Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 07:33
Static task
static1
Behavioral task
behavioral1
Sample
d1670c17681db18abf2178028c9e6ee3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d1670c17681db18abf2178028c9e6ee3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1670c17681db18abf2178028c9e6ee3_JaffaCakes118.html
-
Size
1KB
-
MD5
d1670c17681db18abf2178028c9e6ee3
-
SHA1
caecdbd0349ae5f088cb0f429b17b6c5d722e7c2
-
SHA256
64beb3e2dbbc4c9cabadeb5339283d0f1e73443553f5fe73ec8432800889f962
-
SHA512
0ad063b651afb423005420f2b56a1070146aae0161c31b089e3e97eadd1803c249d44bac46ec2c0e2f21c857e780eec9db2dd4c2935966b16da73bbf4d45b230
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80f69761f800db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C201D61-6CEB-11EF-988C-4E66A3E0FBF8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431856312" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000095e90a1bee3d63f336b3771b208ccf7961b9ff32b260bde353469dbe7f802dee000000000e80000000020000200000006b42725b98edaf040f3347146599e9bc4cfc73df1cc4619e46330b376ea4f27b200000005033043efd825d52f5d8eb9f05500372c315f75b0093299e6b2ed882f3dd0926400000005ec6dae5698960f9bb363e00c598b03d826e2cdb74fa6bbb60dd417b63ff5f43abd37acfefbebf82f9a5a7447f436e53eb9c75dfa22b322923804cb9173a5da8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 iexplore.exe 2848 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2668 2848 iexplore.exe 30 PID 2848 wrote to memory of 2668 2848 iexplore.exe 30 PID 2848 wrote to memory of 2668 2848 iexplore.exe 30 PID 2848 wrote to memory of 2668 2848 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1670c17681db18abf2178028c9e6ee3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ad5e122f5a0ea91f6299b1dd2a989197
SHA17ca6c341423e4b7d0c0dc860a227ce4abeac8a94
SHA256e8dab79766024c6f26143a26686a12d7bbcfd6a63c94cd7d0ce5f6ca92fbcb94
SHA512c8d58afe13e12e9b505325375d8bd8695c2f4a2afb639104e3f395b2f1ddd728becd4d3f1a51ebdd71e134da377b298830dae2710615e58f53dc8e88ae943daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5033fd0518814c4cc2eb5118f381ec7d3
SHA1d5be5cc16b7a5fecdb9af3b01f8eed278ca650df
SHA256f4d5f44e4adfb2ac80d3d16d83179cca1f0db7c0723b7f94b4375885ad4caa4e
SHA51230945a58a0cf26f6e2337dc6a1646db764b5c7ca4e6690e02e2865c3c7ca0f79db5abbae85cbe7fd2a44d64b4b5d80912f53ee98f8e620218d41135690464a3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515dd6520ed04bdad15597c231d109574
SHA11c5c922170f0c112e50c132c36265696684b0df9
SHA2566051d250afa28ca11af3908e61380fda88ba4413b498b97eb3f743d4c7f2c044
SHA5124546d1d7a4e0a71082562b40f092f1cfc62c734bd24a9745c7aad0bae64a43b234b0c785b77d9d3aa059cab3b7ba4a583266cfb3961fc0c87f5f3385a9de2b52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562bca49eb48474ea052ee7a39f51485b
SHA118749b07b42ea163e2ddc92e046a59f141a6db94
SHA2566b94c9ac571c2d845f193322afc6185df7ce2470c93b12fad1b10b4e7af3e42d
SHA512ce8aa44e839a74cd8bc7b2803ee3ce1311b37c9f3fa09032819598b9a6559b36e707ce938ce1520ca86ab36bf93c4727f2ca7474bbc5f621e05f94f971bebc82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7a0ded27ed2a9f17b7c7968bd6b6287
SHA1d77f7ab68ad5e70d2ee19e09859b5432af11b300
SHA2565ba29ae055852c348b138db3c64cd36832dfb60336519e059bb7e22af93cad9a
SHA5126b2df2c70492055ffe4b864e361a87c6d43bc204aadec5db5f9ece661497d53ff4cffa9feedd9c04bf5cb45540750cd981433e16bc46add2a4f4b106e7b16ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bae42f0f18321cea52bb9b06a3b08525
SHA1f7eba8ea73912db3b1ee412f7efd4a15d1c93b79
SHA256ac5d2bdeb371c0b3a235eed8020cb1f2fc229b4eb1a6d95b010f1af3dc949b5c
SHA51252ebdfd5552e48341dcafd9df94c2493bea673ab8f4ba7da25196f8048fccd11a09454ac22335a04798500d9bdf836bc29b6cbaf9e132681691ad6d5daca7d28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5512490324438173bc7663619800e2433
SHA16de47e46d46340686fc73e35b6f8d96d493d0747
SHA256679d56b85fd8e8f35762771dd725f8d38fdbdb6908211839e6c47a86218c8a03
SHA512344aa7b45bded19cd9df1cb4aacace3231dea0198c08bc6aa25e402a2277c8447d6f38ee3b8ccfc00e4287f33b33b72c25bbbfbd2332c7ab67e4d02ba97f1d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b0676f78e36c6a3a9d497ef8f14ca1e
SHA12ffd733d2e2da84836f70936f7d5facddb57df28
SHA25612bdf30bf71417af8a306c5e0b7d2daa08df7052bb85e222ca5cbf6af0ac6dfb
SHA512ab230e0c8db7085ae1bf1bd3cd8af000549a9d7653c9d624d92ee223d7e7d54a929dff2e88fc3d36214f0a5d2f39e3fe9856ee2fd8cbf8f9fe2b23f778bca952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ecc7e881855671bfbab3560521466e9
SHA1eec9b0ea883ce37d9c04225214be6cb34cb0dde2
SHA256b4dbb7569946661ff46b3c7668743462ec8dee341b0b695edbbf481315aae596
SHA5126103cd0c6ac0146996e767cd737172f16e3c8e8864dde4edb1ef22fa2bc3a2c0c2b5c32ebcd9d2563b75a387b384e7497e7a3462c48a7874e87a8bbad670c096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509f64856001a990cc328148f525ce6cf
SHA1b9e67de9afb10945adc07e06af3407df8469b407
SHA256d4f2fffcb7047e9fd7cc6befd9469e1edb929adbded44605ad20f3199e065031
SHA512f92d286857ee43cfdb081d9ef854a97bca64ac4249ca089ff0df6387e74ec8c89edb860926543c0e9e45770a95e3a4ec72565edaf26c429b4282fdc6dfd2980b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577af0d2150339b523930bb192b33864d
SHA1dd40b0730fa311d5129f9a24ec62494d45e6260d
SHA256ab922f176eb5fe2409f2ac115d27a3fd1ab5fc2851f4bd7ebf922e0d817c068f
SHA512167d074b3d197198d95388ed80cedca5f4ee29b3e5e2204701211551813c94ee77decce21f66e553f6a758d72beb8ae748a5d6d106e96feb2f3c5af6f61d957a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b83f969faf7e759eb1f8bab3b14c5f8
SHA121a0104768cc9f4f0ba3b1ee248347e4f924d952
SHA25699c6a25e2a0153e898b30782f78593a4bb550f651a3ea5f47fa6910f5085b5da
SHA512f5bc206298791561c77e3a983679ecb28b3cdd1ddf0fcbc4ac6f23256cef3462ada4d68dc19ade03eedf51aaa2eec53611b5c354805faa8df81374cf14b5ec8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa28248ba7c284cd6f9b362f19be0e99
SHA154d7fa7bf78d375340a29caeece6a648eb14a2dd
SHA25676379de92538dbb28ab6dc3b5e9e0b0fe2c88fb13c8e32767f22f09859b8acae
SHA5121afb2c4d283225835cfc7221851af2e66c94b6ea12a88c4fce89dccedb4846767290e3c43ea86774b3b90de9b6245937a55efb4c7bdfe20ddd26efe132914848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7cc31fbdc1b386955019f064d1333ee
SHA17c369ffbf913189aea0d16b64efd90807622884a
SHA256c93eb8296cb9354843d1e7e19a12638908cfe0794954e957d3961a5a250ac480
SHA512afc45566aeb8a5ab7955c8daa8abd2be0a105e6a965748d97315401d6503fafed607d22e85f2648faa4c5b7720abd9e5f308f2cf5fc8c0852b49ebd717abb5e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571b85837872e2771313558265fc0f597
SHA19d985d02dcf725989c4076d9421bec939b6e543a
SHA256a09bf85fdafcb9615a88511681683406b2a61547662a64a4997cbb00c2eccbda
SHA51285bb9e44b358afbb91bcbe7b32006357e02c7947e83f755b851fa78b04e59a960009330cfb616b10a92a55b20b082b60b9a8d011f1bc290f6f988081b55f5175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a26756bc19a4d4c27dfed6282d144dc7
SHA121af9e61ed0eaa51a61740df42667e85338802f4
SHA256979bf3326cb32708e2caddd46ed6b12bb6738105e4d59732fe5144c6842c5dcc
SHA512d900b21c53919302c5584979771a514516269d3dabfeb02fa7dba0556453d00bff1d9e047325c3faf182946ad6866ceaa92bef161b1058de66f886da7986ba26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588c769d56e95d440a777cf880095dc53
SHA1e06815c4f41182b5a2a27a5edadd947710637991
SHA25662422258159f1cc44877b993f2f6b33836044022d5213fbdbb1417fe1807d31d
SHA5126318f6804068e0fb7ebe432230a6fa8cbed964e1cdf254fcc630924031f63975dd21a35fb29b1adc59631137c235415f53fe7e4a67ffb95fb255e6409e0afe42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1eef78311c5fe73af61c93cadd0b41b
SHA148ef07dd8415502e4f8e88e70b3d2dc86671f6ba
SHA25606d8d26e07da105ae81f5d2d7930cd9819d38ee957afa385b78a98aeffbe74ba
SHA5124c5690bf980470477df3e8d005c812d8274e578b14ea65c20d07194dc75506030ab9b40653f11ede11a5b5d4d7f0da2788bb4c16c797b06b48fc890da34a1394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5335d2f65c57d4cb129e946be7e373e54
SHA1e2ef172afc4d1f651c58365e93f2755299c79c61
SHA2565f0dc2796fd54a881bb6bdd926dec15c10917b8b5a78d9427a036581cedad3b9
SHA512b88ccafdaa5c2c822631260be8ea34f497e30c5005a5c0c9cfa40f97ec811d9f74628a7f81741b7fe26d2fd19b7b861aa0b325381c8bf155b26882b920ea3a9b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b