Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 01:52
Static task
static1
Behavioral task
behavioral1
Sample
d5793ec2f175a62ad99fc20684a3d1ac_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5793ec2f175a62ad99fc20684a3d1ac_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5793ec2f175a62ad99fc20684a3d1ac_JaffaCakes118.html
-
Size
13KB
-
MD5
d5793ec2f175a62ad99fc20684a3d1ac
-
SHA1
7da207d1576a5d9a6ea712b665c624b43e987549
-
SHA256
6d9b8dc92b2ecb396add04a2451eda8deabb8c31b3bf836113f91fbbac8c8c2e
-
SHA512
6046c984eb86590f041ad37e8d136a43d5f0eb81186193303334127360180011279e3862a528513b35c4c3484806ecaa34674d76809f19a900113742e6cf24f2
-
SSDEEP
384:Cyi6onnCj6W5HxZclQFAi7uuvLLMhe1bHm8K1UXBZeF:Cyi6onnw6ORulQFAi7uELLMhYm8K1UT6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432008648" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3E42D331-6E4E-11EF-B578-7A9F8CACAEA3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0b277145b02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000b1227d776167d8701ce7995d86ab2ba4eff986c92399de43320dce2666cf9f3d000000000e8000000002000020000000bc4745c215a2073b38558d3f6be9581f5b65e97abd62ab7e3c2c8c7978978609200000005be1000b9f9797352aa3019ebc0678850b56efed34b11bfa8e613ac324405d394000000076ed3793422b91f3eb0f8089cef815d08f0f6364b962f67dace7c8430f5859ed8d1d4c4783fd78adbb6d837fb8ba52b98ea6eb044800b23d6f06ded4e45cced5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2376 2112 iexplore.exe 30 PID 2112 wrote to memory of 2376 2112 iexplore.exe 30 PID 2112 wrote to memory of 2376 2112 iexplore.exe 30 PID 2112 wrote to memory of 2376 2112 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5793ec2f175a62ad99fc20684a3d1ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5990d431d70c762ac1a3c56aa07247e98
SHA14aa5af55e2e39a8edb292bc381dc1cf401eb7df9
SHA256b1fafb52722acd0ca1cb5344d4cb3af28f3c59fdcbc12bdec5da9e15c453430f
SHA5123dc62e6fdc43e0bc1222170f3cb6e1a547ce06910f3e0a5caf2c5e0be4eef0e23670ec84c597228b7f22bd9ea654bd2a2540d91652000b07ca965e9f151ecc1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eab7ef34e49393f589176d5128b9653c
SHA12c24cc8048fe8893a643de27991d9c84bff79cf9
SHA256ae6bb29d74449baeae29ad3e0352fafc874cc2919557b2ce5275cae205c19117
SHA51234abcbd2cd6baeb079709585f2cc0a4a1519ee21e5fdedc3267c07111d5ac49d9b198709486f3f4e7620c8c63adbb074b3ec519ab9a469cc5c7ba1714e84e9d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dab97a7d98f5c954569fc9df7a9f26a
SHA179db0999417d4a1aa8ec56043812b497eab43367
SHA2569884987b1fc46b089db7fbfc0826818426d018b3ddfcc4e6d9162c956c9f94a6
SHA512d8721da8e948c3ffbe9a43580fb23aa95f93f062a0fb6ae28e95e01c645256a83a9cd297501efa0c3037dee4af463d6698571591a943c73501620f89711dfc5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4a561608baa4bed986717ba02e5af77
SHA14d07dbe93001b5f2361c0337eb30c0bb9b6a1b40
SHA256b0af7aa2a310c55d7589234c9000bb406d07113a6673309ebdfaabf6ce584f41
SHA512ecace1328950cbbe9d9ac0a65e0ee57df3f107b6d3cf4c12360381fab6d706ed664eba56556684631f1b091def280a18b16c989ddb1d794d8ff3659b02110af6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fabd5b14d73af2c4626ef07f95a0c67f
SHA16bae70e29331ebc0c5e1fbd0aab382f163462517
SHA25660ee3ac5930530070d00bd5a4fc158256c325b522d81167d87b345a0f16a1916
SHA512fe3792be8f946f179e0929f28bc20d55d63aa9f10041017d8bfb745d29685e2818d5769bb367c31f413db86746b1915458e0d9ed9d6b8172615aa16834613f84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5563a2609eb8c7f06a8d26241546f94db
SHA1a4a6c878679b029cb7597b5b7dfb0761a204d328
SHA256661632750b88d642f06251f6cbeb92c9a0ca83a8f3cbd4dce6030959dacbc05e
SHA512dc563370ae3a6ca390992d9b8d59c976ea1da9f6fb0492359f9ff23c72ad9550780cd35625d50f9e203eb4faab35106e7adc1d67544046b0a2e94f42ebd86ecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dcb8e26554543c7e181f1e6dd2c031c
SHA19e45cb7d4acd2bdb41c80289a23624ea849e1d09
SHA256731e61be92d888388765706b0cca483e4f623fe6811d186fec0a4c5dcfd8a118
SHA512993861253fa633c10d0ee042556f1ddeadf3c9da4bb9156d5e185249402ab9e4e978bbccf736f7b74556cc6fbe2ba2f96371f22efa1c5528fc0cfea81dc9b709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b170ae5c5e970258589dc93c9c70f7e2
SHA1415399536379768e584870b54c84866fa86553be
SHA2568abb39ac1bcccecb013d61caab8fb288d1c70abd00f60418d80ca9a78a956b1a
SHA512b7654a7c4c09ec1c0232d5d6921bfd193d3d1102f7ca136097830dae1535827fc261a9a7ba73a436ed5dbcdba6653d1356c35c45da9f7b7400c3a6d4754e2d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e79bf5b8705fe923e13eda43970380e
SHA12cff91258f93d92a4a9c43a9a5d340adb89ef111
SHA25624f09c1d69d2baf23b1d18765d4389f3f8774e21b9237dbf90d886822317b161
SHA512a385aa7de181af659ef4c7dcc9da1ae531b3f4913ac803311d1c048481a5f9e1b7e3d40bb4e6107e585df4cb1fc7d50e89811c658c659bc1e3b9c4a1c4397afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533674504fe5c3dc59c4f6c8d384d99d4
SHA170f2b6ba60d444cb238ff887bcd010e6b767e7ab
SHA256c2302db2f9986fda74e2adfd14b66029a60a9f0ce975238effad41cd5ec08cd1
SHA5121d23e0cd63e6d713f40048b9ab0f2da945f7799e37801fc6ee87126f6928354c5cc8bd12fd8bbe5bf16c32ddedafdc71cc72a21ec011403a05a2148c3790bf43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfcccd6649e60652272176f99df1652e
SHA19a346e47ca38312096ea5587891f492503e1d117
SHA256863e54270921094eaf18c48c47d8ed8ce24a1062d23f23a3e8cde3c676c15d32
SHA512e7306bddddade4cbfb31900ff98c4c3fc6101db0137abacc0293301e72ca18838de226889e01f2506f398607abcfb6218587623853cacf6cc58811c968cbfd96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b51764f6ae34517e40c62314213f61cd
SHA15dbf95482c0fb3768fcca030673907d27250b899
SHA256e8bb10fed675a911d8e24a0ec93622bb1ee25acffd35adc5fb293c38b384c885
SHA512e98ff378dbdb7231a595db0b6211718d80df5de6174f2fe7b505f29604d4ea4f867236ee80a60b1b47a2d92434e2f430072c8e3b6192ee97fcc4fb272e023f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54900b71f00bb3f4b259ee37020814682
SHA11ad0517c444c005f02ae78623715d4f1a1df4bc3
SHA2566e7dbd98e24acd0a5e1510953e0bb17cf280dc35ab181213e9a1cd112fc10780
SHA512cfa3e1bde48a685cf75f7d32e035f539d038d0f88ae1a0e69123880e5f9d28e9a0758f57ab22271af706fb84e5ad3f83b20aa295449d6d9d7d8fe10b4f4cb5f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f31a5fd38755c6bd68c5f50a704e17
SHA1642e0d56d0f6930fd229cabdbbf03a5a8cbc3a83
SHA256b01c15f927184659531227f936bdd78683f7bd49974f3e8c80b9e3fd840d926a
SHA5127e7a31ec2ae6058eab3c1866308ea37e2bb3049d37462edb25fed513537087c068816cf761ad2c656ee7fb7901859fbae9fbc5f753ce065b003d2dc8fa9ed491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c1ea2ecb92549289975eecdcffce696
SHA10f6f5456bf62aeef90ff3fd9612064c2edfd274a
SHA256eff36400fb6b1aa53754bc53e1e242f2de7773e21b07556392558ed6204a5c19
SHA512f49a5a4832d5587d86ae157e84f9c7906285bdb95e1a8103028487bb7d7443c8b917cdd8b1e8e9c5bd08f1e7c9dd96d76194fcf87a8df6f72c3c6eeb164044c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56525077446b67b643b8920c0640e476e
SHA1cc406178072287de5dd4b9450d55af2ab93d1fb5
SHA256b7b1cbc87538a86e8348386cab6af4a3b50f1943a93492106fcde14e531eba95
SHA512f22d5f74cfd34f5daf0a688c28289e254014cdeb08f897b6dca6943c715ff05681765ca699567c622cd23e44b4545b67491ce484aeb65cd3043cfe9ee1381f40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5279a844e27e0b00ba78d711fc6e391d4
SHA12199a17103c422376edad78fbcc97816de8a06e9
SHA256797d9bdb4736bf964d49ccb30a79f5e1a5479a43187345bf982e7b4478f53305
SHA512fb6fbe08b9207649e74261e4ac09db4cebe799d2c62cc5ec7dd594e8ef5054dee164a35b1ad26125305c3de032d1600063cd36745467e248cf7293fd42fd29aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebbb1cc39aa4cafe39192cc525e08cfd
SHA1bc994d85d6e7c91d55c784f640ad6d6ba8caa3cb
SHA256f344aa2d3328998ccd3d8ddde05d9664452f79480da78369d4d08629e5e83801
SHA512c512c813baad514d20c640e10a11e9d69558df28491d60c1c4b106995db913f81e473226f7b0570a281d7de36b3ee888268edffa45957417262946325c5fe9f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cf4bc8862303fcdc467e627602b25b9
SHA176924128591f02fc71d45430a136e7ac0aca967e
SHA25612ab37bb1bb70efc8a0d6ba51601ceae65ed2350d2175d0b1083fa18cd893cf9
SHA512e22a832968be732bf383da3172bfdc6bf787cc5a1982d6ba39a4c028f48e279f51d6dac624aab52322687498158509714d32ff641e4d14b7c667577e2310248a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b