Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 11:59
Static task
static1
Behavioral task
behavioral1
Sample
d6443291f5ea96363e480f788894458d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6443291f5ea96363e480f788894458d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6443291f5ea96363e480f788894458d_JaffaCakes118.html
-
Size
15KB
-
MD5
d6443291f5ea96363e480f788894458d
-
SHA1
ed8100a29b0edf156c2a5eab6b9782a953c9edb6
-
SHA256
9bff1a1d58b8d5e1957c1cefa11b0a6b8a85419855a2b766db4ef903e3f61e03
-
SHA512
e2aee594d2a092c5961005da1a6fad7f42587d8a9d767d38f1b4ad6ab326fc3537727ea5c0ebb43a9479f79c122007d2cb335c62c05b55498cb075fec4955a0f
-
SSDEEP
192:t4tfLtXSHGQsQxbOUDYVmCVi0eIafr7OCI7aD7hXzEFSn+LI0Vc4+bcJi0eIaGm:tofDvOMmC3axSkiI6cx63aGm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA2F0EC1-6EA2-11EF-B4D5-7E918DD97D05} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80d049eaaf02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432045044" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000f5821e713886e69e5c137bd53277a4778c8c6fb09c394b1b9be59ba8e13bff54000000000e8000000002000020000000dd78d317d3a8a27a0a653d026fa1ee0791e4645b0401aa83c6762ab2d0140c6b2000000018f6f065b9f7705c3e64a4edbf46ada7ab40f2941835d26e4e20ac8e51bdd9b140000000d17473a15533d47412c7b29aaf47fd6c02d3e944238c95a6ed4830f1ff57f1659679d5cbea1e08cd4f47c0a38af246e1fdd91f7be719420ad1a5c45dedf85717 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 1440 IEXPLORE.EXE 1440 IEXPLORE.EXE 1440 IEXPLORE.EXE 1440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1440 2336 iexplore.exe 31 PID 2336 wrote to memory of 1440 2336 iexplore.exe 31 PID 2336 wrote to memory of 1440 2336 iexplore.exe 31 PID 2336 wrote to memory of 1440 2336 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6443291f5ea96363e480f788894458d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afb600e3ec9559c6bb177a7ce85f51e4
SHA125e94a64293ff96c653a1ad930665fffaaa561b5
SHA256b3e450a173f27dafad87402164d06fea3a4aceb20d67aaf942249fa77cbc37c2
SHA5128052e61cc34ba4f4c0916fb70a38e7ce4964366760f44db0911567fa37116bba6158dc1b0af538a6cc8b8399446e70a7bc00cf9d639ad260ff376676cceca69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5291f46237ead22f5f0f84e8cca7f3def
SHA1839102c535d16f612d6e38ee1a21d6747cc1021e
SHA256645e354b2de495b00420c6d08e758006fbf6b162bfc4c7e0b3a7782cac02743c
SHA51229b574c086b14b69d5bb423b4b7d7b9ae525a1da586b4962155d5b5ea5584d0658a47bce34e291d5cd96fe1280ba392ca9f5fc4a82eea389aedcb47538418d48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ca1598ec999c49b35f5b2768712d7b4
SHA1b774602b1afa5ada134d1928a4085ee1633bcbae
SHA25658443537874ce4bfea5937795c00ecf800749cc6f0c30659a3fda2ae5fc42acb
SHA512c47ee0b6380fed833a9e5a5827efe7196abf127e41b0d4245e834fa3e147fba5357fbf81968efc30f02f6cfed5df138fd1383fa2e51c5f87866b9c25e3e346bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547fffa7eba389af3fd26a6987c99bce3
SHA1837661e0e274684ebd078d0a09905356ed3c7989
SHA25687680ee28e3b0f6427602faa758649c5eaa651583469b8b130855faae594d81e
SHA512ebc7675509c128c6c7571994b9f8b12f94b61b4d3f8156a636345f19624fa66c7a0fc90dbc4ff5fbec4ea094000beca3ddf6898a9a379953ec649e799425d864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aec99fecc84f0947c7fac22e664276c9
SHA1a484abc9a72951987efed8bff1f5951de8775c78
SHA25617db5b6f765d8d0baf983ff40705654cc4efd2d127381e42707f80a5adcb61aa
SHA51216036a31ba80fe0307fd4af6e3003cbf276df0f3c2dbd9704d5153cad86517ac283e7278c296f8f66ac426f3529d2da7a1ab12ec311a503e77b3569e3052702d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c673cd02aa485d7c87764aea74560c4f
SHA1ce280d03e557f8dad8b2e58b81bfe163b77cf832
SHA2568d040d9c57622a8968edbbdbe0e504349da205ec29c62f73c9767dc4b9b644db
SHA512a17d57fdb41819dfc3b4ae15d5e20a85a6e65118d9fbcbfd287c5e42e62bebcf4df3c3540a17e7ec616a9dd51f670f8beded5f3e4905f485d4fe2a7095e96e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544ec8bd949f6fbea94f86ee36549a1c0
SHA1799e4964eeb74ffb84fab9845921436761199fc7
SHA25643ba81e623dc80c79201db8bd96c2a83a223d32b1a1f8f0a622f2eb6d5ff8a5d
SHA51295833e6d0abc9ffb3dd51d5912570dab32ca4a0e5a577183b858d7e95f227582b00e2fdc874ea9a9de211986081e62997e2236ffa8f78f99646372961d3d250a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a2831f9ffd608edc60e5106a3f2edc
SHA1a800ea0a82ddf4155c34a651cf6401b255fb8e81
SHA2566bc5fde933dbd80d5d28687d6e76df1810ca77fccb529762d4d89a2b95248297
SHA512adebb0ee18545eaf9f9efe8b81308230bbf498deb39163d1b191fc282a1fa6179bc640b28cd2599e5b78592650c877a17c80daa56c1ec5962f5cc8fcdccee089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c06202379236929078f5c646ed261ca5
SHA1ab37e9deff5b41c20b903ff0a0abfccf0c941025
SHA2564e7912d4a08f38b28b17a79e520faf5129df57afed8cc1bb18aaa987cdb2f81c
SHA5124a66853383c9c344caaac3e00622900e803d244e09a6b876980cd9452ade9fa28bc32def4d0944ded1e583b63ceaf014fd159b3131fd1d4fc7d17c8ce297b7c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a44c2ecac6bf8f96a0ba101973b3a1bb
SHA15a7919c7d34537a29f9e9522da18fa771d0edea5
SHA256691fdf1252dc745810333262f2419c7ba28fe9acda3c038047288fd31473c51f
SHA5123318ea1da3f79d5b10bbf94a3ed01e7f2713d9d4dd009aaa21385f65e80610973ec1d97da440ecd5e2b6fabdf3649a0eef04a4b820516b8ba1e2ab6364268b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e463bcfc40866431dee800cf3f1c821d
SHA12d60e35f2df888e589c66baa6bedbc5694ea7a0a
SHA25682094776105ffe4cbde661dd6dd2553faa0cfe3aef968a641ee459bf3d224b32
SHA51216e9692e5ecd3f3ddb75eb1f5d40c6d8cb6c1df46fc8948d866946e1c521b6e1b09cbdf869de93d67c141b45be23250e75d23c47c50e2da76c320f6acd12c629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da5bf81da719b80b353a823561d8718b
SHA1b80b6dcab461f83a049cc1b3eec07b2802b698e1
SHA2568b804dae98fddc4e32fe2c0c1c448a1732135e17c2a2e36839fbcd8511e990cb
SHA512940e0cd1ff13616734f7c555eec37f5521497567fb7a238e82a7c96b47b89fefdcaee764938c61ccd5bae375e6482fe877f469ea876dbeaf0b81e91896c33a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1dcf10e923ff62521b4ae8f8abcb5ab
SHA1b51046f792aaea3b32f09caaebd3d2290b12ca0f
SHA2568ba76f436abbab76f06d1c8864953652ed0bf7303ff4e445764e72470b4d42ed
SHA5120e65febdbd40cdfab9b8c05f12f0200fffc6c2470dde911e21acf46cd15c651846fb572b1952821fcd7ee0f9511e755131cb232f69deea34a12ed0c90879d927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce270d19d01705c2f5b5d0b71da43d27
SHA1c07cbded6fa329b7f9cee3b9a7672ba93e07c54a
SHA256447afc4387651be21910cd1a7a511e5cda1e17a25ff49de6d456c75c91facd52
SHA512b13d4170d54e4ff5da202980c7a918238df705b4e63e7600a0917bfa4e1b31517dc5dd50c1e2af24295f285589c63da383b6c3819a5dbfaf280cc5ece400014b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5402ace1df4e3697587d82f3e6eb939cb
SHA1eb4838908d73eeeaa29f9da6f0702343e82ad392
SHA2565e56b60cfcc2eca35172a8ff30489ffde8aac022522c7bfdc33583244c5dd7b4
SHA51260e110f80e5581dbad2de2b1977cb47e49c1fab89aea64dcb05e6232e2beb5487929d47de18242e0bb79fc0f12081ad20361b9075c0b6d2df4eadec3fb32686c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f90f6b2a5aab48f8971b546b468a117
SHA1a5cdd3bf0085084d87d757195a553589beb6ebcc
SHA256abc22571f432481658f2523178aba329274dd22fc53ba333a8a1b31d8a387383
SHA512cd0e1373629a4366c1a648439cdc4e7fd582436eaef78c19e3edfa3aadcad3e342807cb627c43868637949bfc7deceb9707fad9ff1263826462a06e6feeace9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b764a6f2d437655e9d839d5530aac5d1
SHA1861135bb6627076d1f8c6d8b279e92f3cf459cee
SHA2561ed00122c067b2fbbdccc3b282d18ed77e8ec40779cf034daafabd4ad3ad8d86
SHA5125b43d89e0b1cdc5e4d471c2d9e14d69ba28ca93b579a98b2f4d5359ad344f05fdb7dbde50db9eb6d18354e870a19b8bd37415a8e49d1e987ce827d2fea4f6ec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4c9315aa87f4727bfd79e7d2abda7d8
SHA15e0a33a5c979ba8bc76209a7c9389ad52c6e118d
SHA2560febab287bd98f2435f7d9f53d3565073387ca9791015ca6a7a777f16e54c8e0
SHA512c87e78a4b7a1b4a823b2bdabd77a84878061e1a7aeb2f8a7f6fa99983e0ff3ce6fd26b106556bcc445221128b9c2b10ac11c68a1dee738f9d3c0845c70353cb3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b