Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
d2a4e44b63617197eb9bb48479b0b1c9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2a4e44b63617197eb9bb48479b0b1c9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2a4e44b63617197eb9bb48479b0b1c9_JaffaCakes118.html
-
Size
27KB
-
MD5
d2a4e44b63617197eb9bb48479b0b1c9
-
SHA1
627cd0af0d3ccc30aea49720c2222a2763d27068
-
SHA256
1f389e1e614e57ae456efa5877e0a6e7496bc25bd49bd4f78df5d760aa709e21
-
SHA512
ee6abfc56b4dbf2522d2546a8c253a15b49a095f70cd85c0e097a36352703cb5024de3e84cde72a7f1c3214ed3c34d8f2522b4a967c25b7c46a0a9a27d4b10dc
-
SSDEEP
384:x53H8mf53H8mf53H8mKZfQ/yjrPtMwpw0wLTZ:x538W538W538lcyjrPCwpw0wL9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000f8fabd99dad7b0387d3a4e383ecb1efb50714cbcf6d70482877a731efeacd1bd000000000e8000000002000020000000688b709ddd5b9127fc0c6aab6022e189f3517de44b51e8ba02cac3f29dab8922200000004abd9e534cd9c78f7ce378b8182cb39b3c644a5842acfdcf8b42b566905a8e6840000000011b28375a7a70b413855090017d65dd6d12f9b2e54b8ef657ba67e514de2a1d53faa81a6814d01fcf54082c6b804ceeed64d09adef745867a104247915dbac2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431898053" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE8286B1-6D4C-11EF-A540-C28ADB222BBA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 403746975901db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2112 2380 iexplore.exe 30 PID 2380 wrote to memory of 2112 2380 iexplore.exe 30 PID 2380 wrote to memory of 2112 2380 iexplore.exe 30 PID 2380 wrote to memory of 2112 2380 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2a4e44b63617197eb9bb48479b0b1c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd36fb370443c1dcce93fc005500fef
SHA173d61d920c3f2bdc43cc5b638eca50c14323bc0e
SHA2564f19e28a0b5477350aee73fc49c346ed8e041450a0876fad3bc719b212c0ad11
SHA512fa9e50e717314ef1b8e0e7f92473a50c9ba0ee746666395d8c81b355b8d6e176bfbd39391a502d0a0b8425ef1a45833d7a8656da77a41d5cc0ba3ddf2ac4596f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591fb052322476d5ee2f9e562989eb718
SHA1f39d5533e873b07d007aa4de2e1d6a9de73644a9
SHA256ed9d1c4fed9225bd9c127a70d8ad2c4f78055391d55fe2b63bd1bb141f01b221
SHA51215f96ad794fd9d6f00e50ee2d2fc65ea3caaa41c8966c617d6c22969bc4e16d23a829400d25c2e76b128770328ff0707f9eccc42f4248589ddf2d5e634e08b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1d781dd9661fc6df26654e64df1530c
SHA1bd24095ae84c740efe84adb7d027cfb6a89fd633
SHA2560fb96703f01092ae85a402968b41eb8634e9245e6fd52a22f68a7ff4a4a22d3d
SHA512ac9160f0fb9b6eac881b0055d9452561648028ea2b916a63aba1a1118d701bac074ef3671867f4db697049285150020bac5471e2ac86a9e1ecfb3bd62007ad7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c29b924e14dd12d31f638c962989792c
SHA13edcc08f69889303066f6e831ab2ac3a600f9e4d
SHA256c20ba952928705649fbfedd288b35b6e0012c77fd0b3af982431f5ed4d190536
SHA512983c9d1cb8481b754d1b2ba14fbdd15143a67dc2f3d83dc81a87313eb81af80dbb65302e712e50cdadb664bbd40412ace09f023b09cb53cf9389c7fb724aa720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec2a66336941a1c57f577fe68c8c01f1
SHA1f8dff57e7fb0875137103b61e76da764e549cd19
SHA25680a263338763513a74ffec715340749763001665d5ced0821aea69b48ae76ba3
SHA51281463aecc8b01ea5af569f07df222ac9765905db3cee6c4b3488533bea66573e6aa70eb77cde5e6e1f6464927e776f0ae0553b4dc35056b80a7c38522d05a4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1323192bfaa6d43359575c68a782f0a
SHA1fb17395075a1cee871dba695684281cc7807c155
SHA25666413fa8b5fb3e3b7d076e68d6229868c00a6a4db6c70e4826b53d006cbed870
SHA512b30e4ec2170c6efc134a8c130b8366acaf16519c4bce9b5b09e6da159fd7d2c8685c3d11208070d77bf223ba5bd84b836895c0c3613adcbfcd7d564059de7504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523dc45dc2555536f33115362e352a643
SHA128e6b2b3840a2ec1f3478213279fd997cf73f328
SHA256c6dadf53177817d0add7526e3aa79d7b72283889457f1040d7cef045a3b9e51a
SHA51210daddd38642704aae6b28ccb11dbbb304ca97af2b6098898606df4a7754dae9973fae221662dd84666dc466314604beafafbf216e3f1bfa5793fb952e031902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523986c90e486e858afd7f673b54b77da
SHA1c838564ee70602b204905b0c3b9e2ac8ebc2be4a
SHA256a756d36bf6fa3a55b8e09edb576539fce126d6c2d296c10b43a9244058d22f7b
SHA512c26cdede30a00243059c2b1f23343d5bf815abe11757073cee6e612e772df6ea7917b58e3bdbe8051580ac2fc3911226be73e9a5d0f3f376438fd242a8fd7b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532ac853b7e6622ae8b821dda8b5c1bef
SHA1c182132082678c90c943670ef1046675870f0432
SHA25615b49beebc8449b6f3b1dbac31b0dd6a104351de4cd97e1867b0f25b59c71d34
SHA512c12c671921814d04a937605b2966c8efc540016a4f0fc49d4da9cae1118cd5729aa6c5ba1e0b3ee47f39a3df833cf189f3014f2d740d59e192fca7e39f88ca6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac583ffc6784863bb7bf5dbaa3e124a4
SHA17e4d82dbf044efbcb6094537803237df1bcd3ccd
SHA2567f368d1ac9d233bc6b518c6ae5937e8ffb3da74fdddeed1a5ec2fcfdf3fef02e
SHA51262fa597bb3d370898df195db4d1c9348936a49d4524caef19ca0042a1929fbfac66d7436560377e7b7e3da9a4af3347cca845bbe5c8f4facfe16f5cfa648a10f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ef90f002e14999a3af1530f02816655
SHA1633dc3ec031c1e1127c3a7028c525a7f8c0222e8
SHA256ce094efdb2731d4e45714508c1eab34af5da4e051054547e0761d8ba4755b3ce
SHA51234baaa9184ffdfc62f70fbb4e2316b5c83ec1592a2b9ed604eae15f3cd030f80608564eaf7858126ca05ba53c6b1ade8d5d5873cabc3f9ad246aa0ea3cbae666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e32e24d771c7acdf81b32c27d330fd1
SHA1fdf38da3f4e251bc4998957126c64658f9e918f6
SHA2567d8a6c5e0c5fde88d8511eb8fae0b486b0b06d7f3576e1e7ac6dd139b6d652e5
SHA51270d7d3b0df01d401f2cf2c1e032138d2a50fb20672f56ec4fcf67757e566368f8b4ff45db59d80a8adf9409f8e57d99909aede6a1824337680d723a05b1d94da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b665ca1e31bf9f6aaea4eb72cc299a8b
SHA1a7b05a42a1fc4961b844d18dd2329b31cf09ab11
SHA2565d403617cad2f20c1f2a03b33f98abbd16d26b5edacd6c1b48a07bda8cfee89f
SHA512076bedd46feea6dfbecd6fb094cdb0e9dba2ee85e890ca06d38b2b82d1f87ebbfbee6cc70945496b8d35291e2b2a23594753cfeece814c4cb012f126c307fdad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b81d5ff2f1faf70350ff8cca2f7331d7
SHA11f8821186806a25871ef9b7bb7c80fdc6da0122f
SHA256866479485640765759566156ee7c471f889cd3a0808ec06f7011b5fa136ca45c
SHA51249817e0755f2844afa6633fe2e4f7cf5a0ececb91070f9a141c850c6e288f26ca69b15ab0d9273d1065655fb1ed25a1c8b43f8b652b1f4b1c61aa32f44149917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fdc858db5bdb6bc03a46aede4409299
SHA1ba91598bb49b01663e3956d031e4310758c0908b
SHA2568a3b9dc31a66b47208605112f3712acce0eb5cc671614393474f36d0b0a8e924
SHA51269e861395a78e6a8c4137e7cbb68335a46e1fe0a431ae53bbe8466974865b3ef250e46b5b8998f0e946cf7b850d0a30bf574711b06d37e98e9b7294e913655b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4cde2723b7834cd442b58ecadf71782
SHA1e6f1d820642b16a22ffe27b798aa7ab4a90936c7
SHA25624063e031739a49e1ddf0f219e6224dc759a701d2b696779be47d285aff645ea
SHA512e9db5cb69a6d99d40694ecd2eee535fd7bc8a03eb66e1d3f630207e06ed7f8a84b7a5a9fc3210644463795cced3486b1185b0d6e2ae1de2742c615619b45336b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dea2aea4bc24ce45926c671a57ea313a
SHA12949cc8773f03268adc602f3239e4e8c750e20d3
SHA256ad0f03ab1549636af30f4aa0e3157cd923cb09c4ebdab0d848f855fdb4b958ce
SHA512b427605f33ada05ea055fed8690e4efbaa15c302f01d165794ed52b587794ae003dce67d3281cbd6acaa5f0b74de97238377246abe33d71eb9636b18dfd7ada9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee3dff2fd977db9ef799e0ed4c137691
SHA199eec40922d7fd17a25b4a16a02fd119a0b9165f
SHA25620bcf6cb372549d820130a689d7380e74c4cf4803497c760d0dacd6a60a2b7f3
SHA512e0f0c22b58c529777b78fabd7c8f94d2d4e262b513ed944184a0138da618a5835e2e7297af10afbe12c6e6bcf0b71b5ff52492a8f395e6971b1d59b70521f286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a372bdefe03823c0d2a1414e6c8f1be7
SHA175333998db9cb12197e70b6da2d86fbd11ba4c54
SHA2563f8f4d70c6c2e16cdf2b3d3636e869d21529c71f017388fb2055ab977325e5ea
SHA5127cbc35f332bf8c7eb5c4caff6c1cb9d61c1e030d729983e1afe9985cc3f3e87bd1e2fb0d446136d4af53d7a5800ccc7fb9654ea8ab363f4dc9a76e3061a5ae74
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b