Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
d53b24221688913a480d3fd3017f7f6c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d53b24221688913a480d3fd3017f7f6c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d53b24221688913a480d3fd3017f7f6c_JaffaCakes118.html
-
Size
461KB
-
MD5
d53b24221688913a480d3fd3017f7f6c
-
SHA1
3b44858ef3994b43e72ef7e3db7204ff2add1dec
-
SHA256
ab12e8a9af8653dc064cdbde466fefaddfeb3b4c968d80b177c5ab89863ae49a
-
SHA512
50f92ce40c81987210484d935ff632216f5bf22f83d43057ef9ffbe98adea53fdcce34b2c29f76f49642b1066bce73caa800fb3c3f0af9176acceb42dc1d046b
-
SSDEEP
6144:S7sMYod+X3oI+YOQJsMYod+X3oI+YwsMYod+X3oI+YLsMYod+X3oI+YQ:E5d+X395d+X385d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00e134794102db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000008deba5056d3166a1f6fa874462a6c9152790d338099155e579f8f7b9725bde79000000000e8000000002000020000000ce2a8312c15bc8052e7482ac9d7f62f40035126d4c25361b78cbebf648db627120000000620d000cf0cd463697f1815b7daca189834a7a55468bc5abe2253a236d12c7c9400000003483da0151f7b2841911fc9e2450a703a637a26a9f2e449eb0e2a818909002d92c3a5b5c54fcf900947824e400dae81c93aa667c96f8baf3dd6efe1884ee85c7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431997653" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A4243DC1-6E34-11EF-9112-4E15D54E5731} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2596 2844 iexplore.exe 30 PID 2844 wrote to memory of 2596 2844 iexplore.exe 30 PID 2844 wrote to memory of 2596 2844 iexplore.exe 30 PID 2844 wrote to memory of 2596 2844 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d53b24221688913a480d3fd3017f7f6c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceb0e9ef45b17e21986552b228e988e2
SHA147aba3755c90084f43ac10a9ed998a40fec7fdf9
SHA256ebbc33a71a2f1ba40cb67a40c0237586ca77d2e23906af125354de765afcd432
SHA512da576e793e756bea21521214ab96a33cd5cf733b47f0c3b6a10f0475b8f6b35174a454ce20a8a29ffe35cb4f1ced9e13443a87150eed3c626428ba1e1d350440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a6e57f7f5fb48b6c8037cef253274e2
SHA13cb0f40641e394d36dfccdcec9a61ebcf22474fc
SHA2567868448d20885f3ba8c889b1edfa99f348443fa51323b73f1863ae9e5daba1f3
SHA51238a4fa5a65736a8417fe552ca4484731fa116f6b7e0220d4fa61173f94d08f8a4c9f1f1154cb5ca255900471215cb0a95d12a5958292109d249780006f85d349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b8b33089683d32b9ab0420ea67c48f3
SHA142fbaffc769874375bb56745a5c3fe860908caf5
SHA2560ae934d27515f0d9e1ff902db10f26ef852aa81b1b3ee3ece5ba272bc40422d7
SHA51284835e228757bf7fb91c1b01d2f966c6677888d1de710fa86b7ac742e33e1849ba81db8b2c190287476554c0257b03637e0f56537263b437937addb0f3312c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bd79c4f4c8fc679eb85f062d539dcbe
SHA18d620186be8eac622a6988c78ed2a2922e490c85
SHA25611cb538879570e928f555b9cac19cf3c4de927aa75fb74eaed07cab4ed314941
SHA5129385a2a207d9399e5e1270c7ae73fcd65e54db9cf15c74022f27695c91003612922ff13b85e8dc81b73f037dd647092aedb1c50d3416c8372be1fee99144e223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551f2fe8bdcad36aa8ee461c9c071f137
SHA1f8bea804b5156d11f843480e3b7417a5651e66c6
SHA25663b0edaf103a2830edc871f00f91fd5cbe4d104621fb5e1044c74c7d49ad7fd4
SHA51289d187330d776de0b23befdffea89177b4ba47f102f5747cea64fa03b092246d3a3baf2a8a8bc4b685076cb07d6fbeceda0bdabfcf99eaeda0f87db8d913981b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5520e937706611fbd81e2cc55ed734be7
SHA1e7aa011fa4f86af6b5f969bc26d228fdff5b357b
SHA25623e0b8f4e9400f8992081624146d24cdbf15e7f4c3a7caabfe70174731becc7a
SHA51218a972c497905a090542674cfb9f3798cdc2d4adefecb42af3bb3d18ffcc5c717c98c4d278075d45c6b6616bc73dd025d72277bc2da11cb76b4b8b2c41ccc225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527f2e7f652ff2aeb806fa0b4dd3f0352
SHA11882ecf706c1c34249bde24404fc24fc6939f5a5
SHA256ea13045d80751a98470c5718acd620899c29740968b99712ef72f21f3762ede3
SHA5129d300c4cdc1166b0f35627f9a99b2d40d1746ef756fe681ed37c1cfabf8698df4232df61ce50ab27278d192969410aad09ca14bbc98ab353328856c8cc0c488a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c89d5fd28cadda7710095d75363e229
SHA1f976b88cd5edb84e1e4182dd3724a48902ca26ac
SHA25616790f54beb7d52a07219f2445e0983317055ab1fa19b59ff9c5f4f15dceb0da
SHA5120b55ba407de1c5bb36dcd6837aaef536fe4be1bb4ff0fbd61f65fd88be3f431cf23ee56843be6f7271186801a1a7085862e03d105765d1251fdce15f30dfbabb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5555b76fe8b14601a2bcd1d9cc6a26b2c
SHA16f4ebf784e3638adb27584f7ccd513c80fff7bae
SHA25626e982850a6a703aba191986188d64a131bbee5411287a2d54d124a12b05f21f
SHA5125c7b81889bf57ec8ae05e2618a71046cbb564e359ba603d8fa615d8dd33175bfe4870bdea38b4a9ad189c5fa8394e3c06b4d5516caaa85ea0d30b78aba2c6026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5782da45d1c8031d9b65e9cd5bd6eaebd
SHA1c11408af6652ccf121ba537c1a83b19ab5f365ab
SHA256502908c19be1a308cef749a5a7e76eeca4f818a3653bfadd42ceffc86df2a374
SHA5122d9965c41de242f7ad68d03dc5f79319fb748c283af8934393462f1d3d3c6435cddbd8c832a7dfbf05479fced32b5a516b8a641346d07a00057337cef024f96c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3dab23a338bd85d12ef872a5e0bb53b
SHA1afc5d99b3ef90542175e1387df33a1c659fca7b2
SHA2566ed262b10c8510172ccf4c92567d97b4fe262b6d7a729dab59dc31e1353880b5
SHA51248e32156d039b00f291f182326ab4537ac1274e0c0c02f0a31cf85ca5977b64967db906aeac838e1cf9c6f08e764861a722cc0bf85d395fdaf44b2f33e9d9dca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e19422283d47baeed695b7ec5347dc27
SHA18ca25b72f4771b9e142c13711752c2ed60359cbc
SHA256431bc79446152dfee0afa8662777425600c111dac9064be90f581125d966e13e
SHA51255cca69237f208150818e88953d5c24e379b71df61a9da2952e9ca3e2cdb3084ac5e409bba95f5dc98a8013ea1c8aadf824ef5285f428d5ba31e18a1bd1d1a93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517647bafcd9f33a8d34b3d0ded4729d7
SHA145d39f030d2c2c381155f3ddbfad8439f9849dd2
SHA25690b72992a4f2f701ce63d08ed5f3483f39701251d61e1d7f7ada7770eed1c5b9
SHA512d500e634e7d40a77b966be2f109b22c9d1203492764d75953e4bd5c8567186c1a92ee13e61e2d510f9f73e0d2bad8acf7782a4ab1b47d81ac40490917223cd0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5845197ffe9cbf49a91172eaca44d1998
SHA155105663c3d74499905534e87b43db2600051546
SHA256c446ceb92788d260e0f36b6eaa4074d3ef8e6a0d2101163d39205ca6e9f2b6d4
SHA512cee5a6ccf5a138d0cb6f3b0e21a176b265ec65ac4bfece34b0070172843a0ad1c029db08a715158f2739db291860ce0d7c24554787064f312802ad33ec6b7680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d953750514ce8fa34b8d9f871cd7d3e
SHA1fc68ddafa637076567f38cbed110974928e878df
SHA25672745254f73545233f88923913aff88b769ed1256fb4537c75c7566763718808
SHA512e2e114a937f438ef9589756452471cb05f301ad9c077eec3c0e3e6012a7310d05335cf8e37c64e2e268edc386c3f660287189fbe23144d01f77faf4fa3b53eb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550405e9640c688998388685568b69157
SHA1407f98c9abdc57fe3a7b7dd25d53470165dd6934
SHA25679ca33665f8cadfabd17ca2f10cc2088b1ddd67556a0c8cf85e1b8cffd6c260c
SHA51244c61b2fa7b70c86a81815e9d006378dc7155b1cf167715d379a0908563403ae56a8b395cea51c9f1c18e7f52acaa4b3ca0073d021370b9599bf0c4dde636483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56da629bd13d201712336fdab413401c2
SHA11330597f5ffe6a61ec78afd13bcea93e58430342
SHA2566b99a004a2ab2747a8043ff0364369ca497d501dc17171464ba557ec2ff5a68d
SHA5126371931655f0faa4bafb5026c4da7433e20cb7c80fb11a60a5d28d1d557cc866214f6f43785a3979f776ee7eeb41a210302870f4f0ede1dd63e840d694e03e9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9893c0c1aa17e2350e013b7812bec2c
SHA1f0a901ef201f085c34556c6bb78ae69064e1d09d
SHA25632535854ed1171b9d7698528f45cd83daedcb5d5f5c7c4b97af587c3b84001c7
SHA5123e30346a82f2228fb205da914eac0f5bc78ca26acaf100395b4fff0f3a2e5f630f9cbc34335b680e8aec7e6ed7c55720d2fe01c15c3f3c82e2f3367d67bc093d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d2607367b9b349cc455ba3f9a435b29
SHA18dc485303672db74c303ecb0b32c764c9256ea5d
SHA256ec74d42a937ce7e3c89a4b5e57d37c90207294a8cc886129cdcfbef64a85a7ef
SHA5127c7462006857256edba3b4d195d172a78879c3351fe6533d7928275a0658b1c63ba28313ad3d1682b0c32e0bb7635c44444a45f492cc9912b5ca04413a5cd459
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b