Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
d3bfdcac8abef4a1a748151f88a7e6fb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3bfdcac8abef4a1a748151f88a7e6fb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3bfdcac8abef4a1a748151f88a7e6fb_JaffaCakes118.html
-
Size
27KB
-
MD5
d3bfdcac8abef4a1a748151f88a7e6fb
-
SHA1
7edb251b79f49a9960a2eaecd2bdb3e3028150f8
-
SHA256
6f158b3b8dd1f107a017611ae7bb6ae42667c2bbdd5eac1963db14a6f20ddbf2
-
SHA512
0cc3fca22a8c0473b32ecd7d61bb84ea02856f9a92bcaefc455b80531a785ac989ea30014e977b0163c4e92ba6e17edb95e83b63cb3ff1d7a7634a1e3dc5e32b
-
SSDEEP
384:x53H8mf53H8mf53H8mKZfQR1jjPtRwQw1wvTZ:x538W538W538l21jjPfwQw1wv9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000a34cb95def961c96d98c980aa26523052bbd6f9eb36da11df692ad8ef87df836000000000e80000000020000200000005142f6645d934ea9af27e4ebdd6ce0b5b7623ca7a1be2e4395b89a36381553dd20000000ba6e70bc6132fa27aa5bfa256cf596f6c608309452fdae7635734291d59a17f640000000fc45764227dd5daf49f1357c320f38b6e610e223cc910f2cd18f973f5ec5d1c999cfea98bd6ac35035ad1de7bab1997d067a381b0f2f9cede874cbd2ee36368c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 107e9077b801db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431938801" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9ECCB611-6DAB-11EF-B12A-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2076 2692 iexplore.exe 30 PID 2692 wrote to memory of 2076 2692 iexplore.exe 30 PID 2692 wrote to memory of 2076 2692 iexplore.exe 30 PID 2692 wrote to memory of 2076 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3bfdcac8abef4a1a748151f88a7e6fb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591788626b8d6eb8868e83debb6e25480
SHA1570cb9a09baedcb535556bb7fbc1487f0c6bc74b
SHA256316d7107aeee6a50f6bb4a007cd77a3541b82f02a82581c8d5a123617f6a4306
SHA5127164987b802d4caea82fb6f8dcc1a08dc7359a286bd01d9d6cf47c313922867eb19eca986d23d68fd5198b00c308d1c2d17c1a646124fb1996100773a8c05172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5284fe4cb586fe3ed277f9ba1be37dadf
SHA1965fba0ada7524ee5a0773f2075fd4c53f57c7c2
SHA256012ca1cd35e7167c0f323f85ce6962d4d78a8cc7dcafccd9c5c901fd41349e1d
SHA5128396c982d15be5f46ba0572cd55852a0c4ea7d2327c15a9b47b5c330ad6e77b0ba4397fed0d183fe567a402875f702a8c2905b133b7c194409f452292fb091fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554ff481783d153f2b77afb685864d3ac
SHA1f249620c79754f5dc11f9896cd3c00625e96d290
SHA2560d548cc959ea7ce2f4cf1e972e364660b518e4c9a0c6ddd95552eb77863248ed
SHA512412bb40f88fb942f1859a0641d33de3cf4fbf5249b0a557a02ed50dd3a32168e6d3e02c2c2eae20341dd812539dec18bb4af15b4ee7a3b6ab3b5a6735ca400ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53042e429e9bbc08d767c39699002e776
SHA12c51450d2d506c2f08871be36b6fef879ec54a5c
SHA2566da1cefec8e0f15b060dbad03b77c4f7d3015aa2cdfd084792cca595edb7575a
SHA512104e27b2ba947fd7cb7848e749f67fa32258735865c1a00d4cf31e75d35cb853ba968ba8bbd4d55d734bf8ba107ed7174d72398cd3f7db6c04e7db18e0d2011e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0593ffe79ce4f458131c25b2d8bc33e
SHA15e86adb05e4cf3e1f9245ded2b508ed7e9e1644f
SHA2569d408ca651be7da4ef8dfe0191b82877a3afcb3c1ae304eaf0506ba8abff8f62
SHA512eb9edff01f9a2313471b62dba6ffff980d7657ce57324afff95c296f298aa45d3d1fe8d79fecfb9ac6d1dc2f0174ce19391a4645805b80a73ac7a9dcff5da938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c6f17ed0e871b51d1838071386102fb
SHA1619da3c96dffce00dd2a6cf1d71006d998806900
SHA2562ebd03160e5bb9fea47f8119211eae4ab1ce18362a72a251e8c32eb86d1f722f
SHA51239428b148c8ed99e2e14b9cec94892693e1fa9751f46f7e2b7fc4e69df64a880f016130311900e86b7b2ba10005a4242135c5de63a274fb67c9d6b12b57d343a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5790a3ac4088d57943d2971b62bda342d
SHA11c3cfbf51b074ffdf4c149940a31a53b2284cae3
SHA256c3742a7065d7956d4732e9ab9cd18ef36025d45078ae11ce430ae6e1331a8659
SHA51231eac5b6498d4118783a7e4ef3f6f3e5017b76f23bd1cb86f587248f4cc2cd492b12e1549272adad58438dd1bb9102500ba0cc24d3f2b9f54b0d50c21c413b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52474cab1d5c4576b35c505c584c2795a
SHA18e23955aeac2b19607e196c5f21df0e8ba5b7f33
SHA256462cd3c4e092f497c97e26746fc7d96743c4ef0b7c40680dc01d7bd90ec8ea2e
SHA5123c34b47d4a6491630278c9194eb21866a0cd9186c11a25edc5e3a79626439ba11742fba24eb62de74c072b54c0473db4df9d69a47adc75cad4af851d19c2e072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d26442e4cad48f7aea61a515ff0d5598
SHA1756f53b3357eb5c241afe21c1b0d01d3c5ef888d
SHA2561e55f22cf75dec3feec9283c1b314a3f149a67adb11c99bd739167aff883d436
SHA512f5db4615b80138ab767a3ba5d1cc7aedc1c042d311272cdf2a0c4feec35efb8cd538005671009e967515d70ffe2afa17595e2bb4bbad699de47b2f9eff4527b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505df1225d8fc6bd9cedaa21da87f7892
SHA1df50e6599e32cd37d0714e81262fa76c3e7e4faf
SHA256aa0ec1f1fb22a0051f4291a32681d503d46ffdf068f22603e8c779882f0f1ce7
SHA512e978f374a57d720cf66325f03ba68b4866d96d00b8415a405fa8e877597dfffbe2da2f35017979d39112f6318dbc36a92107afde0ea6017aa9eb0c69cd0eaf4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5689faf98f61bf72c1c6bf7879ee96d59
SHA136810b5175e1ead815658dcdb45182775b643dd7
SHA25623a0a735b2116cd4fb59673b95f01420c1ec4509c72a7dc265d7f479c958bceb
SHA512630f95506a175e712eba63eca1b97f3750afaccf9ed2f3564fe6b902be63b1682928069181097552d715d05f7d1b048f8f5097ee31d36bcc8d12c773e491a984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b71c2effb41f1f1d16abccd4c6ed0070
SHA1f5bcd574494b0a2d3243b65d6ee6d916ad5f5ce1
SHA25693dd9611fa4b3f37a4d65c8a91801d8c098d0c8d16e571de565db83c173f7223
SHA512f501f3603f2e87a79ad0a414706ba5d20e50de37076f2afc101fa17696f1a70e3404be94205803328bc67bd3d3df315a95df25824c43eba4f4c941928a84da12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe8eecb59661e081679e1fa4f3ef3f4b
SHA17eb6a2313454dbfe32b04482a0de7095af3f7934
SHA256894ab7e9343b60af65820219f953f633904eb85a7ba6a4d72dd7aa096b50719d
SHA5120d25be0cc69169fabb7e3c0a7ef2c8b1ac47c6c0e9142bc24c0f97a57a5cf8ed53b6f69562f0dc2d0de8915787af4a44bd5d1aaf007f78173fcc342b71f02414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6fecb71fc025426d238a7fabc4d06ed
SHA18d76548edcd8a0ff3d148e913d8a96263b2bca5d
SHA256e53f0b3fac3c1a5f5c99ca6e8661c590185fe0e1410be0b1a380cdcafd487dd6
SHA512040d412041a42b839dfad796338975b9984241f1e0c8a716ea47769da55290c506ec6ffdb97df52f1ff06fd1f33f7f34966f1c2fab341245e3eb6a2c278a055c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba93dc87180933803fcb90bac71f89e3
SHA18896000bd05054fe93790251bc8579c742175bdc
SHA256270f159868e9fce043a171535e8935d35a90ba472c1022f52e0df82f9afb4aa8
SHA512764ad940cb4ea3647c9043d293cefeed72657e9432d26b4351384dfd76052aec72d510b245a293a809c3290818a6ff4e631a9bcd436b79a600c1f7c00df3a64d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b09ffd7adf4227ee752f3521f0d71f3
SHA131663360d01163bd43e009561673910cbe8959df
SHA256e00bce571680f2a55ae832eee248d732dd8bde8fa3a67be32f473b6b807d3fba
SHA512cf29370217253c593f92caab81294a6ee32453ffd359e85d1a0e550bcfff884be7ef91c951c4b7c09276bb583baa6f88e1911041102285dc2641731bc7898f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5366175f127a7c51f15ee36ef1da11307
SHA19585c6e1b45f97e8b6d457c098ea1ec3b7e3be78
SHA2561d8a023750a036378d44532d452d4c783b033e645deb171e540751d690351956
SHA5124cc7416fff6a3ae1ffce9d0405c3ea61331bac0ddfa84b659608876a847e8fd05bb0be5a12affcd736044510a1b93cc82001790265b767d71b85a973cefe831f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55966995353bdeeb029f49037dde30b52
SHA1cd0483a749f1d9043ed02fe4d80864c6768ee166
SHA256f6b3c57d6aa010254827075a33be178a73c5eff7f183d10606e6ccc280ee227c
SHA5127fd2531f3ccb2e73d5e69df87c0d9d2143f1c41a11005bf703de8df97d0b511609614f2936d849e51cf3f8b404524d57e35487dee6eb709f354ef2402254cd12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d877abe4ecbb443f37f2ff9f20a36fe
SHA1ed9108184f9002c8d059844400554c4730c207e3
SHA25639d9a1d32440136b3350f5691e0c2b6e4f4611d54fa86295de2c728b7f168779
SHA51270f17ab319ece70a0d165a47881336e3b5e2fb02b258796af2eff287516e1700358df8961ac75cb9e5e86e439bf320fe5dba6e6203152887c7171aee3d7d3568
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b