Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
d743cd770e29606d497bd1d36a2f6dc8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d743cd770e29606d497bd1d36a2f6dc8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d743cd770e29606d497bd1d36a2f6dc8_JaffaCakes118.html
-
Size
36KB
-
MD5
d743cd770e29606d497bd1d36a2f6dc8
-
SHA1
637314b9340e14722627a2f3a0474559ec2b2a07
-
SHA256
a349658ec8825eef1b22ec45ba2d76909a3001bc0089e57565c483ddc55dd1ba
-
SHA512
cb40ce0b7c9e30bfc4e7a63dad9f3dd3ac3dccf2d15828e72661ad349c6b37f8c35a15e52f8c7d6eba01a4bf13448e2c51bf3ffa0624526c72c28e0433554970
-
SSDEEP
384:F1AaB/tiEM/Jo8K8ztXtLPH1J2QSZjOHxTEf6I8IxGXtXaMxKuLRFD1ou6Vs/axC:FTtiEqJ1ptIx+98QbKD/my/XwGhuWyd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4008e1f50f03db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432086293" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000f079b8250779421de1d48c7afeadae9769c6097d9f99c54e64f7e3fb3f21723c000000000e80000000020000200000001c3292f1f3edae90097d332a24dc37ebf94977a917d879bb5109eae6e94a67c42000000041b79922d6cb5a1c6805215957531a909b681dee64f9b02937f71f45dc73969340000000bd174cf4f7640a4cda6c5aeffb6584f84617f543da0284ea2572063022d8d4ec51802ead286d620067427eb7d0595a5acfe5a613ad7f9cdd32574f43a49604ab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{064D21F1-6F03-11EF-8C8A-62CAC36041A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2656 iexplore.exe 2656 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2636 2656 iexplore.exe 30 PID 2656 wrote to memory of 2636 2656 iexplore.exe 30 PID 2656 wrote to memory of 2636 2656 iexplore.exe 30 PID 2656 wrote to memory of 2636 2656 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d743cd770e29606d497bd1d36a2f6dc8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb9bb2ed02a402700bb8c6314adb322d
SHA1830d12bd1aa945696f54c11020e6b07dca9646be
SHA256b0530f4e04d08139063a71340c7934d7ed35466f083f66b87ef601ca775c5737
SHA51263fe961cc13ec33d26d9402a005c65fa60eb37d2dd8e860a3fb6cff9a2694d17d471b673b70f3ed80a93beba9f860f341604601ba4f0312205fa22a587b726c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581c84902637d75c22a2f36453d8c5d62
SHA1444cef9b0de065d570273c1c1688ed6bc00453c1
SHA256efe6c47a4ca0031e4b893846cce10493d8258a1dd9ffad6d85bf3419e0ebaa3b
SHA512a52baf80f87d35ccf47ddfce12d43592be321ce180f2036bfd98e607a70e52dfc04785731c4651f8dca68e307fb196fe3dcfcb47b88903769cebb65d9d2c24b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5598fb6edf0d86ee2441acaca05051d9f
SHA18865c1b0dd0c9f30cba421152ab0350056467c43
SHA256392b7ee428e177f79579796efcac4e3074080fe708865b9be5077457071be7f4
SHA512729adf93b14a726afded1dbf1a278e830729203ef765baaa79526a0595a86f968cd412f5225117b87b64d748e4d394118ed5cfc4174c1543d395d5ac292f44cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5731830bc89ce7ccf769a27a66ebf6858
SHA14d22e5d41faa553577a2b9478ece20d0f13993f7
SHA256082c37d999ea602c9963ce53462235352e777ba3e99f0fae3bd57baf8a24cad9
SHA51220370235fa0807aa876dd0fc8278058c7ab6dd72621ca753e99d57a477cc64e118f2fdf1aba9987017f4bf9559c9cf43c465b3a130f10f63ea155d5cf61da08e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551f7cfb80902bcdc58a3ba9c2fb8a9db
SHA1bd27670023a7e93d10c31e45746ee3dffa331d01
SHA256565ea376d263ed702011c5d6650f48fa534397d370fbf752815f6350048e00b4
SHA5122c4a5fdff6e98f37a7119cc52dec5f8eb914a05aa210b5899e9e3037c733cb58ee36a1f8d99b54a52a98196a3f0d873ed493bc10389dd59716dd02f567354f34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dda983dc5ccedf9012d6f735868c185e
SHA1f0ffe89616b226817879104f606501f2c0e5e307
SHA2567a202c4978f611857b8d8fb68dbe1a30d2e4087f98770d9b8e54d3f166d4908c
SHA512a84a63cd203bf4b15ebf5e8d933ccba6bc92ce02240e8b22a3628f4d45d7f229e4d7f8f33c3ae96b9f5ffae9857895f281ec1488f3d5ad86100d2217cd4c3dbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5079478b5e65c01296b94019ec25b49a4
SHA1e249a113d521a6e7bebcb8f392a1729e6db14a9f
SHA2567e6d58e3cb13da3960ebdbaeeedb986cbd6b37c0d8bbda940429fd544e2da5a1
SHA51205869f9a635f4701aa22159f2263691ce2689e9f509959b96362295fcdd9220cf71618fdac4ef35c75b0937a12f43bd5f1e252dc0c160f31d5c7ed670db7f6b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587c86ecb197f948cb170f952dee79acf
SHA1dd6fff4e00cfd4fb68cbab66c29c529701476602
SHA2566dfe1b9bb0fd072b09043601b1ac6e58261ec8a2128ab6d82182d2f35a952c68
SHA512757d285e2ca7b7b3eb770408c7b0c448af89512e21f4b464c6096899759db3f3c19e01787e3c46dd14a65783d3c614d97dee1849f58195b9504437f8a7356c32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de707d30e3bfcf74e80b0e4b1b800125
SHA1829e646a70839b7f75eed9f285980bbc7a09c81c
SHA256209eadb0cc3e829d74bac78c4c588d602b510e16834d86a97a175d011af250d9
SHA5123dc33a5b9fd94ca31ce24dfeaeb95cdfae171b22acceac88a356bdddc80f6c819f4fe63818db32fdcf64bf2999b0a751dcf4e707910eb155b5128dd8d6db8d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5d57809dda66db66f9c3d3dc59fbd45
SHA101a6e07e4015dd98d1885342f73c0ff7eea2ce7c
SHA256c31cdc9e10babe296de0772b420e37e92df62c75430e60364222567af1db7fcc
SHA5124cc41bc97225d49e70abab57b39ca2ec33aeb1d3f3be7c7004dcebfba332bc7ca0eeaf4928843262c4199a0a3a3d06286f4d1b28ae9c2c623d3fe759bf280416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a415c6cbc65ae54376b4da2a059984b9
SHA111fa50e6296772ad572d4df59777c1715b58fe14
SHA256702952bd5e9afd1f2d1dbfc536357ffe6e172d1b84890c0bfff467f27340ab3e
SHA5122a7f28e8206c6e1afc28e7adc4f0b0272d6d1b5b94b27ff180f0d02d91d4604168d4551776e6e14e0bb8f2a52188f21c25f1ce78c80c4024c9f3fffa510db748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57caa42f46aaa7f58bdb8008419b639cb
SHA19685a1e0ae8dde85084cd4dd8be2ddf57de8ad32
SHA2566c4b9bd1f6075ca3570f77a9c62e0f71997df59b47b33af35a17cbe30250efc9
SHA512b72aed068ae2be989dac61c9339844cd49d05d8c0307e3f5cf489630cda7a4e6ab3d71e1270d974423b77023d4d8121283ccb1dc5d86ade524f91d8404089e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54653c93dc144533164648426a3d28060
SHA164b1d20038f41e1818e7bb526e3ab794e1c131c5
SHA25687e58b9f68e09825a14b62747bcbc0858345f1d9298da8388ba7c70679a00326
SHA51253e0ddf31f9f36d3d01a59d5e2211b5ea222843288bfa0c132fe7475e496cdcb4f86d40ed3419666cd18349df0487bd35af23c675e7768a965ad3b2c7b81a02d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598ea8c73da641401f71c42bf96e7aebf
SHA1dd413ef2cedc43ab29e11a836463e4a42d62dc41
SHA256077b490f556c458da4226b5c18bdbe3fab06b757317add9aa4bd10a5974be738
SHA512cc7f736649a582a4db76c62cb7893a99dd6cdc0eb8a17ecd66355af0f8aaac35ae0aebfb74505f0750d87f95027f1316224da1c0fe77bbb0261a585c0386ceee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5280fa9302c53440a823fcf1bdf548d81
SHA172dfb5642598a7e97a7a4dacfbd07157c9fed79e
SHA256f6e696648e650adcba8d4122940c33b9fb5b65c5b65eb47f8acfd2ff7593fbe8
SHA5122fb10bb36d9e112a5bc78b64affbe309dfecd843d099f2a5cc15147df0dc23fe62e4f268bd1fad1ebf933eb84e357cd73584d787679a9deaf100cb3245dbf8ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5719ba9ea721440e7ae4808d4f3333a9f
SHA18121ecdd65dc2d7bf2181b71ff92254635759e42
SHA2560a897fe67c1a828b7df95f5878b195c0430a601ca0c6598ed6315f7046ff9457
SHA5127bba42b18acc16230a24fb7efb944a05c0c5287b97e0ee466c40e57910fb37756042b1cd3782a39d11e4b1ef5991c83c1c81f922de441fb4b62a19a04872d634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb47c033a677b7674ecf571c3f0eadb6
SHA14eadb8a750a14cb11b9402d578d3e006a287d922
SHA2560707f3dc871c981264b1cdb662777e3a5942eabdfa119b55d68e7409dd885205
SHA5126cb38559c2de1b052efd2dae4ac848d6d1fe2c845511bd0323c62334a2b261af60c4a3e7a8f066e145f7c77b5abb98de52de39dc11876c2e1f1c17e7b9aea8d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f023a42899dfdad5e625d182e3c6bd9
SHA18008dff5c338fb3ae1b4af24879cacbcfeeafad8
SHA2562a1cebdcf890de26484a8cb693bec1f91dc163e200ead795dfd5809ff775f82c
SHA5127a9d0ef8a917397376435fc022c819ef05d4c6180f6c03ba7517e1d83c4c2a268c61a799810bd07f1e69fa041df4e3e56462c9b9fef515c03fd214e56a3d5248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feda10ed3bb30c9e8e9b792c18a13d07
SHA1d9f863a7faec6ebce52776f5a5a732d0985d481b
SHA2567af2c4cbd52ac1f17df9f46b8170882ec2aab83515f905bf1b7ef85601d53adc
SHA5128c9ec2774ad9fb6254be645211b85cf622b6eb02cd4a62489b331a0629a2def1b826dc1b53f7af491faa0f0e061c06051d121bda1bee63137edc4e9611922c13
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b