Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
d463359ebae279e220ca3e171b9cbd02_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d463359ebae279e220ca3e171b9cbd02_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d463359ebae279e220ca3e171b9cbd02_JaffaCakes118.html
-
Size
31KB
-
MD5
d463359ebae279e220ca3e171b9cbd02
-
SHA1
d7ed6edffe282930fe8f83364cfeea695d14bc79
-
SHA256
ad353503e40c623f056a3843d2f18731de25ab41c5e1fe0cddfc5e0956de8c0b
-
SHA512
562215b908df7d0f0f38c2dcd96ab62333b8c0a491d7b03fd79583a951d4618c3ad15d3616a32b54d619a75e44e4fc0abccaa8cf6be489b9638166de8869286a
-
SSDEEP
192:VWCk3GDG7GSFGNGeWqGUpGtqhybib5nsanQjxn5Q/TnQie6NnynQOkEntdxnQTbC:ACk3GDG7GaGNG9qG8GtVQ/zWSzSQ/jwp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000000ff917de2be61600c7ce1d29651daca5e9221d9047d6be87552e5433d0ada5f2000000000e800000000200002000000081c6c70087436e29e3be96bfe9ee8bf28a787e919902388782465a7cf211f86220000000fcc8969abc048f1fb364d0eb4ef3e94280f0587fde2bd1bf77f08ed23cc66d67400000005d616380737d5cd8d364a310aaa4a1c9de7b5f3a7c66d77abb95d0cf331880bebed36b3546904fd079883b01e1190f22cb3d5a0aa670fc9dd882cb5ab0d2e880 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0fba9c6ec01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431961277" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F1C949D1-6DDF-11EF-B233-C2666C5B6023} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2548 2192 iexplore.exe 30 PID 2192 wrote to memory of 2548 2192 iexplore.exe 30 PID 2192 wrote to memory of 2548 2192 iexplore.exe 30 PID 2192 wrote to memory of 2548 2192 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d463359ebae279e220ca3e171b9cbd02_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587ef68e0e4f9cd460db88433f1145037
SHA19278b0946b45fcb01f40d4ecee79a1d09379f98c
SHA2569b159fca4f6c9afd915297fa2f1dee665877fba6ad67eeac196813e775818d67
SHA512911781eaafd901dc826a02b1ce33ff544df5e0875767f5865c79fecc4c44ec48e261109981f2bafb30d75e0f4eaa2bf82588e7a127b1b00257b7ce7c76acd359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c7c167536585d9af2d985c3f5529fba
SHA131ac0eb09297adec56096937358622431f10b862
SHA2565f4f68b71279282be01395e79dcf1c897d50331d7f63fc61e8612f761ce7f977
SHA51271f80c8a0271060448d1433db100416d96f014d80a7df51b4b0907243945886a1616bcc5d24ff6c843441b90a1780b3ef3c56932a07299f5146c52127616e1d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d23a2acb1fa6de516e6c299fea27a12
SHA1458ce6e32c8e978d87f6fe69c67f679e169bd52a
SHA256db087ec94372d2f66516e676dec1491400e9a6af9477b03be457ff8b78bcc99c
SHA5129a0cc448730af7db5b44b346499f79ff20d3f02baa40e2133af378dbc5016881edb3d84f6f9c5f37179350c6bdfb9de67e43252b6c3a9e9415f14d2983636c98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5253b5cb44458f12e3fc74efb41258b62
SHA10b993855e046513dd0b1ac1c41d6217b737bebd8
SHA25687586fb5fe7ac45544436cd58a7c9f581f83dc52c0c6af0f5f06cf965c684f95
SHA51211391ea89c2bfe8a96d17e2c38609943e77fef266779b64a162d98cfeaddbcd6a96d70d988aaeee188d385aefd75234c25e5465e014c27e6da8b8cd4271f87e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51490b5e7dd995564aacad4f23f39d24c
SHA1a64771821b0289ec91b51aa847057db40debbee2
SHA256ba19382472174ae70b9d40b8ca79a6ad6a7725058a1868bd75e5fb65889d3c7c
SHA51229cbcd149a3b21227e6d3dfa59e34394ce264058b4f2c2b1526fda1702c59001073e71719c5f3a388d89916dcb117edecb2764c606f03c088d45875f9e454c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5085367b487145dc7913299ad40cf97d8
SHA19b28f298aa33b3bbc988f4154f0c91d58d6512c7
SHA2563e9c240d3fbbb19a34e82886e281dd4b4d0796862611304424295035c3fdd645
SHA5127ad88217a925c7b24bdecf067903bd4b14951295fae750e3e0c4f3c048166e6c5691222caf33e35a9925b7cc8544143e2d36714494d53fa45405374ec9ae447e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f298485f5591da40bf0c7f0d43e98e3
SHA1e899fa896d00ed7f50f3fa2d31a9c9671b0581e3
SHA256efe7156e85d84a5c4fe5f163ed274a278c680d29dad65db0bd9f4a0d90daa768
SHA51232f3f72fc05ff63cd383399115dc80d8de50a4aeb5384f2f28886bd518efc8377c8846aeafbb643e40e619b6cf7a230aca6324faf6e0cf0a8aece66e66098cdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b6e42f929fe54fcf7c85233bbb87a78
SHA15c2694d5d395b8326617f48cc5e0883503a6c035
SHA256cfdb3f176ea78108165022d70fc46167eff00791bd917e108a91cf957e498a9b
SHA51256f56c935abf5912be3eca1ec08b828cfc3d2d3b29b52e55298f3895cb26efed3c54d8521399a946c3f4a1c2522b7b008d4fcf17fcb4c8c4ccf62c92e20c6265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a37108533ad119e927d4992f0251810
SHA1c7fbd04ed8ce900f0f606f4075357f8c34238bcf
SHA256c9d3549a94d3bea3edd9733cbbfea9cb18c9e81b0dbf6ce52f679e62332fd439
SHA5122941b8ddf8bbdd9e91ce0126b1f694543613d456fc648ebeed48ab9a588bfc6b7f24d6222f3d54d62977a8e72bc4f0ef6bae70de3cc76ad1907f770a42624f7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501a347fd79080c0ee7ea024b04735d14
SHA1aa7d868983e5c3a1029edc0d1b4f37483018ae0f
SHA2564c4303b82197f9263f1bfb06f882daca22371e54edca5c5c324e6b956288bfd6
SHA5124c32230186cd504b8c64cfff898662a7bf756f8bc8b0977b74047655680df25f017a3ec69a445c38f07cae07c808cc10090322ef865844197e0c2da22a263a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acb0ed9adf0ae958eab8bccab73bee89
SHA10830c97381a87dee22522be76d31a30fd3875ecb
SHA2565c2cb09d73befcde4496aa3d6cbb5fd9f622313e8048b81157139564d8905903
SHA512f452b16241ec9126bd4162b5192a3fb58d1045de9ec974bdada6699177f70b618f6e207d240af48421ffb072df8e517cdfd8b38b2bea01f1ecd828a09fa3fa55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56da9e03709b22f674b6f887e7181a392
SHA182c6c6adc06bbbbf6d6e3bfb9f026ba3a1ff0271
SHA2564543ecbb4fbae84a3f66400fbe6011206115afcd53ee4b283cbeb2aed83cf124
SHA512c678636013826470440a96d1ac09a95e6aaba79a36f4b5c1dd2fd9aedfcd9c655930278b4638d4fddba765d7b5eba4a1c8e7cece2c165d1b745b173a2b5e3fb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556ba89ff6f9a776b2bc52c56c7796dd5
SHA1455fee3e0e1cd47a78e7eaf275f362fbbf40b5f9
SHA256f9567ef4c954585cc289a461395271468bf3b0ec114f67de2e675207d8ea99e6
SHA51231d37b9552615d22df3e83dbd57be2d8d6183ff05ee5761b962ee56a0b605381d91afeb5863066f5ac869414be8365ecec1b7e4eaab05465450977c495c89234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f40e5bcc17c393729826b4e783e7687c
SHA1fb4da3efa74d515489395b8813e3e193be827dd9
SHA256bf3a094ee024ca1e19e71d5a993d48932dbc0f5d5e3d01a90545e843849be8e0
SHA51268e756adeada2f36eea4dd8f5ac7d85515eefbd79de29097452a7e6e6cedc39bcced46aeaf91debd558df885aacfab73aca8d226d8878165b0869186493720a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517a84312d0930e71463a5c585abdd954
SHA1cbe9619b38c89ef683b69e866dc7698a1da22f9c
SHA256cdd5cd72686b2923e05bac4bdf070809edad96ca9fad060a762b6c74cd9118f5
SHA51205541f912557ea1d52967cf693ab63d86aee7576962fd473cd434fd1b40e543a210f264b795a79a5fde5550b4febae349e7943fdabeb5c65de9600287742bdaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545ab904a8896e4cef78cc5a8e3466950
SHA168ebe3ca56f7b7d6881f6244dcd8686fcd5db55a
SHA256a11b92ed0cb91a8b3cce49be23f3ac167fcc5871004490b4cbc18fcabf80ddb8
SHA51235e67af4fc577f6172e679ebe2aa939fdfa04de78d2fbb610a53fbf5340959e23c48e664f93924cd3b1e2de3215b9f8f688acb44fbe40356fa346927ac485219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2b511607d83d3085a2eb9eba74313d5
SHA18b447e47aaf6c33978c8fa6bad9947e2916216f8
SHA256be79c66ddc3e39feed0b6aecb42d25552aee58249bfae26626dfcc254927df74
SHA512dce2486ff546b74549bab813cb75aa80415bc83e216e69a042ff2b3318e85a1e6e7ae9983682ecb89c8d878eb6125cc300ed2822ac8207f70a68df7231f6e9ec
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b