670dae8c0186d1a068a6856572a27393c43c750a3573449807b990d5b4c1ecff79726e33993123979989793ae31246d5df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b70296f0995ad57a4c50b49d91b77310
SHA13375408d1affbebe77016cd43db699e7f813c138
SHA256546ca2914969701e0b1a09afdb0612513110eb3775467fbe8fc6ed1caf1751b7
SHA512760f1c313944bfffcfd7f556beef53a4cbf5f94a129195e6d33c4c9678b802c8f8b80d19b4fd80105f5be8e76bc05352d86a06c17b4beed884892109911c5a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c18af006870e20cb540ae36dd6d57de
SHA1f4b34d410ded8fcc28afd71de99d019e3331ca22
SHA256a724c0b70076f62102b4257c880f9612ff145e764b926b427077ca13757106b5
SHA512f4914a20bf0dafdec997c7922320a5b156e942f67db3ba4480bafc50c93389743bd8a4dc44251a80b4d885eff81093a2bd25b30b21c8f61b5a8f76ce6733899c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cba424c6a00cc86eaa964c4c82e0a48
SHA1eeef147dac013be75298ed85dbc6877d5b339ae7
SHA256da6aed86b7a0ded705dea74cbbae34e09914be51f5fbf0972ea5dd8b9e676fcf
SHA512eb702d97f1fa72f64a8281c755e373bdfa18b92b579fd3709d1356fb5997563d33a734d6ecb8a42cb0a60cf0f23a1689d56e40a8f23daa20d3459bb5b89ab8d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5799896c4773cf253aa37efa537806690
SHA1011fc70bb02f6edfa63c18c099a55c8c08c4cc0f
SHA256200dc4bf7c015fcaeae6315a41a628f60fa0f12c54ae73b74df337d18edddfa4
SHA51207a93a2ecc4042bb043b1eaa706261a7bc7c60f10ccc1cbc66069611bc5d758a484d5a4c27ac6ce87c53275b99e361b937f8ebc3ea7375449d972dfd907a6390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c91fab556e5ec3c2a9f9a96ae8226e21
SHA1e142adb633c287713ed4df4852a92118e607ab2b
SHA256050484cc4e3f24d1bdf4366568c0470968be4cdd2dee9193186ce4925dabc7d5
SHA5125e7e23a9cc6354e73cace657efebe9349927d7f53d5d75d85b19d3c63983c608f502a9e62f8429d7334d7d08bb735749211084a2de5d93e0e4b2d240c2ed1ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccf0ab6ef8361e124cbe7c574c941944
SHA15ada566bcbcb01f745f74b712fdadefc39b61adc
SHA2563ce806f3e82a1d10b059f858e5a709a6507e2914a4a4544526e11196c06f3dcd
SHA512094b75a99b1aebc7064e4c3a3409ab1e1a6e77396983c7b8a25b3182ce5e50345392e52c5cb39adc0ef77bdfc12d02baad7b44096c0a8e6ce7377155166c1cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6041378a7a5afe13888b5ba8cecb7bd
SHA18bb66f592941fb00529a3b847e43c274d8eadbbf
SHA2566cb77040bc2fe8ebb135fec9d6095a7c22e81b7f25b08448e4d0e4cf1f921091
SHA512f0b2e785b4adf8a3ce8e5380d1da102482d76cf2613e3cddc97b24017dcf167df7d394442c30481692f9a07e7fb8b5835b6f1f15bdfbc33ac820b0f00466915e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0bb1ede080cefde43a5aafa0f608bc3
SHA183e77c26893d8c2fa785ce98305e58d8bec10e2b
SHA256523775f389e78c2969eff0ba3b685cc924cdaa8d08cd2e718e5753ea5a0f2a3b
SHA5124b90d7b6d0bc4c2cb2fde32f24fd864806ff8fda08cd2fef3679aa118c5486f3c0fc0c9d84749be1e31939a5a89620eb95b5d220b8801c74b3725fec87ca19a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533c59d7de2397c0a9300acc39c398391
SHA1eea1239c9e8d34169245125b0e68b226f512df45
SHA256a4fc914e577fa240ec0a41800276ea294157febb739d0c99e392e87bf618fa8e
SHA5124e242e9bab5e466b59ebaab200ca3ee4344055f38ec9d2c507d41551534adb5270da9246cb5560672ed783192dd2e40af5f9a33b17873983d34775eff408550f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eae1ddfbfebc5202c1c4b5f506b8635d
SHA104a009b69ee797cc44bf618994086ad7dd4ef2b6
SHA25640ba470e0ad8546a0c02fc8309941eed6453dcf6f532fa3abdbfe70eab7c6d21
SHA5124747ea8baefb4a6bd162cfccaccfe48f90ead50d7c6e20ea11a2203751d391a870b29015e43f780359b67d60866f29f608789cde741661cea136e35a500de8c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53269900eb87c8e812519a65331b41b6f
SHA150da9964f783ae4488873e1731e6ebb5d9960816
SHA256af9f93d11635cd1f7abe6ae0a7c66ca5d53206d539d4ff75cd8bb89dd03c0360
SHA51251e342668c6f09d63dbc50e84dfe0fc4cd57966104423c53de4ff1f79d57b717948f870c8346fa5136535cf690cfcea78a498e3b844e6b5a483bcf9c45b2bc1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537c85c9429b9f3ced0ddecd1ee6620b0
SHA105a8d9c48d71da3dcb52a7ed6bd0eca564b833a5
SHA25691d9b3649a97547860ef2458864c49d3d3e5249359ae63ed868d828dfe1c15c6
SHA5126437969ae14388a7c3798127e49979604e696cb0ecdf2d5c27d39293fdb1bb366ac060de363e937df63666aeaa6e5d7a36e73ea2a0819e55f6433cb910826b18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3022933988e0c3b73c588946ff85808
SHA174ddf37caf6ac436b4eccae52c965cab904fd985
SHA256f1aec210e37e3d4558c083705e8a790452db4064934790840c043524f17b9084
SHA51284f6e023eb8f829d2e9e0122a02be874bb44fc9f08e5f42bbeabff2177b7b3f5087db5721b4a808aed7e8662a1628bb722034148b6c827cf82a82cd8a042a1fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e7533c5c5c4fd300ce1cc6c7556ef30
SHA1838c9991eff278d620489b757a1b5b1861e46156
SHA256e9363795ac9ec0e30233f41553dc41f04de21ba3db686af4693abf2c0b634e44
SHA51257d06764555ac33b32963074d67684a49b115f328eccec9a68d02be0a3c86877a1fc5604434e7727e0b5c423af442c993ca502ea3b892d9e282891bd8aa52de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f68babf212dc6a28a5adbb7dff0a84a0
SHA1efcc975fe4bb7ffeb5cd1d86843130e8843212d8
SHA256180c372ec58229166a7a0d7294611d7dbee88c47e44d5539204d0380e1e4036b
SHA512c3f7e27175dce7c3034f6c1d185cd22975bc4c12ee4c8537c79b3ff1a0ddfad249ecd648e09aad6c1e58944608f1d2bfdfa34b48c7182f08f332cc681ccb35e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539abe9adb817a9cd21ca900b2587f5ae
SHA149a348ac83b789e4cc28629f3b3e1fac1c49dc13
SHA25661075cf9f37dab7245f6ea2384f5894da728a678c25f7de88318b77e2bdd0e18
SHA512acfc6fbc2dc755301a40a4e959eb14e6afe42c3d02eccae84be41100487d39f301db36c96f2f22953766f75aebddd13806263212b4c8d56579c0633eee4952d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dabe0df3e521a4cf0b8b030889f6bb6
SHA14f1132a319d62fffb033c0215b49015e7df5c6f9
SHA256ae468401d8eeccda2be392fcc9e745c9ef4b8152f5f272806454149a8834c692
SHA5129436c4f5063e860e4871a9a45798cc6f05ea93917b83a4177f4387e9f873cf49cd64d14c10ff2b280be9e8406267102527b03b627d749ff7ffde7135cc9c86ff
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b