Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 08:53
Static task
static1
Behavioral task
behavioral1
Sample
d5fcd857c8e4a95cb416f3c98525559f_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d5fcd857c8e4a95cb416f3c98525559f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5fcd857c8e4a95cb416f3c98525559f_JaffaCakes118.html
-
Size
10KB
-
MD5
d5fcd857c8e4a95cb416f3c98525559f
-
SHA1
37f8d5dc867eff64a24bae773075f9387d86cc5b
-
SHA256
49aaec9cb11fc832f6d2ed2041ec7de2988ae675c3c22ee80b67feee5ef8ed93
-
SHA512
a99cff2082dfd3acb064c6fce6fee60077edcfbd6da33e62b393cce752cd6d51c9937c010d9833246c13bf5936c0f7ce26997641305218deffbb82d8e302ba0b
-
SSDEEP
96:uzVs+ux7MQLLY1k9o84d12ef7CSTUcGT/klUpM85MkOLomUkWj3lVHcEZ7ru7f:csz7MQAYS/VsMUcslNjPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10261acc9502db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432033867" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F68CD0F1-6E88-11EF-A9B2-6AA32409C124} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000649b890ab3873cb512bb20638a2aaad499f995ec0291d0e2fee178cd87750d90000000000e800000000200002000000084d9f2997642e54faddca5bf25ab603354c1ce0ea39bf6ce56d5d05db0b8e27c200000007b8552e069f8f841eacb7e0b3ed707ed080817e102fcc157a7a3970d946bdf5d400000000324b4914fbe63eac6b09f0487a17be68de63b2dcdad9358e77cbb197f6cf0a693aa657bb06d4f5bfbc2b2670481197cb332e93d99fd33289c17a5ddf903112d iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2308 iexplore.exe 2308 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2840 2308 iexplore.exe 30 PID 2308 wrote to memory of 2840 2308 iexplore.exe 30 PID 2308 wrote to memory of 2840 2308 iexplore.exe 30 PID 2308 wrote to memory of 2840 2308 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5fcd857c8e4a95cb416f3c98525559f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc0f9e13467cac99645b6fa2ae7d3850
SHA1a835a5a6d5be46deda9bb62ceaa069ab91855b1c
SHA25664297a13e039e3c69ea9596a4a95d39aebf8db9dd55eb02c035d294e849491c2
SHA5121e00fcfcfdc9f0baabd2848a896bd3ea9a325dea38d95616846e0856482b6c2e9813fee1c3987bbe50388ade9df3f55430de4cc2ba83dc62c8d05fdd271458bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c85829212d19adb02e528e20d71fade
SHA1100c2f52c0b87ac70183c348fec3b8831b17c2ff
SHA25627a04dc4efd0b97ce67ef4490ce28878b8b48c0cd301b6a3060355c6761958d2
SHA51235d708e2ea3745c94a8ddcabf1f689ae059deb5318f1317893833c556ca4e85e42dea18c9159ebc85382acfdffabad3917e08b88d8de84523e2940eca0c527ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575931c65468b1e4f9cc60390bcc2b4de
SHA16cb2a2f2683976cb2f59b6352b991fb67cc1a29c
SHA25653ffad2ffd8b7a74a8b4e66b8712131817d0a18a824d94b8c4158e70e6ae7ce2
SHA51284fdfba9cae1ec6b72966300f5df731f077ad77b371eaa194befc8c56a049cf4cdcc7b78dcaef5ccc3fec6dae32294dd13bda6ed6475cfe9df8e50c53d805dcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559000b215dc5e3c9fc79be2fbf20bd9c
SHA1de1cb2fce9d69c7e238441e33fac41fca4fc37d4
SHA256264aa6bf10282813b7a6989755c4ad15b43b4df00606204f4d42ec056df49ddd
SHA5122ab3d5647258749871c20dd82bc677ed370c8fe75cc4e878b87bf5dd12cdad61db62578cb707363dde7405d3330e7f12407da59b96aacc5942327dee4e0cb039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5034285fb60fcdde19ca1bd12d93b0d45
SHA1dccdec6ebfae42be3ae37440e19d344e7645ce04
SHA256fa5ea90c20b632809214b41d1a21d1531a16fb571bd764d0f4144b4236dff7da
SHA51275f908a3451af62118b9341fb264006ae9ced28a1d83f8957aa3dfcbc9040f96b06927bbaee85213c35eea2fb83896eb0dcfda109e129ef52b873afb35887447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d15a7a54dd6258d6314394b1bc77fec9
SHA1b1d00c000c14168725e7c6079c30d5b7913d7bba
SHA25658de56f9e0714e9cd28716fcc133c133478f5657061fbec20824e67652ed9929
SHA5125a06cde53c612da581bb1a21d89325b45b95171426b8ce0b8d74d1916c609fbed9a343fc0498b01e55bcf19d877951c765eae0619b276996a99d53b10e7d533a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c681f276a43a92b724c23418ad1d609
SHA1fae31b938b8d5836ceacef87327c89324fe0a37d
SHA256cdbbeb18c0f06746d9be787135b6c8f6c014ffd162e6d2f9247d88913ff16f79
SHA5121e8b055c7fa11327c258284fd0d6fdc75aed704dd86cadd32e5cd17cffd83c606926d6133fc95f6377988eacd048ba6143f4b7c13506121fb68a13da1fadf4e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceb4ebb47d2c357437b89e588fd23eb6
SHA12d3873cb5c23a391834d13703f6c0d0716d88907
SHA256d6fb41398f9d3327f75c5613bce21d311d7ce4fd199090a29944be53d0aba098
SHA512694fb6db7781fb50d3901b1cf99cd09f2d72d2901bcf47c697b64da883195398207f219fe34a79adc980f59660c18a7f9fbb7eb0d055b8e7a5cd640510ccdf92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2af46d7a6f8cfb5f2eb1a56c9b68d93
SHA125dc3b6cd32553da7b2d531a1545236a80e74358
SHA256550daf55a867514208e12e1204d2a5f8071bd7990d6f2af4b29f99752bd76a86
SHA512e79d19772d480c1810a854e0a8d583604a0d0c1b6de249b7a833a5ae6763f15336caa890f8ceacea988ae1eb6eac3b98ceac56bb937a4f044f9b7e69c43ee6fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580494a69aa5c7df120e3c3224bfacae6
SHA1b79f140107e20bd1dbd7f2ce3fb6fadbd77b8a99
SHA256b9fea2e082b92f91cf0ecc8aa88001b47dff59f737869e46e1a46a896c869420
SHA512f2203426a1980c0409c4a119e586b12354aa03b35b735b92ae4726583112137f12d56d3e99ac7a4496aca64d39e6dd971e58bd1a48016178835abde18222ed81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505364b967356e4a30a8177ae8fea44b9
SHA11e345b3c9abaeb2b95864219835cb197dbaa3dd4
SHA256dc3ed61f14a820cf4e3b2eae165c6a5698a120fefb3d774c34097198a1e49447
SHA512247ec3a2071fd7a261e28e0351b762d9d434d1f8fe1131543e2e42aa86f10b4d5d132a51eb39266c72dd7c258b3fea5e5623387534d030633b68bd116e36c82f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56162bb6453b70026d3e9e9ac7afb322e
SHA1ae29ffe19b05b4d9b71c4c9096acb33cd15bc051
SHA2567b60ff8dcff3f432f4b9d0231feb6eff3c1fe7ed462e121bb73f05daf84ce63b
SHA512d5dd71534cc7d7ab1230a7f958c0de0cb1f9d5b5c603d01172431fa06c50cff773e7c19feda46bebc651a7b5220efe37802af5eea5fdd18d768ff20ec9cf4da4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50466803744ca5c33fa2aa0b94d651d38
SHA112db001918194a3ba843c1993535a7de26f6cb07
SHA25632cf7616c9b8acf4a1a9810af47235273875253a75651ddd07e9aa5198e613ce
SHA5126d83fe0a40728f0b6cca07c6c18e18800de79f8f924a2a1e392cacb8ef9597276f00c096acabe961dd99221a74ef6eeea56aced8d0a90992b5682a97bfe7101e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7d8a16e47b6c320c3674b2e26863b21
SHA19f5cc7f61c0d09dcc8b34a046b88b1a2821b53f9
SHA2563482719e687dae6344e1a88e73502d4e333ac5fddc8f687f44a6afb1a9dc4df6
SHA512987d2784b9c1f3d3e7519ad57612a6f8e371e30731d9954e9af0e3b2d03b2a93f20d08ba61165d8feaebee9dfa9716ffdc3d9ed016c2c2a5d2f1b19e25a49acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5317752b031b611d92f59cff56fd7c7f3
SHA18ef9b4ea6088eb6d9f64ac7e083fb58152372326
SHA256454fc0f024fbaad7da74dc14c39feb4fef054f2ba610e52c5b0ffbf2df625fe2
SHA5125b0af05a63f6acf75695da001e85de290e10af651cd7de4ef3657a2070febee11744e1ea8810a195802e905e970143e1ac6904dd3a4fbbbb9bd6039e31acf78d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca47b5313596296e3e7485860f012cc9
SHA1c66a71062c0e548a0ffbd29aadaff7639ad226db
SHA25605eeb6f8502ece2b305ac2d093bdf0ab8388669b92f67a85832065f2b3d6f183
SHA512cd745633db7987a7fd84d2614525cf525d504cac396c27ce888e7765b0d6608f23cb6ec9206830fa44e8edd26796a2acad71a977270def95e3dfc1debc69a577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595a16c567ada8a963b06b040faf2cba5
SHA1d29dbdd5d8e53ea13f30dd0cfd50788047d790b6
SHA25638bcd647a2d0e791ecd6883d8870a2c36c24652bc563d6cc3e57721e27a24f6c
SHA512b2e17f59dc4ab38205f42843b356f23fcc61a9bd74d00d83a6d45ed0c9ec0e661577d1b05a528e8891af8ad4261a5ed18758b351ec3cd7cf9bcaad302f00d226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574688d5b4ef8ec6209ed2f8b730afd31
SHA106b926beb55b8e0106f7dc8fe944a363b6377211
SHA25610a793aec30d402f88dd8f70fd6b6f0bc4121773f1f9d494851a7dcff7c87772
SHA5127c03613cc566a0ef8b5d85d10c509976daab12fdebe77ed83cc811c5701cf2e7e2a9db5be61609fb83e0db5c33d1a30e39a5d5a8ddf8a1c5afbbcac068083c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdea25b8666f53ef1bb0bec87a5d7d08
SHA1702b357a54d224ff35705199da5cb90233a1e88f
SHA25664a81f2859378e352422ce5d726718c7d1638bbc2fbc942b36f605081e2c4539
SHA512dccee1354510881fc25d3e9ae40520ff42ce51fa0d8b26f1b6008085bf0edcd4dc2e06baa02a8e2e8dd4617a9e227b95e143ef3683577aa4f20833a54fedfff5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b