Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
c979d9d49fc9f11dbaf2f1a11db0eb2d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c979d9d49fc9f11dbaf2f1a11db0eb2d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c979d9d49fc9f11dbaf2f1a11db0eb2d_JaffaCakes118.html
-
Size
1KB
-
MD5
c979d9d49fc9f11dbaf2f1a11db0eb2d
-
SHA1
be58f3f571c0ba0cba6e091ca72d961593b8ba65
-
SHA256
bba95f153e493db23b000efc683e4cbfcd23a72146ef4aff814aa3fb6887fce8
-
SHA512
8edc79909ff57a28dc6cc5fc947e4b4bf81281dbdf1287a7c07018b7a982b02ce4faa3c9f4aae00d85e59c24bf84e9227921f80ec804dc19a97e4d679708adf5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431121432" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000ebe12c5d058029f14ef3e1882e1f70a7958453fc03fb6d7f827e0cd69044eca2000000000e8000000002000020000000e713083810bfa3c6807b153a1ff531550d918a8f7068417d27c2b29aaa6774b420000000e12dc710477905bba2e1271c8a5d5db96aff90f322043a631b7a902180c4220640000000b86fbdae80935bfb4a94f76096be950bb21e20fc3bffbad8b393f30e8d954dad00e2c432b6ac85efa03bee421f635e1b0094ac5a463d90791fa065070a8de927 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b00d6d5f49fada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{87855D71-663C-11EF-A69A-C2666C5B6023} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2144 2080 iexplore.exe 30 PID 2080 wrote to memory of 2144 2080 iexplore.exe 30 PID 2080 wrote to memory of 2144 2080 iexplore.exe 30 PID 2080 wrote to memory of 2144 2080 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c979d9d49fc9f11dbaf2f1a11db0eb2d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aab73b6464de6852a2ab40ec57d6ab7
SHA1fe3690e8b1d5a2f7e79c552bff7c40b420857849
SHA256227f4f479d6feb6efec2b2514769661f9eba945d50811c0954881ac14e131d8f
SHA5126525a443afbad7d9bc2545ca235e97b1ec37e055e3b1205cd4c4dee52b3dcb2e9286585f6e03e5a7919d595b67344d7dd4921349fbcecb915f5d2271f682ad82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb6b046330763dd4267cbe6c9c20c74d
SHA19c130322fbfe0c611f03a9b48ac7bb162a9c95bb
SHA2563b574c7aad95119f776de08a777871cc0a63048e52aa28f2f14395e5ea5cfea7
SHA5120de35b6f4fed8c9081fe1655399c767da45c3dc43b23fdb53f076fc74e05ed2162fee0c22e91829e21eb32f6ab31d0288dbe6ddff98a11b87e60d0da6c481a59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a677713cc1bd15427f79b134d87eccbf
SHA17f1d2b8179d1f3689e17464cd6bcfd294ff04a2e
SHA2562b7bdf45f948588db5580c47a2a0d6be04f72677a1f0830a4b8c570abffedb5e
SHA5124dcf60f1bb3d87eb9d3840e4c956db355620231a3c150738b72155e37cfa92a8691c00e5fdc2e21fd81c060467a8d7c09b2a07758d692b113bd300dcbb0e5ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53701c293159a5efaec55fb3b945737cb
SHA1d85bcc3ec667b05777ac5850acbf1129f7888a26
SHA256e21018287481c95c8f863793ad19f2a816f09da50229f805daf0412d6530086f
SHA512043b3d473ad6e8f8d20b12cd9af7cdc27714cdbcc525f350fbe469ce1654af7d3027217b7def4673969a21da460c2622afb443902e450fe9d870b798a68aca6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d88cf56fe94ed04b0544d545c2d7a8d6
SHA172aa183b7bca993654de789a1eb30c66f892c6d5
SHA256c519ac1e4dc0842b43f3cfa213335dcc1082231f3bb8c2eec9f6be232d110ab5
SHA512b55acb645d909c6aa681136a393823207382fb408a315893bef50f100fc2214a1829ac32bf4a52559adeb18ec04bc624064281f6e39659e23fe075d77886d20e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa87692f0d57080100118680ca7f2391
SHA1c99f78025c751700bfa0e50f629f1ee629633088
SHA256ec139cfb557ed152124c45f032bed19946e4c804e2f6cac1b795e85ed8811e77
SHA512fb7be7ce1cce6e8e4492611ffee289108ca3f8a7d368fd1d965f57d4eed85b50244cdc076a698a74bde4d5ce7b5bcd9b343d18e38099173450158994b74cdcd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5168249810bcfb9dc4d646e56b09f9185
SHA176ab8e1d60f85c14796957168e9408c9f199ea10
SHA2568590176ee57f3d253f290e6ba926cec7da7405cd19bbbdf4fc0bd396f378eba4
SHA512c15b18f58a798e6964ea9db8d46d17a91e95e98f2dbc86cacd1f73d9fbffccc98f8e79bec7f74b4f1099d030a202630b4df6ba32eb4d85bca5088a0d48ecbb13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2cd892c2645b4b272da494196d11d90
SHA1b208ac71d0566321190b4c5c4ea04accda692750
SHA256aaf2edb31af0b8cc3f6e4c50a8d98e436dd857352b17ab7c9437eb96be48eef5
SHA512bb8d66eb05109e1d55cef203f05c837719ac12c7d472b6351e2548559bb40abee9ef201390d9bcf20fce349a50024cf18b26114be3d8476cc3c5aea8ba63e6e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58872ea1235d42af5911c284c4922917e
SHA1bfed7f828fd1f394c4c3411c4b733a25997cb286
SHA2561e783d95de8d6202a21dc018538e510d78336704e114f264fe503adee63d719b
SHA5125a6312dc60a0c96f4fc944dffb272c75b0d7d544eef3f4ebb4c9d275a74eb96a329e45d805aca079c9b432f3c94037540305f271d47b763d9afab338cc027fb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e66e4b90a4f884a93c53b2261a4ba4
SHA136d25c7169597733924bc27088df77e3cb5e8700
SHA2560be499cb460b008b30f5b245052627faecf64f4a67310fa9bb3c8cb67ff9d6a7
SHA5124ada56a84fe653eae66dfc73ac18abc91f23280dc1ef2f2ab9ab88f601e9794fa0a1c35aa202eac4894bd29109946d99c65bda8d38829676aa178f8aa1df6d78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fc413128364150f73a2c8bbe8618cf3
SHA1697979ba5d7d9a5171094820894a5bfe366d5734
SHA256ade1bab1ea32fe62ab2d9992686e2bef59d1b4ca591556cc54befb302a3b553c
SHA512fee0669e2c177e82f19024885617878a2998db3b767071cf79eec289c7bb6fd578cc40459bd8c3ea77eb38ea03968940a1e0239c59adc632f5df6edec037f73c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d8a12f71f6518fabacad84b68785b0d
SHA1c64d006fe8800a287bbd88bf4ea5621d3e0fb526
SHA256dad41f8a03a7adc234b46d5bbbfcf4e1786d6472e50a5523848c364c2ed6f929
SHA512b5f90719ad68a725ce8abde1bcb01c29caa6e6070a18252498c86b69f9facf62444dc33f3402bdc0bd10ee4016644bc4cb07f16150ef54734bc4521c4acc521d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5043f6b9139b275e1ea86325d7223da40
SHA150cd932c19df372a630c5671b86b0e9a5dccaec7
SHA2569c8583377f86365a247eb3560b67b671415dcdccb9b6d20d9726e6ef8fa6175e
SHA512cef3cd285e789ea3a1dddf7646699b0a66b7fb41f1d05496ad1e3786a409fd84c4596be1fe6b2106ff84ab0d177b77157da65df851e4088cf2a454c4d26cbc8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d86964a0a47513ea69f9c2976b8824f6
SHA1c380242bf839bfe07ff545778b293bb9dea3876b
SHA256e120576a03f611569e41c96e022812cced250bbb315e679b86a64df70cd633c0
SHA51265981151c0dfd49f2d7e318971e30c884475b510fa4f54f6962c38e4c373045dc20acc603fb2b26a4f877f222440dd1c6daa11430c0e13ecf3d43ad720bd9104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5527295a161bc096ebb5be79a8d8a2a99
SHA1e1c63f515bcef3d47c58ecea5fa84398a8ec625b
SHA256c8b77dae42e493ff5323aa872126c29a5ed912e0ba75f49c7ca3fa21a0e62f76
SHA512a54148ec07db8931151c284897c2e8dedb047387f4fd5e73bf75fbcff2c313ffe615393c5f585b48613cb6d07536d28da694dccf4591aae3698e10186b173323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7561f22381035dcd4f6e37820749d80
SHA1ea5c47c6e81f9be7c34e71b168d6268b52d0655b
SHA256e7ad3fcaf0e3bceb2a536d45078b055332ed5632ce7c4b270bb4845451046784
SHA5125265c3b0a0461196000c18ecbd144cc38edf94f1a28b2266d67aa66796d179140f8c6e0ac8b47863b72166afc400c27a5f99a73ffbab75da9d0faf63eca283a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5983209199c06d6971a0e6db9d3481eda
SHA106dba9a3beed4df24e323c5c4c9b98ee9841c717
SHA25677aa8fcfce587883f26ba83c263830787be67ffa1ef62a18cd2806c9d22199f0
SHA512681f1b2c2366e7a2501d76bb7617ba691e60a195401ddb151af3194eafe491b28b62a02a9d6a6b70e82ebbf35da1cf8206b1f4eb4b89ec343ad472c63d88f993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a54b017cbd5025415e339e7604a6e85a
SHA1f672a9354849401ce4d7e50b3704c78c561346b6
SHA256ab738c61a3d3f64f1cd384efe81728d1c152601fd12687f5b05feea9fd61055a
SHA51219fc20ba96ed711b17320a08afa30b7f59f6780d802b8f840a29118acc8b4c905167e9f8452d7237256f03ea62bd2e3f14a8fdb7ae1bb6f83d9ba8d454d18362
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b