Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
d1f8eff6ffd0ba07615392002f994975_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1f8eff6ffd0ba07615392002f994975_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1f8eff6ffd0ba07615392002f994975_JaffaCakes118.html
-
Size
5KB
-
MD5
d1f8eff6ffd0ba07615392002f994975
-
SHA1
2427cbb5a136a736a9e493287327b2c1b32d518a
-
SHA256
d41ad52077743416160e62f4226995f2af5e97acd66d9ef36e832802f81a54d7
-
SHA512
df710426116ea2e88b94922595df73d351a6c83113f7c21429e4102f71ee57375046323649b018788357f0c4df23bb12e3b979cb471aecdc28eab2db60e814ff
-
SSDEEP
96:SLCQbs6irrR9uTFnW0Pn130WtC3dzVPhnRgB:SLCi3irrSTFWo0BnW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3091608d2701db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000007a57ea7a80492f46e9f174c8f646dd219191332285a9198ed90784d9fa3f1e6f000000000e8000000002000020000000f7ce56e133c79ed77f7be794efd1a97b94668ce82344f11fa85ae500d1b334a92000000089c57a882b0860da01e80d23aad714440975b8c8e0369bbe1636a8102878b6f74000000059a81e6c6d718702c7008a4c45f1dbc801252409fdaa7dc53f081bb344c4858293b0c0d578fa261702e3a75e0ec8c52d9de70c9686a52032c3d3c85151f0ff1e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431876571" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B7362151-6D1A-11EF-91A4-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2796 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2796 iexplore.exe 2796 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2796 wrote to memory of 2808 2796 iexplore.exe 30 PID 2796 wrote to memory of 2808 2796 iexplore.exe 30 PID 2796 wrote to memory of 2808 2796 iexplore.exe 30 PID 2796 wrote to memory of 2808 2796 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1f8eff6ffd0ba07615392002f994975_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2796 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce2e65781e184a195df89c312b15cdfd
SHA1bd445b16a404c9087a7f75836b37b3ad97578878
SHA2564bac6874bbcf97259f0eb5983e5151d877a87a8380a1eaa6ddd27d42d0bb4662
SHA51271b045055d03f7ecc46d3d5fdbce09e7296ed5ce294720ea2b055f69579fd70787011c073cf57d8fe09aed5ec09b176c46f6d6d513a2617042a70216223c1973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5860277314a28add3108e6d9d04f144db
SHA1b7a21da8cfd7bc2eb8c6d6499f32ebec05e766ea
SHA256a2b8041b6acf57bb46a0c62f15baa8659ca195b4cf2eafa975a6a349d2716763
SHA5123ad0c2aa44cbf8cf6268b83bfb96d62e94f7bd70478ebf23732c967f0974bc2c3cc26da0e2f51a36cf2391be607260fc75c65076c2ac1948251b8c614d1278bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5507850a86b272544ceb569ecd9386310
SHA18577040eecfe8eeea18bbc13b3a977747deac10e
SHA25620e2703926d5d2dca3bb06cc437eb6efb4ac5e48826354ca3b72e1d4b17cbe98
SHA512d2fcb457869e027a45cb8b02873ee6b0bd263f5f631938250a576a241f03dc388f7e88b54c05774c41f6d2f03f2d5d7fb8a75c34890e70b542f2b745915d3fe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd10ab93b04deae85840c680df70e544
SHA1d97ce9bd3ea248575090e8ef2e72b8b638fd5978
SHA256bb39afeb22c9381e65910f0ec235780aa4cdb7bee405a4ea7a46f496c4f17f8f
SHA5127fcb49c9843c238d46e70c9ef2c27ae956495b3cffdf4f807fb5930eace6fa8a52027c3f4fa55ee48758c6bdc188af4d2641843453a7645ad981232d3af46a5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54053504f66dbeeae2e637aaba3815a78
SHA16f533176cd99f3c69a9ccd91fd59131435621fa7
SHA256d9b210bc5f6d10bf9c3b3e0e5f78f537af808ddd0ea5511982b415e54a80fbd4
SHA512fd24e034d003999b6f7e5bbce94930246549abe9e630105b1cec66a111ce3ed635f21582181c5cde0bc2613b54de6071d7365aff7f81ebd069877e5eb278bd5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2af47635209ecaa333f595653a6e46b
SHA129261c35be814b09dd4502d91897e5857052bde2
SHA25695361719ed513b60e1ce1c80db1f0cd87ec5cf5425465788d25769ef94409547
SHA512834c90e282a0ca0c85b1104322f673127ba37d77456eb5b0366767b943c700c2ed759cb2b0f23b644fee83a766c87a7bc519187a27ec38ded609773664f67cf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4a69e5db211da4865a1481904959ba2
SHA1b829ad5268ddf72713ba3551f9c80322541b9f0f
SHA256941ad4d13347214df19f0a8ecb934e1937644dc7721475326c8cda93cd87842e
SHA5121320ab5a164b0b6dfdcb1ec2af984af72d069d644afae67a3f2a74f696a77d43a961322d2c7fdfe7ae5dcf2cf55c9c2dfb2b8d84e4268ad67448948290968247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de515b8cc279353d403fc18888eb194d
SHA129390ae644be5837d1df6451161d6af8f3cffd27
SHA256d56673638a6282dca1159efea6ea0b7d7936baae97407dd3595edd45b7962f67
SHA512fa93df2388cf57ee41d31e91fa54e0f89b44b3806f599f011c64d96fcb7be13880f215e381ec37aeb1938633c9061a6df31fc3790aa094727f2e32f52becf721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ae8d5d77001c23e6aaf230798722ca6
SHA12a8a3f2f67d6d5f82a9a3a49bfce48d35f7fc1d9
SHA256e0c4de0c731b15e198598164cbb440a48a9c769f9cd8f2715714d4c663d652df
SHA512241ddb3d588b3f706342dafd3171140a8fef41a021c9cac8cf5ad969ab47648fb039988ec89c4e92b8065b4b826b19db6e10a3e40216d944a1884e3411fe7031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584b67394bb1a61e2ad96d10366f8c8e4
SHA1a1a6cdafe5519c71d51e3bd569750e5b27336fe5
SHA25631fdf017ec2d0f0a4d7d9f2b67a5cd6aafdd5456cae8d4bd18f83b4fb5808733
SHA51248486054b736fd80332e6574930cfaa78b773bcc07906879ea84cdff19dce37d6bd150943d87830e9ea845dd9d1da1d2cd3add06b229c1a6319449f1a48823e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1f058f5f7a8d36228a79b84b27c9f32
SHA105d1d9fa85e410029441037cf7fab173a86d118b
SHA256e274da5b9aef87faf289d2b33d87be1598a81f4fbf0a60ef06509929b278a328
SHA51252f3ebe55931eee08458553077f23a56324ddd824aa6ad449dac5f0a6059f84e6e5a397f05467c3af4dc2e4424da98c78df7b8d173b552f84c057a54fc452172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d49ba4224011a7377db640fbe2fac6bb
SHA11f9ef16d2b43bea88a08506d6f6f655a3fc4cb88
SHA2564875e32409a01424c8e44053fbdd108af48cf4fea1da532349fd834553d562e4
SHA512f990aa7577c7d0c6641c20c482da15ee95fbf479b67ffa502241fa36a94e13100b92891b90d1293951a51194ea0824e79806f41ff12065f8017fc941e27b4d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5340c209899ecf74f54e73285f74e0fac
SHA1b16c4b287825e8da44189d0256e70972e280ff0d
SHA25684c6100bb95d6c8f274cdbc7701aae56805fa8bcec9d1726d2fbb91dde222ffa
SHA512d602ee34e0a1cc69bec6e9eaeda9c188c8ab9114f6b4746cd0c1e4e34d8ebc4938b7d3742c487fd204d95192cff4fa94f4ed95cc1482079619f3915927953b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597a455034da04cc4ac042b7c24424e87
SHA130d0d2eb11ed5f4b380ec1ae1cf151164653def8
SHA25682f7ea9cbc49b80e54f8be93009b23d1841b5b0d627eb914664673ea386e59d1
SHA512485404585ee7f908c5a1d7ccc2a930586407e10692d737e03464ddd0c0bd9dfdc9a57b81af79c8626ba83808392d331d968e123089feda275106dccd394f4ee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585fa61b598ab55fe7677b620be167206
SHA162151870a553dc342d9aa77d0deeade81668938c
SHA25691ec2d154a63ffda324b00bab91049f05eaa73fd1487c72a0b9b2761b1a7c0b3
SHA512437d8587b6aa096c0de437c46154e3fc2b0d6e7d72d17c4e17d8678f8141a7cf64e108232f13d3bbe2fff453eed9c40df6396be6880b71180fd920a8cdbfccb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5253d6121660aed96c34d635e2d69dd54
SHA1635d2f7bb9e86dc321de8ee2717ec92843a85204
SHA2566db066058b78ec62e3c19fc7c7241992cb071ace3040a3fd522288eb09c3337b
SHA51270805b6a3175fc31855c32c4bf53188908ad48f1914318e94c112f328654a612ada737f7bce95d09ac4b2d3006d5d2f452ff6342a4cfb329c538f275ff7547ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57481f55f62b618cfb8a80212ff5d36ac
SHA1f7efcda23ab3fdde904b04c9c7976e2870cab7e0
SHA256f63297c5b6e1c74af2126e036e4ec47953ba6f9aa8eabcd1efaabbd10652c2ff
SHA512bf5e7200305fdf655eae1ac0122e27f173b796d0fd01607fdba97613fc7e305b10992ee02b149c4b52e8f40597951b325d9dd1679266327174d32a9054d3b2b7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b