Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 01:03
Static task
static1
Behavioral task
behavioral1
Sample
d56931301695334f9855afc14059b71d_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d56931301695334f9855afc14059b71d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d56931301695334f9855afc14059b71d_JaffaCakes118.html
-
Size
4KB
-
MD5
d56931301695334f9855afc14059b71d
-
SHA1
e5e3c2c314d4295e32555caba813cc2b49c1eb0a
-
SHA256
c85122d573a61a71ebd83c7ce2beed780129aa807a433aba163a29d4a5da3a38
-
SHA512
10f36cac3c54112fefaee2b1f7b10626c5b763f5950fbfac89132d282276d64084cb9d0dd6d55a16ab326669d0dae9704cd2128239c6da05eb7067b7f0b6a7e0
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oNJ1yd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432005676" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{52D225A1-6E47-11EF-B856-666B6675A85F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d552275402db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000002de5a195848b0c8d3d91c924a48d1c8c3c92b97535d651033a231ab9d295ea14000000000e800000000200002000000068ba945e9d2799202f43179ec03c14905fdaea3c74300f770555c3d084dc91bd20000000d58e61fb0a440effd22d9a0930073e23537b45df08ecef07439059575f6b2f21400000009aea098ad3131de50f6e9323784f9320334678c95838beca035bf84b404c0060e60007171f31bf0032b2a15902cebd0aec543daaa6c03f52f29bead08983af5a iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1200 iexplore.exe 1200 iexplore.exe 1376 IEXPLORE.EXE 1376 IEXPLORE.EXE 1376 IEXPLORE.EXE 1376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1200 wrote to memory of 1376 1200 iexplore.exe 29 PID 1200 wrote to memory of 1376 1200 iexplore.exe 29 PID 1200 wrote to memory of 1376 1200 iexplore.exe 29 PID 1200 wrote to memory of 1376 1200 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d56931301695334f9855afc14059b71d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1200 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e8f70c097ecb05f01eab8087a1339f9
SHA1376806f40f27572b11697e4a6a498d8fe3c7c8ad
SHA256258dc0fa0ed0a4baff462681bb5a53382505f45fec4da221b5643b9d69032911
SHA5120568625e7129970f5faa263ecc24c94d276f5ef7e5b9dfe6369ca1992eb2bc03b4480849dc5cca361134318b0a793888b02808c3719c597de1b6a2faed795eac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ace8241e305bd1cb3792402dbb9b892a
SHA185dc2f9423445a08550ab4aede7f37d04842b962
SHA256f3726675106e3f739d90f39f702581bca6fce6b0eecbdb068a381f23d268292c
SHA5125dea69114461ad3724bc0f61473680e04d386ebbe565906c752ea744ff7f8b17b0831144a0e2eb58e59dca627f577b9fc1d158df9d31d5cf27a0377a89d70278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c713f259f4bb7b2bc941074411c880cc
SHA113128855a777d4269ff76f73d0e670cde449e7c8
SHA25618be9fff5f1fc2a47f1a8d7494e1f9626ca09bf43127254297ca4acfb6aed574
SHA512d5a6aefbe6068fa631e209410b782c58efba9bd6fc59a402b2e982dc79b212b3aa9b3e19610aa5a5744b0b21860d2e2be341245a657b7d61c21b5b86f8c7265b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f8174ad0eeb8aa1706abee9e776b833
SHA1948531f3e6073438283dc52803734a9e0a87a84a
SHA25600057f6b79582e23fed652547f0f0754485b9717efffd4ee1c0fabb60388f1da
SHA5123d5c8fe7a63f2c5e2b33ff52144b0aadf0881520d7b31ef0ea781dc8e0f39d398a4f254acfbfaa76fee7d5f3424033bfa16f3206f309984d347cf123b151bb4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c314c2ab1e6881d0b32b77a7db42f0a5
SHA188d9ef1b4f7dac50376d4cbfb446f4ec6b9f3873
SHA256f706231043f6d44dfc94be416642cf6cb1579ce77146a0914efa3072c34a60ac
SHA512161e979d870f38d28275c2351264e4216e77a985b8609b790c639b8295e2dcf39d8bc673fefe12d6aa2793ae2ef85ce48ce1cbd8fe409f7a96d56a0b341dce02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52523f3ab4cdfb792fb88591a5ea84312
SHA15d3bcb2da6fd6d9213501482a649a227dbaa466f
SHA256203aceec30cea29cc21be3dfdd8e9d95ac4de36a033fc06dd1a602f0eb4dd6a7
SHA51208c7733224274292033ae77c984ca07639146f1ef1d237a969b03a39c430df63489f917374d8049b5368e3ca29ade6e1f676979d4b3093d70c6f8b0add088b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549e7d36fae686524625ddf7fd7d2b4e2
SHA186148391e18186efe35a8b7b82bec6ae172d7b1e
SHA256d206ede766c1dad43c1a023619ab2c3f747818536040ca64ff425f8ea3108bfd
SHA51224d0b8b559c074d5677b0504af4335551c807a67b907be9de10fdec0155243cbd345e4ebab423356952cc8b388e534f35ec11061799d37b11ea08ea40804ad5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f9f446fbe9252004af0f0c23b8810df
SHA1453ddc721fd34850e318d06feef7a0e002a6efc8
SHA256a208b55b40c118b350431de4a61bbc73cd735289d458839a7a2719ffc0f35c83
SHA5120abe2af53f0dcd5a09312d035e7be5c88429a49b0f7e5f9d6e44de669cf61c98a4aca501793ae44e4304d80877e8cd39365f7edb6f74a068dc28ce3604adb4cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eaa2c03003311963cc3bb88a6f2a7a5
SHA1b9a5787f1a6f3b847deccad31e5bbb91d1ad14cb
SHA256cf6c0777d15f635d9c1e160f88f457e551f2579355995fecf887222dd9026c09
SHA5125fb80989823f1a5d3989022ead6f4232387134cf7f7397788be5c3f7fe661d8e46b9f5f6b62cd49d3f658383ff8a45eafb682a977189f8c2b9776c4bf29d7e56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f7cf4a9f63b78088004da0335cd4340
SHA1418167d452f1f682c412e4cd03ef3491e9d310f3
SHA256e917c20d6b1cc8b470c79540294c519cf3f44ad192717ad50f25f3eb9bec6b80
SHA5126302eb17860dce51881472b30e24acd71abf2b087fff1c73041af6fd8e39522fffb516a0b90f91d156fe68888ab30cbbe0967bba0f13bbd477795b7f7852b19e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a60be916fa4dbefa9ba97e42d11f94c
SHA1d2e39235f6ecc51dd22db2311674e513599959fb
SHA256124aa8bdadcc6785711a9b686c61240f83b512c91afab9c91c9aed45f9248495
SHA512648569c31341e70fff071c41575dbfd161a95efb2edc59945090f14e941ebfe69b75b62e3bb6a4d3f0ed0084dc3418f6041e6c0cec6802f8e7b008ffb12ab289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528893aec90f4d6c54f539f77f8f0e92e
SHA1aad9dbb169601c552c1e235661275a5fda9406e7
SHA25652c93d82a1c392ba7705ab45a91f484da242370b010ff88dfe527eeb4b724cb7
SHA512ac35dcbf910569c9ecd6cbcc42a79c8d33eea51e7f00cbe5205e7048ddb8295469d20901b2bfa0df7cea23bbeef028fcebf7f97c00f5b30f363862d50a47c413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59681ecd515a3af75ec467c53852fa5fe
SHA1520ccfefdcec0c7d1b269de0b22cfd7b36482838
SHA2563c62c409cedb3b6e73b278bff799ef9a74d50906a6b043f98461a001687ab181
SHA51253339140050a9e9f3047fc1997f3a20e7d2d8996b795cc8ece7cf0ea97a0216123ea77a99b3bf140473dc61886784ccf4127412dc2d4006c00fdaa8a1110bc4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e773abb1e01124f115d9fa5570dbd017
SHA1ba7ec557c2ef8a0bb9731393974a9143a4734517
SHA2561cce46bdb609fd2ca78d9c781f487c017132f19919c85038d01253dc706bf206
SHA5120251cee031eb09b443fd7d805154d5dd110923de117b5358bd46b934f12463aeb34b960be58b8408fd244e806a87064efff7723f8efcc2530071ab5872ef0cf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501d0c5e7d52708055579113b3a60b96d
SHA194aebb7eae26a5f833c121458dde2d702062ec27
SHA256377de5eb9ddea4d839d7dad480316c655f3659eac9572e91258c517294ce770b
SHA512be57a18dbb58a8b7b6f0184abbac2eeb1832105e17b246b074d07e665edd931c29c9b901571299269c6c9f385db77ea46135fde38333866054945d70095010b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0918445d4d5d12e1d39844c4d353325
SHA1d77dd2bf65abc372ef06dc64b0caa4de27cc56a8
SHA2566fed729615e5e10349e1945f661f35d9a0e5bc5a20a8aad869be14bc6d79d211
SHA512e5a1b57ae34682f6c1277ae4d573d3217e460a67b70530251ce2f3f916886237a18a7ce0efa3aa534f275bf7f70ed13a4ec55dcc62fedae5db3b1ede010fab46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d51c7f7a37f5bc52520eb07583ad062
SHA1e4acf9e4ec56ca1c31f7e34fdba12630d66f3a7d
SHA2567c46696534569b0dcba0d78238a7469dab2002210b828a62f186df8dd529c519
SHA512df7c94ececb76be5485dc7564454b614f06ae2cb2d43d73914f05bd12d7fb2cc4707272ffc65b3b3f5c0e8876879b98069cd96581024917b55918e34061b4da4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d291c9e025818fa70a49efe3d68e7b3f
SHA13e63d16c2b4e364e55833a8209956aa9453895fa
SHA256b1db35fbefc3905503c96a25b5be1176c59b1c5ececcc7251608851a1e88c6f7
SHA512a35613ff2be635bdca885047a8dc3f817348031cc71800944bdccab14f874371efebde94bd135c9843056f61562c6e8acddbf9bc39b9677d4f4932c1e4c150aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b194d116f1f15d790ccbe4b7ff91750
SHA10e4693057960d688f9df61ecd11ed4628a24fd3a
SHA2565d7e70de8a0854dfb7ad348b81aad50547795826348794a662dd7cc46fc8bd1b
SHA512a5f10b5df738cc6faa6a44265b412fa96dfa2a79fe7c1f68d58b84ad4c8ec4ea1022a1d253a04446696fc53d7ef04f2fcca3abd84bd15b27ea9d77741466584c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b