Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
d74b72924b85b52c1cf39473f335b995_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d74b72924b85b52c1cf39473f335b995_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d74b72924b85b52c1cf39473f335b995_JaffaCakes118.html
-
Size
37KB
-
MD5
d74b72924b85b52c1cf39473f335b995
-
SHA1
1b3bd66b1c636a5b8858ca0ae44b4311b2e04b47
-
SHA256
6aca9a216f59e07f49e5d34ccf15593e3cc344e9a45d4fe7da1d75cd51da56ce
-
SHA512
734ae7e5eba66d35e15af2debd0f50db51b97303ab18106d68e65497478d26523c87be2b841b2b524de9b6befa770bc9207fb7b2853c9a88589d996e6ca599fe
-
SSDEEP
384:TjvHwduTvmBxnx7RL23mcVXWV+PzCsBSGXNEu0:TjquTv2nxVLkVxWIVB/XNEB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000e038135d1e1a922e34a0539b258ec7796da6b9969cd0b727809d3eb358866050000000000e80000000020000200000000dfb1b5cf23b157f2177253f6bf2d3e3cbce80f3a08d8d785ca5584d98546b4c20000000d378bb98180ca470abd1a39237eca2ebd12de93dda52607aa77502f4460ef91540000000d559c00c349bef44a8b17d993183ef5f7511498e11614f243e5040bca45523da0b23fc68842815032713b161ace3720b29cb631948836a47e38f0a51023499d7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432087825" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{92199621-6F06-11EF-9D09-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f4a5681303db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2676 2756 iexplore.exe 30 PID 2756 wrote to memory of 2676 2756 iexplore.exe 30 PID 2756 wrote to memory of 2676 2756 iexplore.exe 30 PID 2756 wrote to memory of 2676 2756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d74b72924b85b52c1cf39473f335b995_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57554780d6ad94e3651a5da45d52f15de
SHA10a691a0240b0525798f44a27f31289f10cdfec67
SHA2566aabd397526d03f438dd593778aed92936ced88047b17fac5e04c2920300b3d1
SHA512e37c9f13b1d567fac7a3ec93390700e9f32234f2d24b6995c5f72ff1eed2dbecdf4e9fb002fb3639847c3af71dca1784d0cc6c22e8a0bfd2e4ca05850108d359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c774a3c3f6c1ecfc25d8236133cd8a9
SHA1c326530fdad2c2c975b327d372b395d4cbd8ad2d
SHA2561f643faa551e45d81d45b57caf228d2c6c89ccf7de36cc9c1e1451abf8f1697e
SHA512001e12d6bb17e276844615a090240bcb3c33dfc92364b8d0bce03e90ea36f7b56f16a6ec5ac80868704550f296a6c978226ae59bcc60dfd688b8630348c4b376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee008634938e77a3155cf280ec9afc93
SHA17b4eea6904325fca3491569ef9abc4a1413d8cac
SHA2562ca89a74d40a4e9eb867480146f15201df65b659aa4af2d1a98069e7714e141c
SHA5124707ca86be07bea6d9e138ac8aed35656139944e6ac952ba23966145a7f97023f44b368b16a9eed34b0ecb795512ba305c174084c8a65c66635d4aad689531f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dd6c0b2dbad6795625ddbae49f451af
SHA1a4ff0fd4060ee94dcaa289c26198c17446d8294d
SHA2564a8ef9b383c8feb9909a0647d6eb98307c691ed2deff0db70c7732e8d5671466
SHA51226dc8347f39923d375a103e8bec5dee5f100d01ee293376033abb911ae151e17d3e21006697e4ef9a47ecdad2da0b85e4887e6d6608f2f9ed18486cc7375bf1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5690e121c95c89efe6a50423f104ac369
SHA14ab89b1f7379a25812f865c0baa8aad993e67019
SHA256c4e040fe5c35d4d463edd49b3817798e91045a053b11b42b58420f8de7accbab
SHA51217da67749ccdf37fcc2c6ad4599b2c6828991d01c0cb8ee77be338e1205c30452f48776f07b7e84c2c041de1188695003c6f8659902cff799dc39974dbfb93e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b36d23755e2439bbf092a41590c1839a
SHA17707dcf29f325ebc832887c828464af232c294e2
SHA256369a49b4e1fb9b1447ee3e492bbcd41a296ceb1a4439608cb6c71c9b26d4b19f
SHA512a9fd4fbec4252b5581f038b0745f5c5a40c735c66b617310ab43cc4826cfa1e6d34d013eb80805e9b1457daf8efbc6c0044cccc7c33502699048467a94e68cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556d7cb4cf781ec9ecdc7672c26a1ba7d
SHA1ef3e19693db3c6597e6c54ab90bee5972d171e53
SHA2566c923e852cee00c9f667d9b554c3d8eb05770b9d4d43360d9bef919f6d9ef795
SHA512094eaa1fd64799bcee6fbffc3a819b2853e2fc1804508a6307df6819ab4e3f86cc4222b9084e929a72f8be6816a339968b2026dd5ad7016c013ee36de1c6bdf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55df4c7da99094e14e5580ad9e60974f5
SHA136cce4bc1a1899601ff37125a98d16c66fd70ae9
SHA25684d616b045a6d281237816c18a7f9709547fa4139ad252d947329305984e9d9b
SHA512a5b462257ea91f93ef3ffc060ea5bcde787a6f3426e34aee0bf8719dde2300bf530baa8cb0bdb19ae9c75160b2bea12b297bb4d273d3018b4c57475ad337f3b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfb9b8acb577886a18507e3a02b40f7c
SHA125643588fd69c07e4eb8ad2226d4cd7dd3454330
SHA2561a4a67962dcc17073bab4c25030977a9b503ef3d20b89e63035f5344c443f769
SHA512714bec66e4a2704c78062a1616dab6b22c5e4662b2874115f6d10d576fc68dbb9e35a9e818e761d6678ee4399c2ade00324da78432ecc5ed76f9794601588b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5048796cbcf2b0a1309680c93523485b9
SHA1cc02a7f791e2ce6ee837344d15bce090b4f83577
SHA256b08098ae65aa919b85d21750301e4a8e0aa922b7ee17f210159a1a9c8113bf05
SHA512bfe5517d29fba2b0aecc3891cb2901549c8896b3fb1ce880692ac82f5031b01ea8a8c2929506485835d2c761c21b73c44003974ae6496de0e1823cd84991c621
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b