Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 07:40
Static task
static1
Behavioral task
behavioral1
Sample
d5e30d8d3f3696fedcf03a89d99fb3fd_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d5e30d8d3f3696fedcf03a89d99fb3fd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5e30d8d3f3696fedcf03a89d99fb3fd_JaffaCakes118.html
-
Size
69KB
-
MD5
d5e30d8d3f3696fedcf03a89d99fb3fd
-
SHA1
63c4bd9d99e9715ed6cedad57bc446870ca216cc
-
SHA256
7bc099f31f99ee546c46f8d5f562f3717b114cb622fb68f1aaa835807e5d89e0
-
SHA512
080369bf9d7b2cb31095c14f51ddde281185107dc8f92fd7b090a41304f8dd65ef60beaa18226bb429b3adaf87d2bca9933b1d6e474f4fab22095354f7df6485
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sK6dl1dCoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:J3fLTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000009e05a862c0456237fc4a4402f57cdb5d45b4d5eba695745a4a7981dbaf0445bf000000000e80000000020000200000008626eece378b2c620c5099ac40a9b8304c10c37a20c395c6f1e71a2f76431ca720000000f6a58bd9a9a0caeaa25a6713685cdd55472028687b8f21039e4ca2f64720b8f740000000b4981c63be31101aedd271b09982e0da943c830c3228e91f3fe76daa35c301c5981014ab16c4f73966af31ba864dbba611bc6f8ab55c271ee154bd0b0e031abd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BCB86B01-6E7E-11EF-9112-4E15D54E5731} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432029476" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 603de3918b02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2712 2692 iexplore.exe 30 PID 2692 wrote to memory of 2712 2692 iexplore.exe 30 PID 2692 wrote to memory of 2712 2692 iexplore.exe 30 PID 2692 wrote to memory of 2712 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5e30d8d3f3696fedcf03a89d99fb3fd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc6288d01edc5d29245e60fa45b4b14c
SHA114b26a691817eeeb0655aec382bf6c7b41be83c7
SHA256dcec87dd762e975f86fd523c577dea90c782843057e03d2d07b6ae3ce518e7a3
SHA512442c44639d372734a1459229fb3efe1ea866fca48a2888e7e90a43038d3f48699de6420e12a4fa484e74e26e5437e011b4763e204c9162e57e01c6b125f7d81f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552dd2608fa52159723d2c04d963157cb
SHA10007a247568379fc10470086121c4d0e6cf8eac8
SHA256e322bbd991948c4bc49892ca771ecfa17966b0ebca7e5c92381df03ac2fcd7b9
SHA51230fa933cde32715a93f5e98a2131beab121ae9b8ba68cd5f09a78072c464d42c843f69a47bd78beb5f7b12d89fe530991d607964716badce5520159241fd2c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541994520ad92c31334583b03e0f175a4
SHA1bfc3d3046ffde609aef3889437b0db88341702c6
SHA256d4e65c6b0cc8611acce5719956e4c9c85216eab53d6f47d824062859d051540d
SHA51296de9514a83fa85996f9adb0c1e661a6f53fabc14d018f2af5c15584c8e88f57ff9d26087371cb9af2cfc767249e69a9a84aef87cbee998fc865ae7df23ae27f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51122149cc1497735ea3a2ec06a39eb7d
SHA1705aca61134e023ddff64f85a8e22606b5cf6186
SHA2569f44416227c095d6ac0df09ec25d96c8c395fddf3c86c66d5b38efc80482d83e
SHA5126e455a23d26eeaf3f12833fd1003e37f1449e7909336b4ca3e99e36039f1f0aad536fe99a77930ffbb1f609b278af62e28eafbe3ea3dd2b2585fec4a979389e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8fb24de6a410d3fd9cde67851d72c4c
SHA1add280bbe52dea5631744a053a59270e198ec669
SHA2562dfe58f4778130380dc50b918d98343bf24fcd87b6a3a0bb7015eea818c183e5
SHA51261572f120ee659f6a5fd4f67f7da37f7872f49e458d81e336d00f55dbeb4bd8341795f734ab7e7da6f4b62eca9575dabe465214876c1eed2bae7fd60b280a553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553992e682ed03401ae8e7c54fcdcf4eb
SHA14ae6f8b754db6e3dbd2163249968d28e1a0abb6f
SHA25661f40f6d9ca5b3449cf8f5dc5cee40f6a4fa6ffdede0fa5a27e8cd702369d1ed
SHA5128a4ea01c2fcd36bc14d926209b91530bee7bcc8f9e1be9dfcfca791fdce54c31a69011805b45d8acbf7a17925aaaa4a259bca4dbd6bd93cd6223467cd36acbe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524176be823a89ac151528540a1312018
SHA1dc9f5d8bc3128074f97c340a29447dca5ce967a1
SHA2560c9381a400f68ec7da368fa86c483c112dad877bcfb8a04b243c9c426e6fa666
SHA512849d852bac9aeca7b2b6b454b365b09dbff654ec6f43e196f12800c653a1921a732e72f10fa297bf20b1edcbff81b6a07775f928789e2a5d1c585aee493078dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50991d62961db856bd8f9020d99114cfd
SHA16d6e82d5d3d81814bad38533a2507c691046af7f
SHA256aeb5ea3c539006c6668f1983a3b893ebdc299e91b7b491591fce4d640b1fda80
SHA512ea6eda94d4844e8eb021b8367bcb324d8e8908c65ed7a587637a4a22359382e64af2ee21be654cc2a9f3d6bf6a80bb16f08e75db462b856ee8e3d3b071e9bb02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544e43ae3cd6480d78f9a0af9bf9e5f03
SHA1902ce59ce48d4c10487fbf42cb4101211632139f
SHA256dd2446bdf686559169b1fc53744ec2a09a7e05da9d6dbe30329d505a12525422
SHA512d52a641f287aa18e34413f09b3580707797253365fbe783cb4d26404ef7c13979737a81592ff452a9667c160d890be4985e522f9b40086e16f01fc4bd2ee882b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae562ec0ae1fec49fc0aae55b077132
SHA19a778fcabcc9000ed591892473b9bf5efe08ed53
SHA2569511008a826e135f5c570d60992cb000aae3b65393ee01688ba3ee6986ada847
SHA51276f4e7e112fe75ce0b551ed1446b7fe14835fab82d241fd23e44c7fa47c7bee29e578cbc8dadffcfbc8158cd54d272c3dee022eda0f7ca5c50a1546a51317486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5065b27f0c899cb2f4aa9fe4358d2b64d
SHA111617f872f958cf6ccafe8c89bf0e8861fb7ee72
SHA25671a63fae6918eaa5a92689fd3f4c77817c734fd40d425c38a52a606b4ee4e5bf
SHA51239091e516c2be2f6e1987a235dfb5df73a6038a302a9dd96098fda88ecb4e442105c0ca13aa0d113d015be791d73e90e54255434ea34da034064b36a1beeb50c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506d623cae3f03284fb47f2878c33c1ca
SHA1702f39655844a5314684b4742ca9c912ed21d9e5
SHA256ddf3a6b74d96bcf37bdfcfa8c617e33ecde426823672e0d0a19e7f157f3815fd
SHA512bfae75e01fa1cc719dcfe13ab70169b1715f8593732d60beb4fee68922620a04261db16b20763f8ae3d334cd330d3220fcad8b1504a13c415bf73a8c5ff43876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d0116fa464127617b64ecd192e2e481
SHA1244f5155ec831843961adda0863fd419964aa16b
SHA25645dbef2adc652a5fd200d235907e8f3545fb462697e0b6f268d0afc773b52cc6
SHA512f1ad5a2596f1f7b41ab3ee16a6a241a2a5dd5fb1dccc69d5e7f1df9d74ce4267a5d0d42339211c01e41060fd8f14ea2590d10cac3767d9fab8fb81b58090b1d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a75113da18f066f3dae8348ebead294b
SHA161115fe5905a2ad089d26354d1490659081a56ef
SHA2566d7c7a739e971f4e2ecd474d3b91a13fe1cb8d7eeff2964131e7a8f8761e932f
SHA512e5f1ec1dc66ca38a9f57df083fdda13009f0667fffb644496a9ae4a9b0ec9a4f78d4c6bf7a71a0d54540161605374602c7ae6808d5b003d08cedc3f7d2f8801b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524b105999c865f7efdfbd7a48482ac48
SHA1f9d2e6e070db9955446d5c17cffbd516500f4025
SHA256261031b0c10c07074db6889e8b6b60a9ec9cd2dbf238a2ae7629823607bada6b
SHA5123f6230e17d5c7ae8dfcf43b9e5ddce56a4d956a86b39ea576e0b995d60ebce161485d54ca575decf3f07ba30ba48225f708d0a17bec7878ec028e8a921dc4072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e089a2a9e8db405416cf5115aa2a5d84
SHA1df45c271ab871515b6fe55bab556418403281233
SHA2563acd0507b89769b290c676f2d15835b78f43833d950331da66c50a535f237205
SHA5128534fae950ca278ec71bddb48c2c04fb6bb6967faa59ca2453d97551fef8f7e7f4ebac9e615533f227b7190750e7c3f37df63a5dbdd771bb3c336b0b24e6fcc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2ef98bf2b2a04b93cf827625b7607e9
SHA169636ba84ae418c741e3f3f4c9773a908947dab5
SHA256e67e8e2a426bd1e01a12a589d2a8982d4c72b7fa22e414a42a44c775dc4d1a4e
SHA512ee660fb2d961e0562bda2531fe1155b57400ee23d0a68c5d10ea48a96fd08f9abc665214224a7c31f8cd5f295ec0b8cffff195cf310d9dbba1322fef9b89aedd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5822be4da17c0c859e35eff591b4e4b08
SHA1915c4718c1a543277dd02d1a6dce847d3f25a60a
SHA2569fb7e5473e035f19e98614ba58cb7821ea19c82c73e7a86d73e5f276e4e723aa
SHA512214df59b404af950f0bc9e40d6c9e05e1406c66b06fb75b3698bf3d2ee31a8d1809bc37264810840ef842ca50bea08c4a876a9764a1cebc1df4700dc13e59f2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567b4d9bd0b188493c11fcfcfca981cb6
SHA11e27f1935d9666f2e550ef127423e234297714df
SHA256ded94103d342b64013d89bc030336230e755a9f056298bc643f36a1e638d13fe
SHA5124f19e9a3c63523fee819a6c8a668312bb2b72ec770bf04f5ee20f520f29b78f1215f226858726ef2a49267b2b7a0912c77521de7ed0542bb8a055c8c72368a70
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b