Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 08:23
Static task
static1
Behavioral task
behavioral1
Sample
d5f25b9e359d6f815ceedc548d6a4f06_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d5f25b9e359d6f815ceedc548d6a4f06_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5f25b9e359d6f815ceedc548d6a4f06_JaffaCakes118.html
-
Size
2KB
-
MD5
d5f25b9e359d6f815ceedc548d6a4f06
-
SHA1
6fe20b977d065cd3fa08a042f30d9cbdbe92255c
-
SHA256
ed9268de2d139aca1e9e4c176ce76c2b56c3009faa0fbfb2363b69edbecab044
-
SHA512
5b38ef2e8467547719771e5e1c6df09394acdf3a6175b8f1e34e3e5f4daac6f13fe9a5bff2711bd68fa693af1c026fcff049cb2c94f7cdfa98e5f2f3d14117cc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D7853341-6E84-11EF-9747-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432032098" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000df0f3e8f2bd26e6d2e7a32992c9742fbb4ad9dadf8f93eedeed5f7ac9b6e3b8f000000000e80000000020000200000003f4f95a0bda3aa25e4fe67c42333b30cd8490d657a193b4c661f5f441f52fcaa200000004199cdca853ada63b61ed8f439234c49a7305d808dfa7c7b4b067eabdaff7af940000000156f8b95140cc487d9cb75f88dacdb8b6ab7ecdb0f37c03c1e7e48564f85a0297a2017c5f3de09d3a0d7c1230076343e476893f9fcdb60c7726452f415080070 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 307308ac9102db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2496 iexplore.exe 2496 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 3032 2496 iexplore.exe 30 PID 2496 wrote to memory of 3032 2496 iexplore.exe 30 PID 2496 wrote to memory of 3032 2496 iexplore.exe 30 PID 2496 wrote to memory of 3032 2496 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5f25b9e359d6f815ceedc548d6a4f06_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d65a52873ffe10b2dbba6df35465a14b
SHA13b7ca4d6b9b0c80618bf18b18e2be2666c78a500
SHA256e1e69edc49761aca53b2a55a7a23f44c42b75e6d65ff45eec6f80001e1780202
SHA512e717da65d28648ee19cf40b82cdaef35501160e112761b62649954bf4169d286c79a039cbd5d015291b73269495baa8674a4d0a2ddb626a636c6ca7ab2f2618e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f18c0fbc00e63195df8bcfb276856e
SHA1aded44cae190b4542acbad0fbead1fb7b3a2d60b
SHA2569c760f119fabeeedd572041a14f8a9457951376f82f7c7028e983bd2641328ea
SHA512f1af55e9da8a5fe5b1eb21c488de90deb2cf5aee488aabdb282096ff54999b5841fec059b0ddcf160a65ccc974b5f170a8b71bf4465349afbda2be0ff03f3ed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5000e8208851940fa0058eebb405d8746
SHA13192285227f9a62a36a0336d5849b97d584bf85a
SHA2562070d4211da158c808bfc8bca661413f4106e25f864f635f26593cd37f45d292
SHA512abafa65a819be7a1a2d1e853144834d2796ebb8c07f3752f0aa2c1c15c2aa9c301ddfe47fc3bf5ff486f53a33dcfffbe6f9b1144be16452d9d764efcfa0c2983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594988a4b19c0dfecddc03a42d0e70b84
SHA1e6e8c51a495248fc26aa84e12b987974df58c968
SHA256b40705e47caeec6fa745850dc0775e3585828bdab2d7fb7050181ecb1b68597b
SHA512107b8e29223ec08ac79a206947f9d3b7c65dd536661a009b2bd262d81f5577347760845fc0110dc723a69b1d354f23e6bdd3bafb0b447e160a167d505e4e261f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af91acc5a0ff63bd196fc87365f22f74
SHA19a5c5f4f1f23362ff620c51806a03a1d50275714
SHA256b01a030192ad18b54bc60b380f59db6b6447a8e0731595cc5d5a8c1652ef3868
SHA512338e03edec0c9358427ebcaa8fbe5715f7bfbfc0c1f1e7576dff27fd17a9863738ebac3b9c46a3b84aed5306506a4d178985ff4bea8a4caad19378093d9156e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1ddf46a8801199fa6d910760c3745fb
SHA1be08c6e9a5dafafbd1bac2890e45b89b1e093505
SHA2560659ec0e793ec9fc7b1ba6e67d1d9aee75aa2319253b2be76af698404887a9ec
SHA512f205b1a2172bf5a321d51f86f399f4a719bd8f64422b50177e1ee0695db84e3f5d27486dceedfa251ae836714a743a270b21efd5f4f31e34a35b90425fb3b8aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3aca33b2935773bb491a39be151e4c9
SHA149fbccfb3a66a86c3da3146414fc942e541fc5a0
SHA256d6151f966cf83b5fad5e053260156798391932359718a7207a185e0793fb6efc
SHA512a567f95abe0a3ef52f59fee07d145fa2214bb343e8293bb63cb42ac60dd00df1e786d9fea6c5102b1c23c1ec9b16ae8a90110f2f59c8d78bb960f27502708e56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c7bd323f6f3026eae4d78f51c2fe826
SHA156658a6bf1bb21212f22b1e1e22ac7d050ffcd11
SHA25653e9faf48c528768e38b4e964f61b640f355788279742f01443241bd78c35b2e
SHA51299da4eb225a519646e3cd2c3ea0ac3e234d7b68fc76c39b42d5cbdbe45a7d7e562cfdf1f63598943ec936fa37879a6c3f7adf753dbf5edabe6758314358651c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f704fcb31ad55ee46a941963a3565a27
SHA119f294f7de61bd003565dea24f81ce8c74a50735
SHA256589e8f0a7836ae41373a822b9bb2d31a710b6b6750745b9b9b5a7db4afb46baf
SHA51228d1797929b2d3c162964c4836c5e88e491488f4df9293118901333b9ef634bde01edcff1416fdb5406c28339304f4fd0c3cf0b48199b20fb474973d8439cb69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559fbb6733e396dfe3f0fed2383a375f8
SHA1e63f2c1e6989eaf67a9f17a51a7b25ad51a73a32
SHA2561c747a009989b042a6b5d1c1db7825f7f94c17d941f1876d24d6581b09dceb35
SHA512b006366c82271cfa1d75ad0a3c9a9d3c4241eb98f2c8d2e0507c93ab077431d0240265d4db81ec8ec816a41d987848125b2ce4a8b2d72e6822ca24876bc9dbe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561865d19b71e7c13df5f6168d8864df4
SHA1dc68bc2f40a258153df761e84fba28d45de9a5e3
SHA256986b855db41a9ef8a026b58f2924145aaf9ecfc4afe7902cf5eadbd2beb47970
SHA512fe65dc5844932fe5350608b91e0b363e8714f93ed8b1d95add682e9fc081311c8c76f1c078eeaf8a2ec827084e112eac8b36db4f7720d7e51fd8a0f135746e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dd0c3e0d249b5f0223224b5b7469a05
SHA170d247aa4ba3440e6dbab98a59fc7bb53bee95e3
SHA2563593440e8aa9436dd6ef0bc4c029196a3e6251bb32bc95dee49423ecce5fd470
SHA5126f7d02c2fc6ab314f62f2e718110d6e178011c15c5bd5cc579cbddc12de17cd357f051f942cad0b7ce3d7f17f90b34d034634b067a27ebbdce8ae706554499a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0f347fce5e542c6933856db32fd114a
SHA12c0c71c19b9ed6efdb9d56d8e7355312daa58f60
SHA25637522f09a2adf0a8075d9c4167d497566ef680a563b1e882ea353ec7ff102c86
SHA512c589b0b5403c3736d164a3750fd92e5098217ddc0e3a66b1cc3f94073c9cc5ee2c4db2d29772bc6abee5f504f489aad83f556b5c57b640d737bd8676295f931c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5261db811af684774b53f462bb53796f7
SHA116e2df259b6417ef923f647b52f197fbf27df6f7
SHA2564c904a870e8312c669a5c2262df76e0c9ff97c7b66a9ce1b3fbd540f0624b0de
SHA5124b4ba9ef804e4ed474cf690d3e67b196a1c3699aa840140f23056cc31a244140bbe3138fffe8f576c9ccec7860f6ff6655f4c933b9a2ae589884b531dbb3dec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a776452e28b569b23f60774d12b7ea27
SHA1e5b3801f99a9f6f198cfedb8b0fcf8200a4d92fd
SHA256dddef923cee69dc657e45b6e04b66f65215e55a7148de6a7eb145ad34bc2b9aa
SHA512de9316d5d17890711ba57430a13b16fb6382d760409de296c785d9b806173488b401446c90e546652ccd8c5e1d165c43b41cfe9e602318f81262f9071057333b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d2fa5752c2dfe42c150b3602acf3023
SHA1dc20d0bbe3cfd75b3bf9c5058a83028dfd95aa65
SHA2564f71e7f56ff4c6ceb8345921687fbeb7ae908ab702dd35daea4acadc0b15fe8c
SHA512c33ae0251c4db488898a27bb5beb87e3c75906137f6d012e8e76eb3dcf455bdf078c4355e63b1b606a86201c8bfa1e1753ca514e49df2b0f571e20579781f220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597a036701b621da0aa2ea0da31282691
SHA11caa5add532214b9782b099eef800f38608f7af0
SHA256bd58784ae2756322065d941bd4c920f80ccba848a2d3ad473cf9a2af1f97e5d9
SHA5124a19859717115a6b04b6027e0725acce71e88ae5cb80659cdfeb89f5c72960b1b6742b22feee005a19ca01b0f606f9ec8d936c3bd744719fa98c692b1d96736d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac04f864ff7f6f75bac51d2c8aa6f603
SHA19e9fb3139d6f51b72a8968950cf65e444c34bad6
SHA2560fd154c5dd5d85a0ba5821e225ed77b7d4513a2ec445d4be23d0dab171a25362
SHA512f570aa48b0a49a0cd5d8614b8c75b8deffd4dc2766033b976aeeffa3cb3a8df800df1e022b2961c18363bc1010cb626fac38d4a55cc0226cc1a88b1537bd4afa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c9fd2be583ae44371c1b36a05af4e47
SHA1035e02b93e4ed07921c1171aa1d2fd2da6ffae07
SHA256b4216e4d5de70cb08fdf270178ab46eeda217a78c35f8c83abefc8bb51c43702
SHA5126445c4438f88f824d0f54318bec9289049e9bce6a3a805903c088e8895e80dd1f894d604c2df93c36cace803fded16926e78025708e6891a8fb548985fcfdc95
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b