Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 21:05
Static task
static1
Behavioral task
behavioral1
Sample
d073ceec260271858e44bcb392452e36_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d073ceec260271858e44bcb392452e36_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d073ceec260271858e44bcb392452e36_JaffaCakes118.html
-
Size
125KB
-
MD5
d073ceec260271858e44bcb392452e36
-
SHA1
6b3db61b1b9ccf07d4859f1efc2b7bacf2c4307e
-
SHA256
1fa82a21bc9be5f75efcba1dd53ca20b7fcaf4cea371d88ee6b09183eff90251
-
SHA512
7ab82c3ff96258c3117cfc552b3c2298e464988fbb847424adc88b8d42f5999c178e356ab6c182bfe04da763536768d6453a22437261c1ce43a86b7f145c92cc
-
SSDEEP
1536:StlfX+yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dB:Sv+yfkMY+BES09JXAnyrZalI+YV+4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431818601" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C1738361-6C93-11EF-9E7F-EE9D5ADBD8E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000fdaf195399760b6d6dce9df7ab0bcf92905d7e42d09a084e3d75cdc04149d321000000000e8000000002000020000000a30954968d88baee897bd51c835f01855ed469d60fa1e39aa038f982a857d1542000000053152ecd4d0f078c07c6301670df5f3f28a0f98f6aef07638fa3d7e1749021594000000059841720a1bce9b3ee70eff92930f87495b39638171f68cb6c40f452e35b274c0a3121d075c78b16a4df871ae04dccd8c6691ade2b83b708bf4cae90158c455b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a004d797a000db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1852 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1852 iexplore.exe 1852 iexplore.exe 880 IEXPLORE.EXE 880 IEXPLORE.EXE 880 IEXPLORE.EXE 880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1852 wrote to memory of 880 1852 iexplore.exe 31 PID 1852 wrote to memory of 880 1852 iexplore.exe 31 PID 1852 wrote to memory of 880 1852 iexplore.exe 31 PID 1852 wrote to memory of 880 1852 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d073ceec260271858e44bcb392452e36_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1852 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfc96ab19bb8d138d82c386eb94a19c0
SHA1d617160e32dba73b5e26addb90ee76268cc52be2
SHA256e454248e3af043db6090dcf66731f34ef469642d426a926adef6b5b0d2141eec
SHA5123603b84a56afe53c4cc8a6ae9521af779cf0bc3e3612d7dc6242483244f2f17b1ea9ef13de29d506282e88d66fb46f5296916a9bc8af2ba506cbd1877c2c91c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2ef0146f9a1c972ddf4d3e2604ab478
SHA1caa9c2e7742069bd475664ce6d63c19edfbf951f
SHA256f4435c1a7119907ab2f8eb5e363e63f136bc60d4a2b518591fd13ec7c5e730d2
SHA512b5f085e7e3520a7483ff23cd0ec2c3fe367169a92858f530053b79f4849c34a6f3e974fabda16949dc282500de17ee1d313d29b273df38be965aafbed7a3d7cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5e1d51c70cbce9ae6898d525769b4ab
SHA123da174ed40bf167e0508c21d09b4af0111fcd24
SHA256d66ca89ba40ecc1de9e44cd7ff5bcb10e556f5b916863c1b960f4ad2c28be13b
SHA5128e8d1311e88b4ca427d25c909e5877a44ec82eae3056fe79b3f8dd7051ea12449f54abd4790ae2dab20c770108f85b2b50cb3262f7dfd3aebc11503373cf6a16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527831de257086f5cc33c50d7b0ea259e
SHA1790c17cf127586367f7b157efffa873729d4ef1e
SHA2565c2131fdc515df0538db7da1b51ebfa937d337136219dcd376a85c596f40c4fe
SHA51255d05c6449b397fc73e466761814e2b412c0ba10089ea7ccd728a1431b75b1b9137903c06073d86ef0d8d54f0a7c98fe734d51ca85de757a1587260b1a0dbfc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d833eb5b540d42badfb03420cc1ae4f
SHA12e4b7c82f8e02db4a7f914916a3d41dad3ff02e6
SHA25646c7c7c87ab3cb023f8516e063861d53cd63a79bec9d0b9155b1ba5018d7ffd3
SHA512b4a97273578cab73d1b4c479727c56dc60a44f791830e88a7e7e32cc3c817f2ae819a2330fce808cfaf3ed4979744b33426ce2e345f5465abef00b10c6bd4b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5034bad9617a268cc2cf4c69e8f208f5b
SHA14f509b6f1a61746fd473acccf4b2886269e02ce8
SHA256901d20d32dbd7f0026ff654ec65d4014723117ad2e0c866e7e3f1e3aad1f6eba
SHA512d81a6451afb010a2dc39f083fbd52e617db84903b9485b47b9c233fea79c1d26a8294803ef4b03e62818104ff4eca61f398f9624d1bb72ef8a2f166e8ab58f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a8f4c9ab4860fcec424848c37cd2361
SHA1e55f642c1b7fc25d503f99b8f38c3359215c3f5a
SHA25630dabae2fd88a9ee3397e822c7de1ebd6734efb230ca849abf22b69d21ccc5f0
SHA5123bfe0f53778e6078273ffdee738b88d1adc7165b2f928a5d1d29119ff8e03342b0fd0e5c0610132f0b26bbcbea37074c2aa140afb8f97a8b517db4e5dd078d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9d22160c20f002defff9a7ef31e0f43
SHA18487cc15f90ef1ccfc33831a0dbf87f977618c7c
SHA256dc4da7446fd16a8f91ce5e0c22c1e2b7cbe45501a01b3a561f26b8748d738f20
SHA51262d9dbbf5253da1028055286a0c60014848392ec804d3b37423c1ce35790dd86403a302d3857fb2bd60f5ca97f101cbd9e8b371a9035812015def256aabb63d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b91fb4c196bc90a3020bd57f23a7aa3e
SHA1ca58473f80fb043e681138377fb46b3c2c9109ba
SHA2562abea16162bd9d72115c2128b5f04774f8fadb38509546177802bfebf2519925
SHA512a64506ddb6d87425680268931cd0bc7e76c849c8b57f541cc52f4718d1f63e24288d881bf2c6dc54cfab1fd10a72444892b3719e257f1fc259b036f1fab620b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc0d1f1edfb400c547ec3a6621f5abed
SHA1c7fdbd7b27bc722d9651f01f1961c89fa5c10bfe
SHA256cf9812356cb16d7574644264e891cf7332b4a35d65ea51a1cbabc44197fddff7
SHA512ceffafb62b674e0fb839f194851185649758b1fd69efce29fd6017dd3f58bfc7c53bc804b1044e8a756659d367d758befe8147ff91cbbc81bf5387a9158d8df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c5d5d870a5499b6295a385ed745fa56
SHA1a502471318f8d9254b93f4db3c5d7e7800d1bdab
SHA256a7eda9b3f261d6c7f9d584a651ede4eb9062142348fd876fd4a61420bcb0a045
SHA5120488a3e8247f9a0a004e75e95604cda6f7d22100fa2c156f01015235bc15739d2761f30ab3fd8213d89102d5082198e5e02a9f58b6f1008b8d603005db08194c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5104ba5727a23295a58a01d83cc96da2f
SHA1b441778f1cf521933896ad494942a352c7612ab1
SHA25687dfc777003d7996db736262f2053b7d57f942947cd2804316568291b047103b
SHA51283aab3fcee056464cb52c6f192ba095ec0209d6e2162904d2d0f29671c8747cc2a50e98ecb1444cd48c4e7a3e3f16691ae45380a210e99afca76b2ab570ebd9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585452a2f3715cbd27121e831e2de4ae2
SHA1ee20e3490423e937ba5abff7a2b99dd1b5dd87fe
SHA256fa810a226e9b7df93de4696904bd0568cbcc356db1e13d88f911a00819e3ffa9
SHA51256a50253b7e6f25019c637a42553669a9d06b88d014a828645c696518ee9e8de91f1b352ce37327f962d3566be61fab0d0d73446a84488928bb9f9d9b3f91c6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b2be8c31b55ec69cbc23b3edf5584c4
SHA1c94ee7a72368161f0811cd2cea605aa8654c87eb
SHA2567eb50df4ad40d6d6d726feb9a73fa7d1f1ff48bfdafc360c20f2d6c1bf678c63
SHA51258798238128a73c6f18343c741207fef8f07f326a3e1b8599b7b780255a09d514d40e737a3a77c6cc0b066321b062fff18c6cd0f26ae6daf485b7b6f333adb4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a6bacabf68aadedb0141378f7a2d962
SHA164f593c72e80688c3188feec4d137c0fefeb5210
SHA2563d07872b31321a94c5417f8463d3f7df63b46baa01f99cc4bfbb02c13b7a0ed0
SHA512d0aaeb7167cba9b96e3ae88b4b55783b20a4332cf42a3a7aa25f1d41889a14976b24d1abcbe56b600e1a2ffaa4af5452e243882c6fb8abead31dd3581fba94cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d05f6e8e3c59107fcb144e132089bae0
SHA1e04fee3856091d76d48f6dabf11be9be885a543d
SHA2562b268de11165cdfebb0118a9238c402baf50ee7ac551876c623fdccbecf56e6d
SHA5125d26f9ce913641fd9d9bc12d1477fd9ff744a6b8f2891b59a023a8b9c6fb03f7aed3503b3c0402d06e4e761bc154eb28d7d8eef0b879b705bc9a7ad9e6f9408b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aac6714008c606359cf1556528510e8e
SHA1e8c9061153126e586ea070151042deb9c11f4a48
SHA2565c6d8ebbaf089abea97d0038e220ce95692a7b9e3ce7307dd09431da3c11dc14
SHA512724405cbc2955ba9147964b641253b45987d52371532c6a579c52f06a4450938249b98a602b5cd02ab152449571d5642f97f7560240988bcc7e929fc024483d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563c4d843598d1345f27d817167cc7488
SHA1418538d1b2f6ed2fb48253fc33acdbf22b85b5a3
SHA2566aff62104ec6f9e1ef9c00d45bd95b6956200347dc810434892e810830dbf904
SHA51271464c83e0a61681975bab2f2bb84e0a46e1c3e62c4411d63d4ee5e2d72f36c4345e9aa5b4d64f5687cc0c464a3b1705323a8d18cfedfee9563630964c3fdf58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c72b67b52ae5146a36cce2b3af26d81
SHA11548a8250dd798180821f9ab5a84c9ff0a778556
SHA256c44cc938bd6b4f4087519255aae490c53fb4133826636a80a1d53da5506d2cee
SHA5124c155fbf891ebf669685b409fe104d4745f4779fc8bb4e89a62ac681518bdf46860c1c5aa805a07b1217691f6620f218b16d422d6bacb899716dca8100cdc3bc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b